skip to main content


Title: The Pursuit and Evasion of Drones Attacking an Automated Turret
This paper investigates the pursuit-evasion problem of a defensive gun turret and one or more attacking drones. The turret must "visit" each attacking drone once, as quickly as possible, to defeat the threat. This constitutes a Shortest Hamiltonian Path (SHP) through the drones. The investigation considers situations with increasing fidelity, starting with a 2D kinematic model and progressing to a 3D dynamic model. In 2D we determine the region from which one or more drones can always reach a turret, or the region close enough to it where they can evade the turret. This provides optimal starting angles for n drones around a turret and the maximum starting radius for one and two drones.We show that safety regions also exist in 3D and provide a controller so that a drone in this region can evade the pan-tilt turret. Through simulations we explore the maximum range n drones can start and still have at least one reach the turret, and analyze the effect of turret behavior and the drones’ number, starting configuration, and behaviors.  more » « less
Award ID(s):
1849303 1553063
NSF-PAR ID:
10318011
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
2021 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This paper investigates the scheduling problem related to engaging a swarm of attacking drones with a single defensive turret. The defending turret must turn, with a limited slew rate, and remain facing a drone for a dwell time to eliminate it. The turret must eliminate all the drones in the swarm before any drone reaches the turret. In 2D, this is an example of a Traveling Salesman Problem with Time Windows (TSPTW) where the turret must visit each target during the window. In 2D, the targets and turret are restricted to a plane and the turret rotates with one degree of freedom. In 3D, the turret can pan and tilt, while the drones attempt to reach a safe zone anywhere along the vertical axis above the turret. This 3D movement makes the problem more challenging, since the azimuth angles of the turret to the drones vary as a function of time. This paper investigates the theoretical optimal solution for simple swarm configurations. It compares heuristic approaches for the path scheduling problem in 2D and 3D using a simulation of the swarm behavior. It provides results for an improved heuristic approach, the Threat-Aware Nearest Neighbor. 
    more » « less
  2. Robotics has emerged as one of the most popular subjects in STEM (Science, Technology, Engineering, and Mathematics) education for students in elementary, middle, and high schools, providing them with an opportunity to gain knowledge of engineering and technology. In recent years, flying robots (or drones) have also gained popularity as teaching tool to impart the fundamentals of computer programming to high school students. However, despite completing the programming course, students may still lack an understanding of the working principle of drones. This paper proposes an approach to teach students the basic principles of drone aeronautics through laboratory programming. This course was designed by professors from Vaughn College of Aeronautics and Technology for high school students who work on after-school and weekend programs during the school year or summer. In early 2021, the college applied for and was approved to offer a certificate program in UAS (Unmanned Aerial Systems) Designs, Applications, and Operations to college students by the Education Department of New York State. Later that year, the college also received a grant from the Federal Aviation Administration (FAA) to provide tuition-free early higher education for high school students, allowing them to complete the majority of the credits in the UAS certificate program while still enrolled in high school. The program aims to equip students with the hands-on skills necessary for successful careers as versatile engineers and technicians. Most of the courses in the certificate program are introductory or application-oriented, such as Introduction to Drones, Drone Law, Part 107 License, or Fundamentals of Land Surveying and Photogrammetry. However, one of the courses, Introduction to Drone Aeronautics, is more focused on the theory of drone flight and control. Organizing the lectures and laboratory of the course for high school students who are interested in pursuing the certificate can be a challenge. To create the Introduction to Drone Aeronautics course, a variety of school courses and online resources were examined. After careful consideration, the Robolink Co-drone [1] was chosen as the experimental platform for students to study drone flight, and control and stabilize a drone. However, developing a set of comprehensible lectures proved to be a difficult task. Based on the requirements of the certificate program, the lectures were designed to cover the following topics: (a) an overview of fundamentals of drone flight principles, including the forces acting on a drone such as lift, weight, drag, and thrust, as well as the selection of on-board components and trade-offs for proper payload and force balance; (b) an introduction to the proportional-integral-directive (PID) controller and its role in stabilizing a drone and reducing steady-state errors; (c) an explanation of the forces acting on a drone in different coordinates, along with coordinate transformations; and (d) an opportunity for students to examine the dynamic model of a 3D quadcopter with control parameters, but do not require them to derive the 3D drone dynamic equations. In the future, the course can be improved to cater to the diverse learning needs of the students. More interactive and accessible tools can be developed to help different types of students understand drone aeronautics. For instance, some students may prefer to apply mathematical skills to derive results, while others may find it easier to comprehend the stable flight of a drone by visualizing the continuous changes in forces and balances resulting from the control of DC motor speeds. Despite the differences in students’ mathematical abilities, the course has helped high school students appreciate that mathematics is a powerful tool for solving complex problems in the real world, rather than just a subject of abstract numbers. 
