skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Path Planning for UAVs Under GPS Permanent Faults
Unmanned aerial vehicles (UAVs) have various applications in different settings, including e.g., surveillance, packet delivery, emergency response, data collection in the Internet of Things (IoT), and connectivity in cellular networks. However, this technology comes with many risks and challenges such as vulnerabilities to malicious cyber-physical attacks. This paper studies the problem of path planning for UAVs under GPS sensor permanent faults in a cyber-physical system (CPS) perspective. Based on studying and analyzing the CPS architecture of the UAV, the cyber “attacks and threats” are differentiated from attacks on sensors and communication components. An efficient way to address this problem is to introduce a novel approach for UAV’s path planning resilience to GPS permanent faults artificial potential field algorithm (RCA-APF). The proposed algorithm completes the three stages in a coordinated manner. In the first stage, the permanent faults on the GPS sensor of the UAV are detected, and the UAV starts to divert from its initial path planning. In the second stage, we estimated the location of the UAV under GPS permanent fault using Received Signal Strength (RSS) trilateration localization approach. In the final stage of the algorithm, we implemented the path planning of the UAV using an open-source UAV simulator. Experimental and simulation results demonstrate the performance of the algorithm and its effectiveness, resulting in efficient path planning for the UAV.  more » « less
Award ID(s):
2333980 2221875
PAR ID:
10499408
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
ACM
Date Published:
Journal Name:
ACM Transactions on Cyber-Physical Systems
ISSN:
2378-962X
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    Unmanned aerial vehicles (UAVs) suffer from sensor drifts in GPS denied environments, which can lead to potentially dangerous situations. To avoid intolerable sensor drifts in the presence of GPS spoofing attacks, we propose a safety constrained control framework that adapts the UAV at a path re-planning level to support resilient state estimation against GPS spoofing attacks. The attack detector is used to detect GPS spoofing attacks and provides a switching criterion between the robust control mode and emergency control mode. An attacker location tracker (ALT) is developed to track the attacker's location and estimate the spoofing device's output power by the unscented Kalman filter (UKF) with sliding window outputs. Using the estimates from ALT, we design an escape controller (ESC) based on the model predictive controller (MPC) such that the UAV escapes from the effective range of the spoofing device within the escape time. 
    more » « less
  2. Modern advances in unmanned aerial vehicle (UAV) technology have widened the scope of commercial and military applications. However, the increased dependency on wireless communications exposes UAVs to potential attacks and introduces new threats, especially from UAVs designed with the malicious intent of targeting vital infrastructures. Significant efforts have been made from researchers and other United States (U.S.) Department of Defense (DoD) agencies for developing countermeasures for detection, interception, or destruction of the malicious UAVs. One promising countermeasure is the use of a counter UAV (CUAV) swarm to detect, track, and neutralize the malicious UAV. This paper aims to recognize the state-of-the-art swarm intelligence algorithms for achieving cooperative capture of a mobile target UAV. The major design and implementation challenges for swarm control, algorithm architecture, and safety protocols are considered. A prime challenge for UAV swarms is a robust communication infrastructure to enable accurate data transfer between UAVs for efficient path planning. A multi-agent deep reinforcement learning approach is applied to train a group of CUAVs to intercept a faster malicious UAV, while avoiding collisions among other CUAVs and non-cooperating obstacles (i.e. other aerial objects maneuvering in the area). The impact of the latency incurred through UAV-to-UAV communications is showcased and discussed with preliminary numerical results. 
    more » « less
  3. This paper introduces a novel approach to enhance the docking mechanism of sensor packages deployed on bridges using unmanned aerial vehicles (UAVs). The current electropermanent magnet (EPM) system faces challenges in achieving efficient and stable docking due to factors such as airflow, GPS stabilization, and the time required for EPM activation. To address these issues, a biased EPM design is proposed, utilizing additional permanent magnets to achieve neutral buoyancy during UAV deployment. This design optimally balances the weight of the drone and sensor package, providing advantages such as improved stability against external factors and reduced pilot fatigue. Experimental results demonstrate the feasibility of the proposed design, indicating enhanced hold force and an extended range for efficient docking. 
    more » « less
  4. The adoption of digital technology in industrial control systems (ICS) enables improved control over operation, ease of system diagnostics and reduction in cost of maintenance of cyber physical systems (CPS). However, digital systems expose CPS to cyber-attacks. The problem is grave since these cyber-attacks can lead to cascading failures affecting safety in CPS. Unfortunately, the relationship between safety events and cyber-attacks in ICS is ill-understood and how cyber-attacks can lead to cascading failures affecting safety. Consequently, CPS operators are ill-prepared to handle cyber-attacks on their systems. In this work, we envision adopting Explainable AI to assist CPS oper-ators in analyzing how a cyber-attack can trigger safety events in CPS and then interactively determining potential approaches to mitigate those threats. We outline the design of a formal framework, which is based on the notion of transition systems, and the associated toolsets for this purpose. The transition system is represented as an AI Planning problem and adopts the causal formalism of human reasoning to asssit CPS operators in their analyses. We discuss some of the research challenges that need to be addressed to bring this vision to fruition. 
    more » « less
  5. NA (Ed.)
    Unmanned aerial vehicles (UAVs) are prone to several cyber-attacks, including global positioning system (GPS) spoofing. The use of machine learning and deep learning are becoming increasingly common for UAV GPS spoofing attack detection; however, these approaches have some limitations, such as a high rate of false alarm and misdetection. We propose using capsule networks to detect and classify UAV-focused GPS spoofing attacks. This paper compares simple capsule networks, efficient capsule networks, dual attention capsule networks, and convolutional neural network in terms of accuracy, probability of detection, probability of misdetection, probability of false alarm, prediction time, training time per sample, and memory size. The results indicate that the Efficient-capsule network outperforms the other models, as demonstrated by an accuracy of 99.1%, a probability of detection of 99.9%, a probability of misdetection of 0.1%, a probability of false alarm of 0.37%, a prediction time of 0.5 seconds, a training time per sample of 0.2 seconds, and a memory size of 123 mebibytes for binary classification. 
    more » « less