Defending UAV Networks Against Covert Attacks Using Auxiliary Signal Injections

IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automation Science and Engineering Pub Date : 2024-11-11 DOI:10.1109/TASE.2024.3489609
Xianghua Wang;Chee Pin Tan;Youqing Wang;Xiangrong Wang
{"title":"Defending UAV Networks Against Covert Attacks Using Auxiliary Signal Injections","authors":"Xianghua Wang;Chee Pin Tan;Youqing Wang;Xiangrong Wang","doi":"10.1109/TASE.2024.3489609","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicle (UAV) networks, which carry vital information, are prone to various attacks, and hence security issues are a major concern. In this paper, we design and implement a novel covert attack detection and secure control scheme, which operates between the UAV (the physical layer) and ground control station (GCS) (the cyber layer). Covert attacks can alter the UAV states, and yet cause the signals seen by the controller to appear unchanged, resulting in these attacks being more difficult to detect, and hence more dangerous compared to other types of attacks. To unmask the covert attacks, we construct and inject auxiliary signals to both the controller output and the UAV input. The auxiliary signals cause information of the attack to appear in the controller input, which is then fed to a detection observer to detect the attack. Next, we propose an integrated estimation and secure control scheme, comprising a reconstruction observer (which is a sliding mode observer (SMO)) that estimates the system states and attack signal, and an output-feedback controller that utilizes the estimated signals. We perform a series of transformations to the system, such that the design parameters of both reconstruction observer and secure controller are placed in a framework that is solvable using Linear Matrix Inequalities (LMIs). We also prove that the proposed integrated secure controller causes the output tracking errors to satisfy an <inline-formula> <tex-math>${{\\mathcal {H}}}_{\\infty }$ </tex-math></inline-formula> performance index. We also rigorously analyze the system performance, and present the necessary conditions for the scheme to be feasible. Finally, simulations are conducted to verify the effectiveness of the proposed scheme. Note to Practitioners—This paper presents a method to detect covert attacks in the UAV network, and to mitigate against those attacks. Covert attacks are more malicious since they are difficult to detect. The proposed method in this paper consists of auxiliary signal injection and a detection observer that will expose and detect the attacks, and a reconstruction observer and secure controller that will estimate the attacks and mitigate its effect on the plant. The controller and observers are designed using Linear Matrix Inequalities to minimize the <inline-formula> <tex-math>${{\\mathcal {H}}}_{\\infty }$ </tex-math></inline-formula> gain from the attack on the plant performance. In addition, this paper also investigates the conditions that the plant must satisfy such that the proposed scheme is feasible, and presents them in an easily verifiable form. Finally, the paper also analyses the performance of the proposed scheme in all scenarios - namely before the attack occurs, when the attack occurs but is not yet detected, and after the attack is detected.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"8805-8817"},"PeriodicalIF":6.4000,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10750142/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Unmanned aerial vehicle (UAV) networks, which carry vital information, are prone to various attacks, and hence security issues are a major concern. In this paper, we design and implement a novel covert attack detection and secure control scheme, which operates between the UAV (the physical layer) and ground control station (GCS) (the cyber layer). Covert attacks can alter the UAV states, and yet cause the signals seen by the controller to appear