DC Field | Value | Language |
---|---|---|
dc.contributor.author | Negash, Lebsework | ko |
dc.contributor.author | Kim, Sang Hyeon | ko |
dc.contributor.author | Choi, Han-Lim | ko |
dc.date.accessioned | 2017-10-23T02:37:42Z | - |
dc.date.available | 2017-10-23T02:37:42Z | - |
dc.date.created | 2017-10-16 | - |
dc.date.created | 2017-10-16 | - |
dc.date.issued | 2017-10 | - |
dc.identifier.citation | JOURNAL OF AEROSPACE INFORMATION SYSTEMS, v.14, no.10, pp.551 - 565 | - |
dc.identifier.issn | 1940-3151 | - |
dc.identifier.uri | http://hdl.handle.net/10203/226612 | - |
dc.description.abstract | In this paper, cyberattack detection and isolation is studied for a network of formation-flying unmanned aerial vehicles. As the unmanned aerial vehicles communicate to reach consensus on their states while making the formation, the communication network among the unmanned aerial vehicles makes them vulnerable to a potential attack from malicious adversaries. Two types of attacks pertinent to a network of unmanned aerial vehicles have been considered: a node attack on the unmanned aerial vehicles and a deception attack on the communication between the unmanned aerial vehicles. Unmanned aerial vehicle formation control involves using a consensus algorithm to maintain a prespecified formation. Two kinds of cyberattacks in the unmanned aerial vehicle network (node and communication path deception) are considered with their respective models in the formation setup. A bank of unknown input observer-based distributed fault detection schemes as well as with a rule based on residual generated using the bank of unknown input observers are proposed to detect the attacks and to identify the compromised unmanned aerial vehicle in the formation. Furthermore, an algorithm is developed to remove the faulty unmanned aerial vehicle from the network and to keep the compromised unmanned aerial vehicle isolated once an attack is detected, while maintaining the flight formation with a missing unmanned aerial vehicle node. | - |
dc.language | English | - |
dc.publisher | AMER INST AERONAUTICS ASTRONAUTICS | - |
dc.subject | STEALTHY CYBER ATTACKS | - |
dc.subject | FAULT-DETECTION | - |
dc.subject | MULTIAGENT SYSTEMS | - |
dc.subject | POWER-SYSTEMS | - |
dc.subject | CONSENSUS | - |
dc.subject | DIAGNOSIS | - |
dc.subject | NETWORKS | - |
dc.subject | DESIGN | - |
dc.subject | SAFETY | - |
dc.subject | AGENTS | - |
dc.title | Distributed Observes for Cyberattack Detection and Isolation in Formation-Flying Unmanned Aerial Vehicles | - |
dc.type | Article | - |
dc.identifier.wosid | 000411806100003 | - |
dc.identifier.scopusid | 2-s2.0-85030167318 | - |
dc.type.rims | ART | - |
dc.citation.volume | 14 | - |
dc.citation.issue | 10 | - |
dc.citation.beginningpage | 551 | - |
dc.citation.endingpage | 565 | - |
dc.citation.publicationname | JOURNAL OF AEROSPACE INFORMATION SYSTEMS | - |
dc.identifier.doi | 10.2514/1.I010531 | - |
dc.contributor.localauthor | Choi, Han-Lim | - |
dc.description.isOpenAccess | N | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordPlus | STEALTHY CYBER ATTACKS | - |
dc.subject.keywordPlus | FAULT-DETECTION | - |
dc.subject.keywordPlus | MULTIAGENT SYSTEMS | - |
dc.subject.keywordPlus | POWER-SYSTEMS | - |
dc.subject.keywordPlus | CONSENSUS | - |
dc.subject.keywordPlus | DIAGNOSIS | - |
dc.subject.keywordPlus | NETWORKS | - |
dc.subject.keywordPlus | DESIGN | - |
dc.subject.keywordPlus | SAFETY | - |
dc.subject.keywordPlus | AGENTS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.