Synthesizing Secure Reactive Controller for Unmanned Aerial System

Complex CPS such as VAS got rapid development these years, but also became vulnerable to GPS spoofing, packets injection, buffer-overflow and other malicious attacks. Ensuring the behaviors of VAS always keeping secure no matter how the environment changes, would be a prospective direction for VAS security. This paper aims at presenting a reactive synthesisbased approach to implement the automatic generation of secure VAS controller. First, we study the operating mechanism of VAS and construct a high-Ievel model consisting of actuator and monitor. Besides, we analyze the security threats of VAS from the perspective of hardware, software and data transmission, and then extract the corresponding specifications of security properties with LTL formulas. Based on the VAS model and security specifications, the controller can be constructed by GR(l) synthesis algorithm, which is a two-player game process between VAV and Environment. Finally, we expand the function of LTLMoP platform to construct the automatons for controller in multi-robots system, which provides secure behavior strategies under several typical VAS attack scenarios.

[1]  Johann Schumann,et al.  R2U2: monitoring and diagnosis of security threats for unmanned aerial systems , 2017, Formal Methods in System Design.

[2]  Yuval Elovici,et al.  Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).

[3]  Robin R. Murphy,et al.  A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).

[4]  Hadas Kress-Gazit,et al.  LTLMoP: Experimenting with language, Temporal Logic and robot control , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[5]  Amir Pnueli,et al.  Synthesis of Reactive(1) designs , 2006, J. Comput. Syst. Sci..

[6]  Jens Palsberg,et al.  Verification, Model Checking, and Abstract Interpretation , 2018, Lecture Notes in Computer Science.

[7]  Jan Oliver Ringert,et al.  GR(1) synthesis for LTL specification patterns , 2015, ESEC/SIGSOFT FSE.

[8]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[9]  Martin Leucker,et al.  A brief account of runtime verification , 2009, J. Log. Algebraic Methods Program..

[10]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[11]  Vrizlynn L. L. Thing,et al.  Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[12]  Hadas Kress-Gazit,et al.  Temporal-Logic-Based Reactive Mission and Motion Planning , 2009, IEEE Transactions on Robotics.

[13]  Doina Bein,et al.  Securing unmanned autonomous systems from cyber threats , 2019 .

[14]  K.J. Kyriakopoulos,et al.  Automatic synthesis of multi-agent motion tasks based on LTL specifications , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[15]  Hoon-Jae Lee,et al.  An Overview of Unmanned Aerial Vehicle: Cyber Security Perspective , 2016 .

[16]  A. Pnueli,et al.  On the Synthesis of an Asynchronous Reactive Module , 1989, ICALP.