Q-Learning Applied to Soft-Kill Countermeasures For Unmanned Aerial Vehicles (UAVs)

This work presents a three-dimensional control algorithm using reinforcement learning to guide an attacking hunter drone capable of performing a global navigation satellite systems (GNSS) repeater attack on the GNSS receiver of a target invader drone. Considering the mission and movement requirements of the hunter drone, a Q-learning algorithm was developed, for which the table with the possible transitions of the states and actions is obtained by the actions that the vehicle can take considering directions and the respective consequences of each action. The learning capability of the proposed algorithm arises from the trial and error by an agent. The penalty calculation is based on the error of the invader position to the hunter's desired position of the attacked drone. The developed algorithm is tested using a software-in-the-loop (SITL) implementation, which is based on the Ardupilot platform. SITL simulations are performed in a developed testbed to emulate operational scenarios, where an unmanned aerial vehicle (UAV) is hijacked and then controlled by an attacking UAV until it reaches the final position desired by the hunter, usually a secure area where the vehicle can be captured without being destroyed. Results, including error metrics and action time, are discussed for different mission scenarios.

[1]  K. Masuda,et al.  A flexible Q-relearning method to accelerate learning under the change of environments by reusing a portion of useful policies , 2012, 2012 Proceedings of SICE Annual Conference (SICE).

[2]  Kathleen A. Kramer,et al.  Navigation error experiment using dynamic system matching , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[3]  Mugen Peng,et al.  Learning-Based Defense against Malicious Unmanned Aerial Vehicles , 2018, 2018 IEEE 87th Vehicular Technology Conference (VTC Spring).

[4]  K. R. Jansi,et al.  Fully Autonomous UAV , 2017, 2017 International Conference on Technical Advancements in Computers and Communications (ICTACC).

[5]  Sait Murat Giray Anatomy of unmanned aerial vehicle hijacking with signal spoofing , 2013, 2013 6th International Conference on Recent Advances in Space Technologies (RAST).

[6]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[7]  Hao Zhang,et al.  A new electromagnetic jamming system for unmanned aerial vehicles , 2017, 2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).

[8]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[9]  Stephen Harman Characteristics of the Radar signature of multi-rotor UAVs , 2016, 2016 European Radar Conference (EuRAD).

[10]  Jeffrey M. Sullivan,et al.  Evolution or revolution? the rise of UAVs , 2006, IEEE Technology and Society Magazine.

[11]  Francois Chan,et al.  Frequency Estimation of Uncooperative Coherent Pulse Radars , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[12]  Fredrik Bissmarck,et al.  Two imaging systems for positioning and navigation , 2017, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS).

[13]  Xin Li,et al.  Airborne vision-aided landing navigation system for fixed-wing UAV , 2014, 2014 12th International Conference on Signal Processing (ICSP).

[14]  Sofie Pollin,et al.  Key Technologies and System Trade-offs for Detection and Localization of Amateur Drones , 2017, IEEE Communications Magazine.

[15]  Manabu Gouko,et al.  Acquisition of Hovering by Actual UAV Using Reinforcement Learning , 2016, 2016 3rd International Conference on Information Science and Control Engineering (ICISCE).

[16]  Yue Zhao,et al.  Accurate Estimation the Scanning Cycle of the Reconnaissance Radar Based on a Single Unmanned Aerial Vehicle , 2017, IEEE Access.

[17]  A. Jannesari,et al.  A Simulation of UAV Power Optimization via Reinforcement Learning , 2019, ArXiv.

[18]  Miroslav Kratky,et al.  The non-destructive methods of fight against UAVs , 2017, 2017 International Conference on Military Technologies (ICMT).

[19]  A. Nemeth,et al.  Combined communication and radio navigation system for small UAVs , 2013, 2013 23rd International Conference Radioelektronika (RADIOELEKTRONIKA).

[20]  Xiaoguang Gao,et al.  Role analysis: The use case analysis extension for in-depth investigation of actor properties , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[21]  Fatih Erden,et al.  RSS-Based Q-Learning for Indoor UAV Navigation , 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM).

[22]  Ismail Güvenç,et al.  Indoor UAV Navigation to a Rayleigh Fading Source Using Q-Learning , 2017, ArXiv.

[23]  Guray Yilmaz,et al.  A novel fast and accurate algorithm for Terrain Referenced UAV localization , 2013, 2013 International Conference on Unmanned Aircraft Systems (ICUAS).

[24]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[25]  S. Harman Analysis of the radar return of micro-UAVs in flight , 2017, 2017 IEEE Radar Conference (RadarConf).

[26]  Jizhou Lai,et al.  Aerodynamic model/INS/GPS failure-tolerant navigation method for multirotor UAVs based on federated Kalman Filter , 2017, 2017 Chinese Automation Congress (CAC).

[27]  Wang Qiang,et al.  Reinforcement learning model, algorithms and its application , 2011, 2011 International Conference on Mechatronic Science, Electric Engineering and Computer (MEC).

[28]  Daojing He,et al.  Flight Security and Safety of Drones in Airborne Fog Computing Systems , 2018, IEEE Communications Magazine.