    more » « less
  3. While more and more consumer drones are abused in recent attacks, there is still very little systematical research on countering malicious consumer drones. In this paper, we focus on this issue and develop effective attacks to common autopilot control algorithms to compromise the flight paths of autopiloted drones, e.g., leading them away from its preset paths. We consider attacking an autopiloted drone in three phases: attacking its onboard sensors, attacking its state estimation, and attacking its autopilot algorithms. Several firstphase attacks have been developed (e.g., [1]–[4]); second-phase attacks (including our previous work [5], [6]) have also been investigated. In this paper, we focus on the third-phase attacks. We examine three common autopilot algorithms, and design several attacks by exploiting their weaknesses to mislead a drone from its preset path to a manipulated path. We present the formal analysis of the scope of such manipulated paths. We further discuss how to apply the proposed attacks to disrupt preset drone missions, such as missing a target in searching an area or misleading a drone to intercept another drone, etc. Many potential attacks can be built on top of the proposed attacks. We are currently investigating different models to apply such attacks on common drone missions and also building prototype systems on ArduPilot for real world tests. We will further investigate countermeasures to address the potential damages. 
    more » « less
  4. null (Ed.)
    As 5G systems are starting to be deployed and becoming part of many daily life applications, there is an increasing interest on the security of the overall system as 5G network architecture is significantly different than LTE systems. For instance, through application specific virtual network slices, one can trigger additional security measures depending on the sensitivity of the running application. Drones utilizing 5G could be a perfect example as they pose several safety threats if they are compromised. To this end, we propose a stronger authentication mechanism inspired from the idea of second-factor authentication in IT systems. Specifically, once the primary 5G authentication is executed, a specific slice can be tasked to trigger a second-factor authentication utilizing different factors from the primary one. This trigger mechanism utilizes the re-authentication procedure as specified in the 3GPP 5G standards for easy integration. Our second-factor authentication uses a special challenge-response protocol, which relies on unique drone digital ID as well as a seed and nonce generated from the slice to enable freshness. We implemented the proposed protocol in ns-3 that supports mmWave-based communication in 5G. We demonstrate that the proposed protocol is lightweight and can scale while enabling stronger security for the drones. 
    more » « less
  5. null (Ed.)
    Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public safety circumstances including post-disaster recovery of destroyed communication infrastructure. For instance, drones are temporarily positioned within an affected area to create a wireless mesh network among public safety personnel. To serve the need for high-rate video-based damage assessment, drone-assisted communication can utilize high- bandwidth millimeter wave (mmWave) technologies such as IEEE 802.11ad. However, short-range mmWave communication makes it hard for optimally- positioned drones to be authenticated with a centralized network control center. Therefore and assuming that there are potential imposters, we propose two lightweight and fast authentication mechanisms that take into account the physical limitations of mmWave communication. First, we propose a drone-to-drone authentication mechanism, which is based on proxy signatures from a control center. Accordingly, any newly joining drone can authenticate itself to an exist one rather than attempting to authenticate to the outof-reach control center. Second, we propose a drone-to- ground authentication mechanism, to enable each drone to authenticate itself to its associated ground users. Such authentication approach is based on challenge-response broadcast type, and it is still utilizing fast proxy signature approach. The evaluation of the proposed authentication mechanisms, conducted using NS-3 implementation of IEEE 802.11ad protocol, show their efficiency and practicality. 
    more » « less