Distributed Observes for Cyberattack Detection and Isolation in Formation-Flying Unmanned Aerial Vehicles

Cited 6 time in webofscience Cited 0 time in scopus
  • Hit : 346
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorNegash, Lebseworkko
dc.contributor.authorKim, Sang Hyeonko
dc.contributor.authorChoi, Han-Limko
dc.date.accessioned2017-10-23T02:37:42Z-
dc.date.available2017-10-23T02:37:42Z-
dc.date.created2017-10-16-
dc.date.created2017-10-16-
dc.date.issued2017-10-
dc.identifier.citationJOURNAL OF AEROSPACE INFORMATION SYSTEMS, v.14, no.10, pp.551 - 565-
dc.identifier.issn1940-3151-
dc.identifier.urihttp://hdl.handle.net/10203/226612-
dc.description.abstractIn this paper, cyberattack detection and isolation is studied for a network of formation-flying unmanned aerial vehicles. As the unmanned aerial vehicles communicate to reach consensus on their states while making the formation, the communication network among the unmanned aerial vehicles makes them vulnerable to a potential attack from malicious adversaries. Two types of attacks pertinent to a network of unmanned aerial vehicles have been considered: a node attack on the unmanned aerial vehicles and a deception attack on the communication between the unmanned aerial vehicles. Unmanned aerial vehicle formation control involves using a consensus algorithm to maintain a prespecified formation. Two kinds of cyberattacks in the unmanned aerial vehicle network (node and communication path deception) are considered with their respective models in the formation setup. A bank of unknown input observer-based distributed fault detection schemes as well as with a rule based on residual generated using the bank of unknown input observers are proposed to detect the attacks and to identify the compromised unmanned aerial vehicle in the formation. Furthermore, an algorithm is developed to remove the faulty unmanned aerial vehicle from the network and to keep the compromised unmanned aerial vehicle isolated once an attack is detected, while maintaining the flight formation with a missing unmanned aerial vehicle node.-
dc.languageEnglish-
dc.publisherAMER INST AERONAUTICS ASTRONAUTICS-
dc.subjectSTEALTHY CYBER ATTACKS-
dc.subjectFAULT-DETECTION-
dc.subjectMULTIAGENT SYSTEMS-
dc.subjectPOWER-SYSTEMS-
dc.subjectCONSENSUS-
dc.subjectDIAGNOSIS-
dc.subjectNETWORKS-
dc.subjectDESIGN-
dc.subjectSAFETY-
dc.subjectAGENTS-
dc.titleDistributed Observes for Cyberattack Detection and Isolation in Formation-Flying Unmanned Aerial Vehicles-
dc.typeArticle-
dc.identifier.wosid000411806100003-
dc.identifier.scopusid2-s2.0-85030167318-
dc.type.rimsART-
dc.citation.volume14-
dc.citation.issue10-
dc.citation.beginningpage551-
dc.citation.endingpage565-
dc.citation.publicationnameJOURNAL OF AEROSPACE INFORMATION SYSTEMS-
dc.identifier.doi10.2514/1.I010531-
dc.contributor.localauthorChoi, Han-Lim-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordPlusSTEALTHY CYBER ATTACKS-
dc.subject.keywordPlusFAULT-DETECTION-
dc.subject.keywordPlusMULTIAGENT SYSTEMS-
dc.subject.keywordPlusPOWER-SYSTEMS-
dc.subject.keywordPlusCONSENSUS-
dc.subject.keywordPlusDIAGNOSIS-
dc.subject.keywordPlusNETWORKS-
dc.subject.keywordPlusDESIGN-
dc.subject.keywordPlusSAFETY-
dc.subject.keywordPlusAGENTS-
Appears in Collection
AE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 6 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0