Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Path Planning for UAVs under GPS Permanent Faults

Published: 29 July 2024 Publication History

Abstract

Unmanned aerial vehicles (UAVs) have various applications in different settings, including for example, surveillance, packet delivery, emergency response, data collection in the Internet of Things (IoT), and connectivity in cellular networks. However, this technology comes with many risks and challenges such as vulnerabilities to malicious cyber-physical attacks. This article studies the problem of path planning for UAVs under GPS sensor permanent faults in a cyber-physical system (CPS) perspective. Based on studying and analyzing the CPS architecture of the UAV, the cyber “attacks and threats” are differentiated from attacks on sensors and communication components. An efficient way to address this problem is to introduce a novel approach for UAV’s path planning resilience to cyber-attack artificial potential field (RCA-APF) algorithm. The proposed algorithm completes the three stages in a coordinated manner. In the first stage, the permanent faults on the GPS sensor of the UAV are detected, and the UAV starts to divert from its initial path planning. In the second stage, we estimated the location of the UAV under GPS permanent fault using received signal strength (RSS) trilateration localization approach. In the final stage of the algorithm, we implemented the path planning of the UAV using an open source UAV simulator. Experimental and simulation results demonstrate the performance of the algorithm and its effectiveness, resulting in efficient path planning for the UAV.

