Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit

Published: 08 December 2018 Publication History

Abstract

With the fast growth of civil drones, their security problems meet significant challenges. A commercial drone may be hijacked by a GPS-spoofing attack for illegal activities, such as terrorist attacks. The target of this article is to develop a technique that only uses onboard gyroscopes to determine whether a drone has been hijacked.
Ideally, GPS data and the angular velocities measured by gyroscopes can be used to estimate the acceleration of a drone, which can be further compared with the measurement of the accelerometer to detect whether a drone has been hijacked. However, the detection results may not always be accurate due to some calculation and measurement errors, especially when no hijacking occurs in curve trajectory situations. To overcome this, in this article, we propose a novel and simple method to detect hijacking only based on gyroscopes’ measurements and GPS data, without using any accelerometer in the detection procedure. The computational complexity of our method is very low, which is suitable to be implemented in the drones with micro-controllers. On the other hand, the proposed method does not rely on any accelerometer to detect attacks, which means it receives less information in the detection procedure and may reduce the results accuracy in some special situations. While the previous method can compensate for this flaw, the high detection results also can be guaranteed by using the above two methods. Experiments with a quad-rotor drone are conducted to show the effectiveness of the proposed method and the combination method.

References

[1]
Riham Altawy and Amr M. Youssef. 2016. Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems 1, 2 (2016), 7.
[2]
Ali Broumandan, Ali Jafarnia-Jahromi, and Gérard Lachapelle. 2015. Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solutions 19, 3 (2015), 475--487.
[3]
X. Chen, G. Lenzini, M. Martins, S. Mauw, and J. Pang. 2013. A trust framework for evaluating GNSS signal integrity. In Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium. 179--192.
[4]
DJI (company). 2017. Retrieved from https://en.wikipedia.org/wiki/DJI_(company).
[5]
Gabriel Hugh Elkaim, Fidelis Adhika Pradipta Lie, and Demoz Gebre-Egziabher. 2015. Principles of guidance, navigation, and control of UAVs. In Handbook of Unmanned Aerial Vehicles. Springer, 347--380.
[6]
S. Daneshmand et al. 2014. A GNSS structural interference mitigation technique using antenna array processing. In Proceedings of the 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop. 109--112.
[7]
Zhiwei Feng, Nan Guan, Mingsong Lv, Weichen Liu, Qingxu Deng, Xue Liu, and Wang Yi. 2017. Efficient drone hijacking detection using onboard motion sensors. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'17). IEEE, 1414--1419.
[8]
S. Khanafseh, N. Roshan, S. Langel, F. C. Chan, M. Joerger, and B. Pervan. 2014. GPS spoofing detection using RAIM with INS coupling. In Proceedings of the 2014 IEEE/ION Position, Location and Navigation Symposium. 1232--1239.
[9]
L3GD20H gyroscopes. 2017. L3GD20H gyroscopes. Retrieved from http://www.st.com/web/catalog/sense-power/FM89/SC1288/PF254039.
[10]
Brent M. Ledvina, William J. Bencze, Bryan Galusha, and Isaac Miller. 2010. An in-line anti-spoofing device for legacy civil GPS receivers. Institute of Navigation—International Technical Meeting 2010. (ITM’10). 868--882.
[11]
Wenjing Liang. 2017. Attitude Estimation of Quadcopter through Extended Kalman Filter. Ph.D. Dissertation. Lehigh University.
[12]
LSM303D accelerometers. 2017. LSM303D accelerometers. Retrieved from https://www.pololu.com/product/2127.
[13]
Joshua Mead, Christophe Bobda, and Taylor J. L. Whitaker. 2016. Defeating drone jamming with hardware sandboxing. In Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST’16). 1--6.
[14]
Wilbur L. Myrick, Michael Picciolo, J. Scott Goldstein, and Vernon Joyner. 2015. Multistage anti-spoof GPS interference correlator (MAGIC). In Proceedings of the IEEE Military Communications Conference. IEEE, 1497--1502.
[15]
NEO-M8N GPS system. 2017. NEO-M8N GPS system. Retrieved from https://www.u-blox.com/en/product/neo-m8qm8m-series.
[16]
PIXHAWK. 2017. PIXHAWK Project. Retrieved from https://pixhawk.org/
[17]
Mark L. Psiaki, Steven P. Powell, and Brady W. Ohanlon. 2013. GNSS spoofing detection using high-frequency antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting. 2949--2991.
[18]
PX4FMU. 2017. Archived: PX4FMU Overview. Retrieved from http://ardupilot.org/copter/docs/common-px4fmu-overview.html.
[19]
Aanjhan Ranganathan, Hildur Ólafsdóttir, and Srdjan Capkun. 2016. Spree: A spoofing resistant GPS receiver. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. ACM, 348--360.
[20]
Çağatay Tanıl, Samer Khanafseh, and Boris Pervan. 2017. Detecting global navigation satellite system spoofing using inertial sensing of aircraft disturbance. Journal of Guidance, Control, and Dynamics 40, 8 (2017), 2006--2016.
[21]
Brian P. Tice. 1991. Unmanned aerial vehicles: The force multiplier of the 1990s. Airpower Journal 5, 1 (1991), 41--55.
[22]
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 75--86.
[23]
Leen A. van Mastrigt, Ariën J. van der Wal, and Patrick J. Oonincx. 2015. Exploiting the Doppler effect in GPS to monitor signal integrity and to detect spoofing. In Proceedings of the 2015 International Association of Institutes of Navigation World Congress (IAIN). IEEE, 1--8.
[24]
Jon S. Warner and Roger G. Johnston. 2002. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration 25, 2 (2002), 19--27.
[25]
Dingbo Yuan, Hong Li, and Mingquan Lu. 2014. GNSS spoofing mitigation based on joint detection of code Doppler and carrier Doppler in acquisition. In Proceedings of the 2014 China Satellite Navigation Conference (CSNC): Volume I. Springer, 763--774.
[26]
Dingbo Yuan, Hong Li, and Mingquan Lu. 2014. A method for GNSS spoofing detection based on sequential probability ratio test. In Proceedings of the 2014 IEEE/ION Position, Location and Navigation Symposium (PLANS’14). IEEE, 351--358.

