Preview

Gyroscopy and Navigation

Advanced search

Fault Tolerant and Cyber Resilient Formation Control of Multiple UAVs

EDN: IFHKZN

Abstract

 In recent times, there has been a notable increase in the use of Unmanned Aerial Vehicles (UAVs) worldwide, driven by a growing demand for their versatile applications across various domains. However, alongside their beneficial applications, there has been a concerning emergence of malicious UAVs use by cyber criminals. These unauthorized activities pose significant risks, with the potential for destructive consequences. Consequently, there is a pressing need for the development and implementation of detection, protection, and prevention measures to mitigate these threats effectively. The primary objective of this paper is to explore the evolving risks associated with cyber-attacks in formation flights of UAVs, along with the corresponding countermeasures aimed at tolerating such threats. The work proposes a hybrid fault diagnosis scheme and fault-tolerant cooperative controllers for multiple UAVs under faults and cyber attacks. The proposed hybrid fault diagnosis scheme combines rule-based and model-based approaches. Three realistic attack scenarios are simulated including the Man-in-the-Middle attack and the GPS spoofing. The results show that the proposed scheme is able to ensure the safe operation of UAVs in the fleet by effectively diagnosing faults and enabling proactive measures to mitigate potential risks.

About the Authors

H. Shouib
Scientific Research Center in Engineering, Faculty of Engineering, Lebanese University, Hadath, Lebanon
Lebanon


M. Saied
Scientific Research Center in Engineering, Faculty of Engineering, Lebanese University; Faculty of Engineering, Lebanese International University, Bekaa, Lebanon
Lebanon


C. Francis
Arts et Métiers PariTech, Campus de Châlons en Champagne, France
France


H. Shraim
Scientific Research Center in Engineering, Faculty of Engineering, Lebanese University
Lebanon


Z. Noun
Faculty of Engineering, Lebanese International University
Lebanon


References

1. Ly, B. and Ly, R., Cybersecurity in unmanned aerial vehicles, Journal of Cyber Security Technology, 2021, vol. 5, no. 2, pp. 120–137, https://doi.org/10.1080/23742917.2020.1846307.

2. Guerrero, J., Flight Formation Control Strategies for Mini UAVs, in: Fight Formation Control, Guerrero, J., and Lozano, R., Eds, John Wiley & Sons Ltd, 2012, pp. 135–163, https://doi.org/10.1002/9781118387191.ch7.

3. Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., and Yi, W., An efficient UAV hijacking detection method using onboard inertial measurement unit, ACM Trans. Embed. Comput. Syst., 2018, vol. 17, no. 6, pp. 1–19, https://doi.org/10.1145/3289390.

4. Sindiramutty, S.R., Jhanjhi, N.Z., Tan, C.E., et al., Data security and privacy concerns in drone operations, in: Cybersecurity Issues and Challenges in the Drone Industry, IGI Global, 2024, pp. 236–290, https://doi.org/10.4018/979-8-3693-0774-8.ch010.

5. Chamola, V., Kotesh, P., Agarwal, A., Gupta, N., Naren, N., and Guizani, M., A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques, Ad Hoc Networks, 2021, vol. 111, p. 102324, https://doi.org/10.1016/j.adhoc.2020.102324.

6. Hoang, T.M., Nguyen, N.M., and Duong, T.Q., Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and K-means clustering, IEEE Wireless Communications Letters, 2020, vol. 9, no. 2, pp. 139–142, https://doi.org/10.1109/LWC.2019.2945022.

7. Leela Krishna, C.G., and Murphy, R.R., A review on cybersecurity vulnerabilities for unmanned aerial vehicles, IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR) (China, 2017), https://doi.org/10.1109/SSRR.2017.8088163.

8. Giray, S.M., Anatomy of unmanned aerial vehicle hijacking with signal spoofing, International Conference on Recent Advances in Space Technologies (RAST), (Istanbul, Turkey 2013), https://doi.org/10.1109/RAST.2013.6581320.

9. Dahiya, S., and Garg, M., Unmanned aerial vehicles: Vulnerability to cyber attacks, International Conference on Unmanned Aerial System in Geomatics, (India 2019), pp. 201–211, https://doi.org/10.1007/978-3-030-37393-1_18.

10. Alsuhli, G., Fahim, A., and Gadallah, Y., A survey on the role of UAVs in the communication process: A technological perspective, Computer Communications, 2022, vol. 194, pp. 86–123, https://doi.org/10.1016/j.comcom.2022.07.021.

11. Westerlund, O., and Asif, R., Drone hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and privacy threats for the Internet-of-Things, International Conference on Unmanned Vehicle Systems-Oman (UVS), (Muscat, Oman 2019), pp. 1–10, https://doi.org/10.1109/UVS.2019.8658279.

12. Han, B., Jiang, J., Cao, T., and Liu, J., Adaptive observer-based security formation control for multiple unmanned aerial vehicles under cyber-attacks, China Automation Congress (CAC), (Beijing, China 2021), https://doi.org/10.1109/CAC53003.2021.9728634.

13. Humphreys, T.E., Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing, Subcommittee on Oversight Investigations and Management of the House Committee on Homeland Security, 2012.

