Real-Time Safety Assessment of UAS against Stealthy Cyber Attacks

As UAS becomes an increasingly integral part of a wide range of applications, ensuring the security of these systems against malicious cyber attacks is a very important concern. To address this problem, this paper considers a controls domain approach extending beyond the computing resources of the UAS to include the underlying physical behavior of the compromised system, successfully complementing the traditional computer security architecture. Specifically, the focus is on the safety analysis of an unmanned aircraft system in the presence of stealthy cyber attacks, which can be designed intelligently to avoid detection.

Integrated UAS dynamics architecture

Cyber attack detection mechanism for the UAS

  • First, the system condition that confines the stealthy attacker’s capability is derived.
  • Then, a real-time safety assessment algorithm is developed based on a reachability analysis.

Compared to the existing research, the present algorithm analytically derives the exact reachable set, enabling more reliable and computationally efficient safety assessment.

UAS safety assessment via reachability analysis

Reachable set computation and examination algorithm for the UAS safety assessment

The proposed safety assessment algorithm is demonstrated by illustrative examples with different attack scenarios (please find the detailed results in the related publication)

  • No attack
  • Control acquisition attack
  • IMU attack
  • GPS attack
  • GPS-IMU combined attack

Related Publication

  • C. Kwon, S. Yantek, and I. Hwang, “Real-Time Safety Assessment of Unmanned Aircraft Systems against Stealthy Cyber Attacks”, AIAA Journal of Aerospace Information Systems,Vol.13(1), pp. 27-45, January 2016, doi: 10.2514/1.I010388