References

[1]
Nabil Adam. 2010. Workshop on future directions in cyber-physical systems security. In Proceedings of the U.S. Department of Homeland Security (DHS ’14). 1–61. Retrieved from http://feihu.eng.ua.edu/NSF_CPS/year1/w2_read.pdf
[2]
Akram Al-Hourani, Sithamparanathan Kandeepan, and Abbas Jamalipour. 2014. Modeling air-to-ground path loss for low altitude platforms in urban environments. In Proceedings of the IEEE Global Communications Conference (GLOBECOM ’14). Institute of Electrical and Electronics Engineers Inc., 2898–2904. DOI:
[3]
Alvaro A. Cárdenas, Saurabh Amin, and Shankar Sastry. 2008. Secure control: Towards survivable cyber-physical systems. In Proceedings of the International Conference on Distributed Computing Systems. 495–500. DOI:
[4]
Yiu Tong Chan, Herman Yau Chin Hang, and Pak Chung Ching. 2006. Exact and approximate maximum likelihood localization algorithms. IEEE Transactions on Vehicular Technology 55, 1 (Jan. 2006), 10–16. DOI:
[5]
Cheng Chang and Anant Sahai. 2004. Estimation bounds for localization. In Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON ’04). 415–424. DOI:
[6]
Isadora G. Ferrao, Sherlon A. Da Silva, Daniel F. Pigatto, and Kalinka R. L. J. C. Branco. 2020. GPS spoofing: Detecting GPS fraud in unmanned aerial vehicles. In Proceedings of the Latin American Robotics Symposium, 2020 Brazilian Symposium on Robotics and 2020 Workshop on Robotics in Education (LARS-SBR-WRE ’20). 1–6. DOI:
[7]
Rong Xiao Guo, Ji Wei Tian, Bu Hong Wang, and Fu Te Shang. 2020. Cyber-physical attack threats analysis for UAVs from CPS perspective. In Proceedings of the International Conference on Computer Engineering and Application (ICCEA ’20). Institute of Electrical and Electronics Engineers Inc., 259–263. DOI:
[8]
Ismail Güvenc and Chia Chin Chong. 2009. A survey on TOA based wireless localization and NLOS mitigation techniques. IEEE Communications Surveys and Tutorials 11, 3 (2009), 107–124. DOI:
[9]
Majumder Haider, Imtiaz Ahmed, and Danda B. Rawat. 2022. Cyber threats and cybersecurity reassessed in UAV-assisted cyber physical systems. In Proceedings of the International Conference on Ubiquitous and Future Networks (ICUFN ’22). IEEE Computer Society, 222–227. DOI:
[10]
Yoshiyuki Harada, Yoriyuki Yamagata, Osamu Mizuno, and Eun-Hye Choi. 2017. Log-based anomaly detection of CPS using a statistical method. In Proceedings of the 8th International Workshop on Empirical Software Engineering in Practice (IWESEP ’17). IEEE, 1–6.
[11]
Di Jin, Feng Yin, Carsten Fritsche, Fredrik Gustafsson, and Abdelhak M. Zoubir. 2020. Bayesian cooperative localization using received signal strength with unknown path loss exponent: Message passing approaches. IEEE Transactions on Signal Processing 68 (2020), 1120–1135. DOI:
[12]
Oussama Khatib. 1985. Real-time obstacle avoidance for manipulators and mobile robots. In Proceedings of the IEEE International Conference on Robotics and Automation. 500–505. DOI:
[13]
Tng T. Kim and H. Vincent Poor. 2011. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2, 2 (2011), 326–333. DOI:
[14]
Praveen Kumar, Lohith Reddy, and Shirshu Varma. 2009. Distance measurement and error estimation scheme for RSSI based localization in wireless sensor networks. In Proceedings of the 5th International Conference on Wireless Communication and Sensor Networks (WCSN ’09). 80–83. DOI:
[15]
Cheolhyeon Kwon, Weiyi Liu, and Inseok Hwang. 2013. Security analysis for cyber-physical systems against stealthy deception attacks. In Proceedings of the American Control Conference. 3344–3349. DOI:
[16]
Mengyu Liu, Lin Zhang, Pengyuan Lu, Kaustubh Sridhar, Fanxin Kong, Oleg Sokolsky, and Insup Lee. 2022. Fail-safe: Securing cyber-physical systems against hidden sensor attacks. In Proceedings of the IEEE Real-Time Systems Symposium (RTSS ’22). IEEE, 240–252.
[17]
Yuan Luo, Ya Xiao, Long Cheng, Guojun Peng, and Danfeng Yao. 2021. Deep learning-based anomaly detection in cyber-physical systems: Progress and opportunities. ACM Computing Surveys (CSUR) 54, 5 (2021), 1–36.
[18]
Cheng Ma, Jinglei Li, Ying Shang, Shuai Zhang, and Qinghai Yang. 2022. A dynamic obstacle avoidance control algorithm for distributed multi-UAV formation system. In Proceedings of the IEEE International Conference on Mechatronics and Automation (ICMA ’22). Institute of Electrical and Electronics Engineers Inc., 876–881. DOI:
