Securing a UAV using individual characteristics from an EEG signal

Unmanned aerial vehicles (UAVs) have been applied for both civilian and military applications; scientific research involving UAVs has encompassed a wide range of scientific study. However, communication with unmanned vehicles are subject to attack and compromise. Such attacks have been reported as early as 2009, when a Predator UAV's video stream was compromised. Since UAVs extensively utilize autonomous behavior, it is important to develop an autopilot system that is robust to potential cyber-attack. In this work, we present a biometric system to encrypt communication between a UAV and a computerized base station. This is accomplished by generating a key derived from the Beta component of a user's EEG. When communication with a UAV is attacked, a safety mechanism directs the UAV to a safe ‘home’ location. This system has been validated on a commercial UAV under malicious attack conditions.

[1]  B. Staehle,et al.  SENEKA - sensor network with mobile robots for disaster management , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[2]  Sébastien Marcel,et al.  Counter-measures to photo attacks in face recognition: A public database and a baseline , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[3]  Weihua Sheng,et al.  Dynamic target tracking and observing in a mobile sensor network , 2012, Robotics Auton. Syst..

[4]  Pei Huang,et al.  A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[5]  Shau-Yin Tseng,et al.  Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[6]  Weihua Sheng,et al.  Distributed Sensor Fusion for Scalar Field Mapping Using Mobile Sensor Networks , 2013, IEEE Transactions on Cybernetics.

[7]  Christine Evans-Pughe,et al.  Bzzzz zzz [ZigBee wireless standard] , 2003 .

[8]  Wojciech Sałabun,et al.  Processing and spectral analysis of the raw EEG signal from the MindWave , 2014 .

[9]  Mohammed A. Hannan,et al.  Traffic Sign Classification based on Neural Network for Advance Driver Assistance System , 2014 .

[10]  Flemming Nielson,et al.  ZigBee-2007 Security Essentials , 2008 .

[11]  Jiming Chen,et al.  Cooperative and active sensing in mobile sensor networks for scalar field mapping , 2013, 2013 IEEE International Conference on Automation Science and Engineering (CASE).

[12]  Thanh-Trung Han,et al.  Flocking of mobile robots by bounded feedback , 2016, 2016 IEEE International Conference on Automation Science and Engineering (CASE).

[13]  Weihua Sheng,et al.  Multirobot Cooperative Learning for Predator Avoidance , 2015, IEEE Transactions on Control Systems Technology.

[14]  Walid Saad,et al.  Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game , 2017, 2017 IEEE International Conference on Communications (ICC).

[15]  Thanh-Trung Han,et al.  Distributed flocking control of mobile robots by bounded feedback , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[16]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[17]  M.G. Ceruti,et al.  Application of Wireless Sensor Network to Military Information Integration , 2007, 2007 5th IEEE International Conference on Industrial Informatics.