unchanged, resulting in these attacks being more difficult to detect, and hence more dangerous compared to other types of attacks. To unmask the covert attacks, we construct and inject auxiliary signals to both the controller output and the UAV input. The auxiliary signals cause information of the attack to appear in the controller input, which is then fed to a detection observer to detect the attack. Next, we propose an integrated estimation and secure control scheme, comprising a reconstruction observer (which is a sliding mode observer (SMO)) that estimates the system states and attack signal, and an output-feedback controller that utilizes the estimated signals. We perform a series of transformations to the system, such that the design parameters of both reconstruction observer and secure controller are placed in a framework that is solvable using Linear Matrix Inequalities (LMIs). We also prove that the proposed integrated secure controller causes the output tracking errors to satisfy an ${{\mathcal {H}}}_{\infty }$ performance index. We also rigorously analyze the system performance, and present the necessary conditions for the scheme to be feasible. Finally, simulations are conducted to verify the effectiveness of the proposed scheme. Note to Practitioners—This paper presents a method to detect covert attacks in the UAV network, and to mitigate against those attacks. Covert attacks are more malicious since they are difficult to detect. The proposed method in this paper consists of auxiliary signal injection and a detection observer that will expose and detect the attacks, and a reconstruction observer and secure controller that will estimate the attacks and mitigate its effect on the plant. The controller and observers are designed using Linear Matrix Inequalities to minimize the ${{\mathcal {H}}}_{\infty }$ gain from the attack on the plant performance. In addition, this paper also investigates the conditions that the plant must satisfy such that the proposed scheme is feasible, and presents them in an easily verifiable form. Finally, the paper also analyses the performance of the proposed scheme in all scenarios - namely before the attack occurs, when the attack occurs but is not yet detected, and after the attack is detected.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用辅助信号注入防御无人机网络遭受隐蔽攻击
携带重要信息的无人机(UAV)网络容易受到各种攻击,因此安全问题是一个主要问题。本文设计并实现了一种新型的隐蔽攻击检测和安全控制方案,该方案在无人机(物理层)和地面控制站(GCS)(网络层)之间运行。隐蔽攻击可以改变无人机状态,但导致控制器看到的信号看起来没有变化,导致这些攻击更难以检测,因此与其他类型的攻击相比更危险。为了揭露隐蔽攻击,我们构造并注入辅助信号到控制器输出和无人机输入。辅助信号使攻击信息出现在控制器输入中,然后将其馈送到检测观察者以检测攻击。接下来,我们提出了一个集成的估计和安全控制方案,包括一个估计系统状态和攻击信号的重建观测器(这是一个滑模观测器(SMO))和一个利用估计信号的输出反馈控制器。我们对系统进行了一系列的变换,使得重构观测器和安全控制器的设计参数被放置在一个使用线性矩阵不等式(lmi)可解的框架中。我们还证明了所提出的集成安全控制器使输出跟踪误差满足${{\mathcal {H}}}_{\infty }$性能指标。并对系统性能进行了严格的分析,提出了方案可行的必要条件。最后通过仿真验证了所提方案的有效性。从业人员注意:本文提出了一种检测无人机网络中的隐蔽攻击并减轻这些攻击的方法。隐蔽攻击的恶意更大,因为它们很难被发现。本文提出的方法包括辅助信号注入和检测观测器,用于暴露和检测攻击,以及重建观测器和安全控制器,用于估计攻击并减轻其对植物的影响。控制器和观测器的设计使用线性矩阵不等式,以最小化${{\mathcal {H}}}_{\infty }$从攻击对工厂性能的增益。此外,本文还研究了使所提方案可行的电厂必须满足的条件,并以易于验证的形式提出了这些条件。最后,本文还分析了该方案在攻击发生前、攻击发生但未被检测到时和攻击被检测到后三种情况下的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automation Science and Engineering
IEEE Transactions on Automation Science and Engineering 工程技术-自动化与控制系统
CiteScore
12.50
自引率
14.30%
发文量
404
审稿时长
3.0 months
期刊介绍: The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.
期刊最新文献
Guest Editorial: Special Issue on the 2024 IEEE International Conference on Automation Science and Engineering Optimizing Timetable Scheduling: A Smart Local Search Approach with Aspiration and Random Moves Strategies Meta-AWARE: Meta-Learning-based Automatic Weighted Augmentation for Regression Enhancement in Soft Sensor Applications Observer-based predefined-time adaptive robust control of nonlinear time-delay systems with different power Hamiltonian functions Intelligent Connected Vehicles Platoon Control Under a Zero-Trust Framework: An Event-triggered Intermittent Control Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1