[19]
Richard K. Martin, Amanda Sue King, Jason R. Pennington, Ryan W. Thomas, Russell Lenahan, and Cody Lawyer. 2012. Modeling and mitigating noise and nuisance parameters in received signal strength positioning. IEEE Transactions on Signal Processing 60, 10 (2012), 5451–5463. DOI:
[20]
Daniel Mendes, Naghmeh Ivaki, and Henrique Madeira. 2019. Effects of GPS spoofing on unmanned aerial vehicles. In Proceedings of the IEEE Pacific Rim International Symposium on Dependable Computing (PRDC’18). IEEE Computer Society, 155–160. DOI:
[21]
Mohammad Mozaffari, Walid Saad, Mehdi Bennis, and Mérouane Debbah. 2016. Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs. IEEE Transactions on Wireless Communications 15, 6 (Jun. 2016), 3949–3963. DOI:
[22]
Abdelmoumen Norrdine. 2012. An algebraic solution to the multilateration problem. In Proceedings of the 2012 International Conference on Indoor Positioning and Indoor Navigation. (13–15 November 2012), 1–4. DOI:
[23]
Miroslav Pajic, James Weimer, Nicola Bezzo, Paulo Tabuada, Oleg Sokolsky, Insup Lee, and George J. Pappas. 2014. Robustness of attack-resilient state estimators. In Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS ’14). 163–174. DOI:
[24]
Junkil Park, Radoslav Ivanov, James Weimer, Miroslav Pajic, Sang Hyuk Son, and Insup Lee. 2017. Security of cyber-physical systems in the presence of transient sensor faults. ACM Transactions on Cyber-Physical Systems 1, 3, Article 15 (May 2017), 23 pages. DOI:
[25]
Shamsur Rahman and You Ze Cho. 2018. UAV positioning for throughput maximization. EURASIP Journal on Wireless Communications and Networking 2018, 1 (Dec. 2018), 1–15. DOI:
[26]
Mohd Ezanee Rusli, Mohammad Ali, Norziana Jamil, and Marina Md Din. 2016. An improved indoor positioning algorithm based on RSSI-trilateration technique for internet of things (IOT). In Proceedings of the 6th International Conference on Computer and Communication Engineering: Innovative Technologies to Serve Humanity (ICCCE ’16). Institute of Electrical and Electronics Engineers Inc., 12–77. DOI:
[27]
Fernando Seco, Antonio R. Jiménez, Carlos Prieto, Javier Roa, and Katerina Koutsou. 2009. A survey of mathematical methods for indoor localization. In Proceedings of the 6th IEEE International Symposium on Intelligent Signal Processing (WISP ’09). 9–14. DOI:
[28]
Bingbing Song, Haiyang Chen, Jiashun Suo, and Wei Zhou. 2022. Low-power robustness learning framework for adversarial attack on edges. In Proceedings of the 18th International Conference on Mobility, Sensing and Networking (MSN ’22). 821–828. DOI:
[29]
Mohamad Hani Sulieman, Mustafa Cenk Gursoy, and Fanxin Kong. 2021. Antenna pattern aware UAV trajectory planning using artificial potential field. In Proceedings of the AIAA/IEEE Digital Avionics Systems Conference (DASC ’21). Institute of Electrical and Electronics Engineers Inc., 1–7. DOI:
[30]
Jiayi Sun, Jun Tang, and Songyang Lao. 2017. Collision avoidance for cooperative UAVs with optimized artificial potential field algorithm. IEEE Access 5 (2017), 18382–18390. DOI:
[31]
Jiwei Tian, Buhong Wang, Rongxiao Guo, Zhen Wang, Kunrui Cao, and Xiaodong Wang. 2021. Adversarial attacks and defenses for deep learning-based unmanned aerial vehicles. IEEE Internet of Things Journal 9, 22 (2021), 22399–22409. DOI:
[32]
Jiwei Tian, Buhong Wang, Rongxiao Guo, Zhen Wang, Kunrui Cao, and Xiaodong Wang. 2022. Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles. IEEE Internet of Things Journal 9, 22 (Nov. 2022), 22399–22409. DOI:
[33]
Chafiq Titouna and Farid Naït-Abdesselam. 2021. A lightweight security technique for unmanned aerial vehicles against GPS spoofing attack. In Proceedings of the International Wireless Communications and Mobile Computing (IWCMC ’21). Institute of Electrical and Electronics Engineers Inc., 819–824. DOI:
[34]
Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, and Kevin Fu. 2017. WALNUT: Waging doubt on the integrity of MEMS accelerometers with acoustic injection attacks. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (EuroS and P ’17). Institute of Electrical and Electronics Engineers Inc., 3–18. DOI:
[35]
Haichao Wang, Jin Chen, Guoru Ding, and Jiachen Sun. 2018a. Trajectory planning in UAV communication with jamming. In Proceedings of the 10th International Conference on Wireless Communications and Signal Processing (WCSP ’18). Institute of Electrical and Electronics Engineers Inc., 1–6. DOI:
