Combating the Control Signal Spoofing Attack in UAV Systems

04/18/2018
by   Ke-Wen Huang, et al.
0

Unmanned aerial vehicle (UAV) system is vulnerable to the control signal spoofing attack due to the openness of the wireless communications. In this correspondence, a physical layer approach is proposed to combat the control signal spoofing attack, i.e,. to determine whether the received control signal packet is from the ground control station (GCS) or a potential malicious attacker (MA), which does not need to share any secret key. We consider the worst case where the UAV does not have any prior knowledge about the MA. Utilizing the channel feature of the angles of arrival, the distance-based path loss, and the Rician-κ factor, we construct a generalized log-likelihood radio (GLLR) test framework to handle the problem. Accurate approximations of the false alarm and successful detection rate are provided to efficiently evaluate the performance.

READ FULL TEXT

page 1

page 2

page 4

research
01/03/2022

Deep Learning for GPS Spoofing Detection in Cellular Enabled Unmanned Aerial Vehicle Systems

Cellular-based Unmanned Aerial Vehicle (UAV) systems are a promising par...
research
12/09/2022

A systematic literature review on Security of Unmanned Aerial Vehicle Systems

Unmanned aerial vehicles (UAVs) are becoming more common, and their oper...
research
01/30/2023

GPS-Spoofing Attack Detection Mechanism for UAV Swarms

Recently autonomous and semi-autonomous Unmanned Aerial Vehicle (UAV) sw...
research
05/25/2021

Detection and blind channel estimation for UAV-aided wireless sensor networks in smart cities under mobile jamming attack

There exist several ways of integrating unmanned aerial vehicles (UAVs) ...
research
05/06/2022

UAV-aided Wireless Node Localization Using Hybrid Radio Channel Models

This paper considers the problem of ground user localization based on re...
research
07/16/2022

A Convolutional Attention Based Deep Network Solution for UAV Network Attack Recognition over Fading Channels and Interference

When users exchange data with Unmanned Aerial vehicles - (UAVs) over air...
research
11/08/2022

Spoofing Attack Detection in the Physical Layer with Commutative Neural Networks

In a spoofing attack, an attacker impersonates a legitimate user to acce...

Please sign up or login with your details

Forgot password? Click here to reset