14. Seo, S.-H., Lee, B.-H., Im, S.-H., and Jee, G.-I., Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal, Journal of Positioning, Navigation, and Timing, 2015, vol. 4, no. 2, pp. 57–65, https://doi.org/10.11003/JPNT.2015.4.2.057.

15. Abbaspour, A., Yen, K., Noei, S., and Sargolzaei, A., Detection of fault data injection attack on UAV using adaptive neural network, Procedia Computer Science, 2016, vol. 95, pp. 193–200, https://doi.org/10.1016/j.procs.2016.09.312.

16. Sedjelmaci, H., Senouci, S.-M., and Messous, A., How to detect cyber-attacks in unmanned aerial vehicles network? Proc. IEEE Global Communications Conference (GLOBECOM), (Washington, DC, USA, 2016), https://doi.org/10.1109/GLOCOM.2016.7841878.

17. Tseng, C.Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., and Levitt, K., A specification-based intrusion detection system for AODV, ACM Workshop on Security of Ad Hoc and Sensor Networks, (Fairfax Virginia 2003), pp. 125–134, https://doi.org/10.1145/986858.986876.

18. Vaidya, V., Dynamic signature inspection-based network intrusion detection, Patent US6279113B1, 2001.

19. Patcha, A., and Park, J.-M., An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer networks, 2007, vol. 51, no. 12, pp. 3448–3470, https://doi.org/10.1016/j.comnet.2007.02.001.

20. Aydın, M.A., Zaim, A.H., and Ceylan, K.G., A hybrid intrusion detection system design for computer network security, Computers & Electrical Engineering, 2009, vol. 35, no. 3, pp. 517–526, https://doi.org/10.1016/j.compeleceng.2008.12.005.

21. Mitchell, R., and Chen, I.R., Specification-based intrusion detection for unmanned aircraft systems, First ACM MobiHoc Workshop on Airborne Networks and Communications, South Carolina USA, 2012, pp. 31–36, https://doi.org/10.1145/2248326.2248334.

22. Zomlot, L., Sundaramurthy, S.C., Luo, K., Ou, X., and Rajagopalan, S., Prioritizing intrusion analysis using Dempster-Shafer theory, ACM Workshop on Security and Artificial Intelligence, (Chicago Illinois USA, 2011), pp. 59–70, https://doi.org/10.1145/2046684.2046694.

23. Mitchell, R., and Chen, I.-R., Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2014, vol. 44, no. 5, pp. 593–604, https://doi.org/10.1109/TSMC.2013.2265083.

24. Yaacoub, J., Noura, H., Salman, O., and Chehab, A., Security analysis of drones systems: Attacks, limitations, and recommendations, Internet of Things, 2020, vol. 11, p. 100218, https://doi.org/10.1016/j.iot.2020.100218.

25. Yang, Y., Xiao, Y., and Li, T., Attacks on formation control for multiagent systems, IEEE Transactions on Cybernetics, 2022, vol. 52(120), pp. 12805–12817, https://doi.org/10.1109/TCYB.2021.3089375.

26. Gu, Y., Guo, K., Guo, L., Qiao, J., Jia, J., Yu, X., and Xie, L., An enhanced UAV safety control scheme against attacks on desired trajectory, Aerospace Science and Technology, 2021, vol. 119, p. 107212, https://doi.org/10.1016/j.ast.2021.107212.

27. Jadidi, S., Badihi, H., and Zhang, Y., Hybrid fault-tolerant and cyber-resilient control for PV system at microgrid framework, Annual Conference of the IEEE Industrial Electronics Society, Toronto, Canada, 2021, https://doi.org/10.1109/IECON48115.2021.9589054.

28. Saied, M., Shraim, H., and Francis, C., A review on recent development of multirotor UAV fault-tolerant control systems, IEEE Aerospace and Electronic Systems Magazine, 2024, vol. 39, no. 9, https://doi.org/10.1109/MAES.2023.3327697.

29. Hafez, A.T., and Kamel, M.A., Fault-tolerant control for cooperative unmanned aerial vehicles formation via fuzzy logic, International Conference on Unmanned Aircraft Systems (ICUAS), (Arlington, VA, USA, 2016), https://doi.org/10.1109/ICUAS.2016.7502660.

30. Karaboga, D., An Idea Based On Honey Bee Swarm for Numerical Optimization, Technical Report TR06, Kayseri, Turkey: Erciyes University, 2005.

31. Saied, M., Shraim, H., Mazeh, H., and Francis, C., Fault-tolerant control of a hexarotor unmanned aerial vehicle applying outdoor tests and experiments, IFAC-PapersOnLine, 2018, vol. 51(22), pp. 312–317, https://doi.org/10.1016/j.ifacol.2018.11.560.

32. Saied, M., Slim, M., Mazeh, H., Francis, C., and Shraim, H., Unmanned aerial vehicles fleet control via artificial bee colony algorithm, 4th Conference on Control and Fault Tolerant Systems (SysTol), Casablanca, Morocco, 2019, pp. 80–85, doi:10.1109/SYSTOL.2019.8864752.


Review

For citations:


Shouib H., Saied M., Francis C., Shraim H., Noun Z. Fault Tolerant and Cyber Resilient Formation Control of Multiple UAVs. Gyroscopy and Navigation. 2025;33(1):64-90. (In Russ.) EDN: IFHKZN

Views: 27


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 0869-7033 (Print)
ISSN 2075-0927 (Online)