2019
DOI: 10.1016/j.conengprac.2018.10.022
|View full text |Cite
|
Sign up to set email alerts
|

Detection and mitigation of actuator attacks on small unmanned aircraft systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…As the system used only a few behavior indicators, the system is weak and fails to withstand cyberattacks on UAVs. In [39], Muniraj et al proposed a mitigation mechanism for UAVs against cyber attacks such as actuatorbased attacks. In this work, only actuator-based attacks are handled to protect the UAVs from hijacking.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As the system used only a few behavior indicators, the system is weak and fails to withstand cyberattacks on UAVs. In [39], Muniraj et al proposed a mitigation mechanism for UAVs against cyber attacks such as actuatorbased attacks. In this work, only actuator-based attacks are handled to protect the UAVs from hijacking.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, Blue et al detected (audible) command injections by identifying a frequency band which is produced by electronic speakers, but is absent in human speech [153]. In fact, detecting unique features of the sensed property is a common defense mechanism for general sensor manipulation attacks, such as those against Smart Grid power plants [156], [157], or unmanned aircraft systems [148]. However, such approaches require a theoretical system model, and assume an adversary who cannot inject data obeying this model.…”
Section: B Other Defensive Approachesmentioning
confidence: 99%
“…Kune et al [78] adopt this principle and design a defense where some investigative actuation is cast on cardiac tissues, and cardiac signal readings are compared to their expected values. Similarly, Muniraj et al [191] propose an "active detection" method where judiciously designed excitation signals are superimposed on control commands, thus leading to a set of acceptable behavior for the system. Then the sensor will probe the environment, and the aforementioned effect is expected to be reflected in the sensor measurements if the system functions normally.…”
Section: A Physical-domain Defensementioning
confidence: 99%