Efficient drone hijacking detection using two-step GA-XGBoost

Abstract With the fast growth of civilian drones, their security problems meet significant challenges. A commercial drone may be hijacked by Global Positioning System (GPS)-spoofing attacks for illegal activities, such as terrorist attacks. Ideally, comparing positions respectively estimated by GPS and Inertial Navigation System (INS) can detect such attacks, while the results may always get fault because of the accumulated errors over time in INS. Therefore, in this paper, we propose a two-step GA-XGBoost method to detect GPS-spoofing attacks that just uses GPS and Inertial Measurement Unit (IMU) data. However, tunning the proper values of XGBoost parameters directly on the drone to achieve high prediction results consumes lots of resources which would influence the real-time performance of the drone. The proposed method separates the training phase into offboard step and onboard step. In offboard step, model is first trained by flight logs, and the training parameter values are automatically tuned by Genetic Algorithm (GA). Once the offboard model is trained, it could be uploaded to drones. To adapt our method to drones with different types of sensors and improve the correctness of prediction results, in onboard step, the model is further trained when a drone starts a mission. After onboard training finishes, the proposed method switches to the prediction mode. Besides, our method does not require any extra onboard hardware. The experiments with a real quadrotor drone also show the detection correctness is 96.3% and 100% in hijacked and non-hijacked cases at each sampling time respectively. Moreover, our method can achieve 100% detection correctness just within 1 s just after the attacks start.

[1]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[2]  Boris Pervan,et al.  Detecting Global Navigation Satellite System Spoofing Using Inertial Sensing of Aircraft Disturbance , 2017 .

[3]  Sabine Glesner,et al.  Comprehensible and dependable self-learning self-adaptive systems , 2018, J. Syst. Archit..

[4]  Domenico Pascarella,et al.  A SVM-based detection approach for GPS spoofing attacks to UAV , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).

[5]  Wang Yi,et al.  Efficient drone hijacking detection using onboard motion sensors , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[6]  Todd E. Humphreys,et al.  GNSS Signal Authentication Via Power and Distortion Monitoring , 2017, IEEE Transactions on Aerospace and Electronic Systems.

[7]  Brent M. Ledvina,et al.  An In-Line Anti-Spoofing Device for Legacy Civil GPS Receivers , 2010 .

[8]  Dahai Zhang,et al.  A Data-Driven Design for Fault Detection of Wind Turbines Using Random Forests and XGboost , 2018, IEEE Access.

[9]  Melanie Mitchell,et al.  An introduction to genetic algorithms , 1996 .

[10]  Mathieu Joerger,et al.  An INS Monitor to Detect GNSS Spoofers Capable of Tracking Vehicle Position , 2018, IEEE Transactions on Aerospace and Electronic Systems.

[11]  Gérard Lachapelle,et al.  Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation , 2018, Sensors.

[12]  Stefan Hauck-Stattelmann,et al.  Container-based architecture for flexible industrial control applications , 2018, J. Syst. Archit..

[13]  Mathieu Joerger,et al.  GPS spoofing detection using RAIM with INS coupling , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.

[14]  Mohammed Bahoura,et al.  Efficient FPGA-based architecture of an automatic wheeze detector using a combination of MFCC and SVM algorithms , 2018, J. Syst. Archit..

[15]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[16]  Olaf Spinczyk,et al.  Evolutionary planning of virtualized cyber-physical compute and control clusters , 2017, J. Syst. Archit..

[17]  Riham Altawy,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..

[18]  Christophe Bobda,et al.  Defeating drone jamming with hardware sandboxing , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).

[19]  Michael Picciolo,et al.  Multistage anti-spoof GPS interference correlator (MAGIC) , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[20]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[21]  Srdjan Capkun,et al.  SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.

[22]  Jörg Hähner,et al.  Interpolation in the eXtended Classifier System: An architectural perspective , 2017, J. Syst. Archit..

[23]  Wang Yi,et al.  An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit , 2018, ACM Trans. Embed. Comput. Syst..

[24]  Gérard Lachapelle,et al.  Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver , 2015, GPS Solutions.

[25]  Lui Sha,et al.  A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems , 2018, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[26]  Christoph Torens,et al.  Architectural design of a Safe Mission Manager for Unmanned Aircraft Systems , 2018, J. Syst. Archit..

[27]  Gustavo Marrero Callicó,et al.  SVM-based real-time hyperspectral image classifier on a manycore architecture , 2017, J. Syst. Archit..

[28]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.