Cross-Layer Retrofitting of UAVs Against Cyber-Physical Attacks

As a rapidly growing cyber-physical platform, unmanned aerial vehicles are facing more security threats as their capabilities and applications continue to expand. Adversaries with detailed knowledge about the vehicle could orchestrate sophisticated attacks that are not easily detected or handled by the vehicle's control system. In this work, we purpose a generic security framework, termed BlueBox, capable of detecting and handling a variety of cyber-physical attacks. To demonstrate an application of BlueBox in practice, we retrofitted an off-the-shelf quadcopter. A series of attacks were then launched by embedding malicious code in the control software and by altering the vehicle's hardware with the specific targeting of sensors, controller, motors, vehicle dynamics, and operating system. Experimental results verified that BlueBox was capable of both detecting a variety of cyber-physical attacks, while also providing the means in which to recover from such attacks.

[1]  Robert F. Stengel Intelligent failure-tolerant control , 1991 .

[2]  Saeid Habibi,et al.  The Smooth Variable Structure Filter , 2007, Proceedings of the IEEE.

[3]  Saeid Habibi,et al.  Parameter Identification for a High-Performance Hydrostatic Actuation System Using the Variable Structure Filter Concept , 2007 .

[4]  Guillermo Heredia,et al.  Sensor and actuator fault detection in small autonomous helicopters , 2008 .

[5]  Youmin Zhang,et al.  Fault tolerant control of a quadrotor UAV using sliding mode control , 2010, 2010 Conference on Control and Fault-Tolerant Systems (SysTol).

[6]  Inseok Hwang,et al.  A Survey of Fault Detection, Isolation, and Reconfiguration Methods , 2010, IEEE Transactions on Control Systems Technology.

[7]  M. Al-Shabi The General Toeplitz/Observability Smooth Variable Structure Filter , 2011 .

[8]  Quanyan Zhu,et al.  Robust and resilient control design for cyber-physical systems with an application to power systems , 2011, IEEE Conference on Decision and Control and European Control Conference.

[9]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[10]  Daniel P. Shepard,et al.  Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks , 2012 .

[11]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[12]  Xiangyu Zhang,et al.  PIEtrace: Platform independent executable trace , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[13]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[14]  Khaled S. Hatamleh,et al.  UAV dynamics model parameters estimation techniques: A comparison study , 2013, 2013 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies (AEECT).

[15]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[16]  H. Aguilar-Sierra,et al.  Fault Estimation for a Quad-Rotor MAV Using a Polynomial Observer , 2013, 2013 International Conference on Unmanned Aircraft Systems (ICUAS).

[17]  Raffaello D'Andrea,et al.  Stability and control of a quadrocopter despite the complete loss of one, two, or three propellers , 2014, 2014 IEEE International Conference on Robotics and Automation (ICRA).

[18]  Victor A. Skormin,et al.  Unmanned Aerial Vehicle security using Recursive parameter estimation , 2014 .

[19]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[20]  Guillaume Sanahuja,et al.  Fault diagnosis and fault-tolerant control strategy for rotor failure in an octorotor , 2015, 2015 IEEE International Conference on Robotics and Automation (ICRA).

[21]  Xiangyu Zhang,et al.  Dual Execution for On the Fly Fine Grained Execution Comparison , 2015, ASPLOS.

[22]  Aiko Pras,et al.  Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[23]  Ivan H. Beloev,et al.  A Review on Current and Emerging Application Possibilities for Unmanned Aerial Vehicles , 2016 .

[24]  Peng Liu,et al.  Exploiting Physical Dynamics to Detect Actuator and Sensor Attacks in Mobile Robots , 2017, ArXiv.