Cited By

View all
  • (2024)GPS Spoofing Detection on Autonomous Vehicles with XGBoost2024 9th International Conference on Computer Science and Engineering (UBMK)10.1109/UBMK63289.2024.10773593(500-505)Online publication date: 26-Oct-2024
  • (2024)A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoTIEEE Transactions on Industrial Informatics10.1109/TII.2023.324568120:2(1445-1454)Online publication date: Feb-2024
  • (2024)A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and CountermeasuresIEEE Internet of Things Journal10.1109/JIOT.2024.342911111:21(34826-34847)Online publication date: 1-Nov-2024
  • Show More Cited By

Index Terms

  1. An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 17, Issue 6
    November 2018
    186 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/3299750
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 08 December 2018
    Accepted: 01 October 2018
    Revised: 01 August 2018
    Received: 01 December 2017
    Published in TECS Volume 17, Issue 6

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cyber physical system
    2. GPS spoofing
    3. unmanned aerial vehicle

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Research Grants Council of Hong Kong
    • National Natural and Science Foundation of China
    • Open Research Fund from the State Key Laboratory of Rolling and Automation, Northeastern University (China)
    • China Scholarship Council

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)49
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)GPS Spoofing Detection on Autonomous Vehicles with XGBoost2024 9th International Conference on Computer Science and Engineering (UBMK)10.1109/UBMK63289.2024.10773593(500-505)Online publication date: 26-Oct-2024
    • (2024)A Trusted Edge Computing System Based on Intelligent Risk Detection for Smart IoTIEEE Transactions on Industrial Informatics10.1109/TII.2023.324568120:2(1445-1454)Online publication date: Feb-2024
    • (2024)A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and CountermeasuresIEEE Internet of Things Journal10.1109/JIOT.2024.342911111:21(34826-34847)Online publication date: 1-Nov-2024
    • (2024)Exploring Jamming and Hijacking Attacks for Micro Aerial DronesICC 2024 - IEEE International Conference on Communications10.1109/ICC51166.2024.10623000(1939-1944)Online publication date: 9-Jun-2024
    • (2024)Cybersecurity Testing in Drones Domain: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.349599412(171166-171184)Online publication date: 2024
    • (2024)An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4IEEE Access10.1109/ACCESS.2024.338254312(46668-46677)Online publication date: 2024
    • (2024)A survey on unmanned aerial systems cybersecurityJournal of Systems Architecture10.1016/j.sysarc.2024.103282156(103282)Online publication date: Nov-2024
    • (2024)GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density RatioJournal of Systems Architecture10.1016/j.sysarc.2024.103212153(103212)Online publication date: Aug-2024
    • (2024)Image-based intrusion detection system for GPS spoofing cyberattacks in unmanned aerial vehiclesAd Hoc Networks10.1016/j.adhoc.2024.103597163(103597)Online publication date: Oct-2024
    • (2024)Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data FusionAdvanced Intelligent Computing Technology and Applications10.1007/978-981-97-5606-3_25(294-305)Online publication date: 5-Aug-2024
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media