{"title":"Black-box Stealthy GPS Attacks on Unmanned Aerial Vehicles","authors":"Amir Khazraei, Haocheng Meng, Miroslav Pajic","doi":"arxiv-2409.11405","DOIUrl":null,"url":null,"abstract":"This work focuses on analyzing the vulnerability of unmanned aerial vehicles\n(UAVs) to stealthy black-box false data injection attacks on GPS measurements.\nWe assume that the quadcopter is equipped with IMU and GPS sensors, and an\narbitrary sensor fusion and controller are used to estimate and regulate the\nsystem's states, respectively. We consider the notion of stealthiness in the\nmost general form, where the attack is defined to be stealthy if it cannot be\ndetected by any existing anomaly detector. Then, we show that if the\nclosed-loop control system is incrementally exponentially stable, the attacker\ncan cause arbitrarily large deviation in the position trajectory by\ncompromising only the GPS measurements. We also show that to conduct such\nstealthy impactfull attack values, the attacker does not need to have access to\nthe model of the system. Finally, we illustrate our results in a UAV case\nstudy.","PeriodicalId":501175,"journal":{"name":"arXiv - EE - Systems and Control","volume":"40 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - EE - Systems and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.11405","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This work focuses on analyzing the vulnerability of unmanned aerial vehicles
(UAVs) to stealthy black-box false data injection attacks on GPS measurements.
We assume that the quadcopter is equipped with IMU and GPS sensors, and an
arbitrary sensor fusion and controller are used to estimate and regulate the
system's states, respectively. We consider the notion of stealthiness in the
most general form, where the attack is defined to be stealthy if it cannot be
detected by any existing anomaly detector. Then, we show that if the
closed-loop control system is incrementally exponentially stable, the attacker
can cause arbitrarily large deviation in the position trajectory by
compromising only the GPS measurements. We also show that to conduct such
stealthy impactfull attack values, the attacker does not need to have access to
the model of the system. Finally, we illustrate our results in a UAV case
study.