{"title":"Covert Attack Detection and Resilient Control of Quadcopter","authors":"Junhong Wang;Sicheng Zhou;Lidan Xu;Dong Zhao;Kexin Guo;Xiang Yu;Lei Guo","doi":"10.1109/TII.2025.3528579","DOIUrl":null,"url":null,"abstract":"This article addresses issues of covert attacks detection and resilient control of quadcopters. In the presence of generalized covert attacks characterized by strong stealth, passive detection techniques prove to be insufficient. Active detection methods are common solutions to this problem, but the balance between the detection capability and the stability of quadcopters still remains as a challenge. Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed. First, the design and detectability analysis of the coding-based attack detection method are given. Once covert attacks revealed, a secure channel is activated to replace the attacked channel. Second, to enhance quadcopter resilience against covert attacks, a resilient control framework is proposed. It incorporates attack effect estimation and compensation via a fixed-time observer. This framework maintains the stability of the quadcopter's control system under covert attacks. Finally, the numerical simulation and real-world experiments are conducted to evaluate the effectiveness and feasibility of the proposed scheme.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 5","pages":"3924-3933"},"PeriodicalIF":9.9000,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10891250/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article addresses issues of covert attacks detection and resilient control of quadcopters. In the presence of generalized covert attacks characterized by strong stealth, passive detection techniques prove to be insufficient. Active detection methods are common solutions to this problem, but the balance between the detection capability and the stability of quadcopters still remains as a challenge. Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed. First, the design and detectability analysis of the coding-based attack detection method are given. Once covert attacks revealed, a secure channel is activated to replace the attacked channel. Second, to enhance quadcopter resilience against covert attacks, a resilient control framework is proposed. It incorporates attack effect estimation and compensation via a fixed-time observer. This framework maintains the stability of the quadcopter's control system under covert attacks. Finally, the numerical simulation and real-world experiments are conducted to evaluate the effectiveness and feasibility of the proposed scheme.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.