Security Analysis against Spoofing Attacks for Distributed UAVs

Distributed unmanned systems are increasingly finding use in a variety of applications, viz. reconnaissance, disaster management, search and rescue, etc. Sensing and actuation are key for the correct operation of such systems, especially since they do not have centralized control. These types of distributed systems have shown to be susceptible to spoofing attacks, such as false data injection attacks (on sensor values) — either via Man-inthe-middle (MitM) mechanisms or counterfeit signal generation. While machine learning techniques have been used to detect anomalous behavior, it has not found use in this domain. In this paper we pose the following questions: (a) “how well does a feed-forward deep learning model perform in detecting sensor anomalies?” and (b) “how can we inflate the dataset to reduce the cost of collecting data?” The second question aims to assist with the process of generating data for training the deep learning models and we study the effectiveness of Generative Adversarial Networks (GANs) for this purpose. Using software-in-the-loop (SITL) simulations, we analyze the feasibility of learning the behavior an unmanned autonomous vehicle (UAV). We present our findings for both of these questions in this paper.

[1]  Daniel Svozil,et al.  Introduction to multi-layer feed-forward neural networks , 1997 .

[2]  Markus G. Kuhn,et al.  An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.

[3]  Dennis M. Akos,et al.  Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) , 2012 .

[4]  Todd E. Humphreys,et al.  Detection Strategy for Cryptographic GNSS Anti-Spoofing , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[5]  Andrew L. Maas Rectifier Nonlinearities Improve Neural Network Acoustic Models , 2013 .

[6]  Gary J. Balas,et al.  Model-Based and Data-Driven Fault Detection Performance for a Small UAV , 2013, IEEE/ASME Transactions on Mechatronics.

[7]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[8]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[9]  Yongdae Kim,et al.  Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors , 2015, USENIX Security Symposium.

[10]  Jonathon Shlens,et al.  Explaining and Harnessing Adversarial Examples , 2014, ICLR.

[11]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[12]  Westley Weimer,et al.  An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).

[13]  Srdjan Capkun,et al.  SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.

[14]  Léon Bottou,et al.  Wasserstein GAN , 2017, ArXiv.

[15]  Min Lin,et al.  Softmax GAN , 2017, ArXiv.

[16]  Machine-Learning Space Applications on SmallSat Platforms with TensorFlow , 2018 .

[17]  Insup Lee,et al.  Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors , 2018, USENIX Security Symposium.

[18]  K. Pattabiraman,et al.  Out of control: stealthy attacks against robotic vehicles protected by control-based techniques , 2019, ACSAC.