2016 International Conference on Unmanned Aircraft Systems (ICUAS) 2016
DOI: 10.1109/icuas.2016.7502663
|View full text |Cite
|
Sign up to set email alerts
|

Security of unmanned aerial vehicles: Dynamic state estimation under cyber-physical attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…where ( 23) is obtained by using 𝛾 n = 𝛾 * n in (9) under Framework AD-AI, and ( 23) is obtained by Jensen's Inequality in [24, Lemma 1 (h)] and noting the fact that g(X , …) is monotonically increasing with respect to X .…”
Section: 𝔼[Pmentioning
confidence: 99%
“…where ( 23) is obtained by using 𝛾 n = 𝛾 * n in (9) under Framework AD-AI, and ( 23) is obtained by Jensen's Inequality in [24, Lemma 1 (h)] and noting the fact that g(X , …) is monotonically increasing with respect to X .…”
Section: 𝔼[Pmentioning
confidence: 99%
“…In [19], Berntorp et al gave a high-level control architecture of autonomous vehicles, which includes motion planning, vehicle control, and actuator control along with sensing and mapping as major blocks. Petnga et al discuss a high-level architecture of a UAV reflecting the interactions between cyber (command, control, communication) and physical (sensors and actuators) components of these systems [20]. Based on these studies, we identify three major modules common to popular AS i) perception, ii) cognition, and iii) control.…”
Section: Autonomous System (As) Architecturementioning
confidence: 99%
“…Another way to detect that a jamming attack is happening is by setting a window and checking the rate of collision; if the rate becomes higher than normal, this would indicate that the system is under a jamming attack. The operator can then block the source of jamming attack [13]. Or adjust the transmission rate in order to contain jamming interference (Li et al 2007).…”
Section: Safeguards Ensuring Availabilitymentioning
confidence: 99%