2020
DOI: 10.1016/j.automatica.2019.108655
|View full text |Cite
|
Sign up to set email alerts
|

Secure trajectory planning against undetectable spoofing attacks

Abstract: This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker. In particular, we consider a robot moving in a two-dimensional space and equipped with two sensors, namely, a Global Navigation Satellite System (GNSS) sensor and a Radio Signal Strength Indicator (RSSI) sensor. The attacker can arbitrarily spoof the readings of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(14 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Reference [6] addresses the use of game theoretic methods to compute locally optimal solutions in presence of attacks and known bounds on disturbances applied to GPS-spoofing of a linear dynamical system. Reference [7] The authors are with the Department of Electrical and Computer Engineering at Michigan State University, East Lansing, MI, USA. Emails: baniksan@msu.edu; shaunak@egr.msu.edu determine a secure trajectory for a robot (autonomous vehicle) when moving a source to a destination and characterize conditions under which attack remains undetected.…”
Section: A Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Reference [6] addresses the use of game theoretic methods to compute locally optimal solutions in presence of attacks and known bounds on disturbances applied to GPS-spoofing of a linear dynamical system. Reference [7] The authors are with the Department of Electrical and Computer Engineering at Michigan State University, East Lansing, MI, USA. Emails: baniksan@msu.edu; shaunak@egr.msu.edu determine a secure trajectory for a robot (autonomous vehicle) when moving a source to a destination and characterize conditions under which attack remains undetected.…”
Section: A Related Literaturementioning
confidence: 99%
“…Theorem 3.1: Consider the dynamic game with stopping states modeled using equation (7), ∀k ∈ {1, 2, . .…”
Section: Dynamic Game With Stopping Statesmentioning
confidence: 99%
“…The incorporation of learning into control, however, enlarges the attack surface of the underlying system and creates opportunities for the adversaries. Adversarial parties can launch attacks such as Denial-of-Service attacks (DoS) [7], [8], False Data Injection (FDI) attacks [9], [10], spoofing attacks [11], [12] on the communication channels, and data poisoning attacks [13], [14] on the existing dataset to mislead the agent and sabotage the underlying system. Such attacks if not dealt with properly can lead to a catastrophe to the underlying system.…”
Section: Introductionmentioning
confidence: 99%
“…17 Recently, the concepts of zero-dynamic attacks and undetectable attacks have been extended to uncertain cyber-physical systems 18 and applied to the secure trajectory planning in adversarial environments. 19 Compared with strictly stealthy attacks, generalized stealthy attacks are more practical due to the resource limitations of attackers. The Kullback-Leibler divergence (KLD), measuring the distance between two probability distributions, is a widely used attack stealthiness index independent of detection methods.…”
Section: Introductionmentioning
confidence: 99%