[36]
Haichao Wang, Guochun Ren, Jin Chen, Guoru Ding, and Yijun Yang. 2018b. Unmanned aerial vehicle-aided communications: Joint transmit power and trajectory optimization. IEEE Wireless Communications Letters 7, 4 (2018), 522–525. DOI:
[37]
Shenqing Wang, Jiang Wang, Chunhua Su, and Xinshu Ma. 2020. Intelligent detection algorithm against Uavs’ GPS spoofing attack. In Proceedings of the International Conference on Parallel and Distributed Systems (ICPADS ’20). 382–389. DOI:
[38]
Xueyuan Wang and M. Cenk Gursoy. 2022. Resilient UAV path planning for data collection under adversarial attacks. In Proceedings of the IEEE International Conference on Communications (ICC ’22). Institute of Electrical and Electronics Engineers Inc., 625–630. DOI:
[39]
Anthony J. Weiss. 2003. On the accuracy of a cellular location system based on RSS measurements. IEEE Transactions on Vehicular Technology 52, 6 (Nov. 2003), 1508–1518. DOI:
[40]
Qingqing Wu, Yong Zeng, and Rui Zhang. 2018. Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Transactions on Wireless Communications 17, 3 (Mar. 2018), 2109–2121. DOI:
[41]
Jiaping Xiao and Mir Feroskhan. 2022. Cyber attack detection and isolation for a quadrotor UAV with modified sliding innovation sequences. IEEE Transactions on Vehicular Technology 71, 7 (Jul. 2022), 7202–7214. DOI:
[42]
Zhiqiang Xiao and Yong Zeng. 2022. An overview on integrated localization and communication towards 6G. arXiv:2006.01535. Retrieved from
[43]
Jie Yang and Yingying Chen. 2009. Indoor localization using improved RSS-based lateration methods. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM ’09). 1–6. DOI:
[44]
Zheng Yang, Zimu Zhou, and Yunhao Liu. 2013. From RSSI to CSI: Indoor localization via channel response. Computing Surveys 46, 2 (Dec. 2013), 1–32. DOI:
[45]
Qingfeng Yao, Zeyu Zheng, Liang Qi, Haitao Yuan, Xiwang Guo, Ming Zhao, Zhi Liu, and Tianji Yang. 2020. Path planning method with improved artificial potential field—A reinforcement learning perspective. IEEE Access 8 (2020), 135513–135523. DOI:
[46]
Esen Yel and Nicola Bezzo. 2020. GP-based runtime planning, learning, and recovery for safe UAV operations under unforeseen disturbances. In Proceedings of the IEEE International Conference on Intelligent Robots and Systems (IROS ’20). Institute of Electrical and Electronics Engineers Inc., 2173–2180. DOI:
[47]
Seyed A. Reza Zekavat and Michael Buehrer. 2011. Handbook of Position Location: Theory, Practice, and Advances. John Wiley & Sons. DOI:
[48]
Yong Zeng and Rui Zhang. 2017. Energy-efficient UAV communication with trajectory optimization. IEEE Transactions on Wireless Communications 16, 6 (Jun. 2017), 3747–3760. DOI:
[49]
Hang Zhang and Fei Luo. 2022. An improved UAV path planning method based on APSOvnp-APF algorithm. In Proceedings of the 34th Chinese Control and Decision Conference (CCDC ’22). Institute of Electrical and Electronics Engineers Inc., 5458–5463. DOI:
[50]
Lin Zhang, Zifan Wang, Mengyu Liu, and Fanxin Kong. 2022. Adaptive window-based sensor attack detection for cyber-physical systems. In Proceedings of the 59th ACM/IEEE Design Automation Conference (DAC ’22). Institute of Electrical and Electronics Engineers Inc., 919–924.
[51]
Long Zhang, Hui Zhao, Shuai Hou, Zhen Zhao, Haitao Xu, Xiaobo Wu, Qiwu Wu, and Ronghui Zhang. 2019. A survey on 5G millimeter wave communications for UAV-assisted wireless networks. IEEE Access 7 (Jul. 2019), 117460–117504. DOI:

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 8, Issue 3
July 2024
211 pages
EISSN:2378-9638
DOI:10.1145/3613667
  • Editor:
  • Chenyang Lu
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 29 July 2024
Online AM: 20 March 2024
Accepted: 29 February 2024
Revised: 22 January 2024
Received: 19 April 2023
Published in TCPS Volume 8, Issue 3

Check for updates

Author Tags

  1. Permanent faults
  2. unmanned aerial vehicles
  3. path planning
  4. artificial potential field
  5. received signal strength (RSS) trilateration localization

Qualifiers

  • Research-article

Funding Sources

  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 228
    Total Downloads
  • Downloads (Last 12 months)228
  • Downloads (Last 6 weeks)22
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media