Sei sulla pagina 1di 14

J Intell Robot Syst (2016) 84:107–120

DOI 10.1007/s10846-015-0284-1

Unmanned Aerial Vehicle Security Using Recursive


Parameter Estimation
Zachary Birnbaum · Andrey Dolgikh ·
Victor Skormin · Edward O’Brien ·
Daniel Muller · Christina Stracquodaine

Received: 11 December 2014 / Accepted: 28 September 2015 / Published online: 20 October 2015
© Springer Science+Business Media Dordrecht 2015

Abstract The proliferation of Unmanned Aerial of cyber attacks and incipient hardware failures that
Vehicles (UAVs) brings about many new security con- can invariably jeopardize mission success. The results
cerns. A common concern with UAV security is for demonstrate that achieving efficient anomaly detec-
an intruder to take control of a UAV, which leads tion during flight is possible through the application
for a need for a real time anomaly detection system. of statistical methods to profile system behavior. The
This research resulted in a prototype UAV monitor- anomaly detection system that was designed can be
ing system that captures flight data, and then performs performed in real time while the UAV is in flight,
real time estimation and tracking of the airframe and constantly verifying its parameters.
controller parameters. The aforementioned is done
by utilizing the Recursive Least Squares Method Keywords Unmanned aerial vehicle · Security ·
(RLSM). Using statistical validation and trend analy- Parameter estimation · Safety
sis, parameter estimates are critical for the detection

1 Introduction
Z. Birnbaum · A. Dolgikh · V. Skormin ·
E. O’Brien () · D. Muller · C. Stracquodaine
Electrical and Computer Engineering, Binghamton
Unmanned Aerial Vehicles (UAVs) are aircrafts with-
University Binghamton, NY, USA out a human pilot aboard. They are commonly used
e-mail: eobrien8@binghamton.edu for military operations but are increasing their role
Z. Birnbaum in a number of civil applications [1]. The number of
e-mail: zbrinba1@binghamton.edu UAVs has increased drastically over the years. Since
A. Dolgikh 2011, the number of countries which are involved with
e-mail: adolgik1@binghamton.edu UAV production has increased by 30 %, model vari-
V. Skormin eties of UAVs rose by 20 %, and military applications
e-mail: vskromin@binghamton.edu rose by 40 % [2]. UAVs are an ever-increasing devel-
D. Muller opment since they are able to perform tasks without
e-mail: dmuller5@binghamton.edu human casualty. Researchers in many difference dis-
C. Stracquodaine ciplines are constantly trying to find new ways to use
e-mail: cstracq2@binghamton.edu UAVs [3]. There are many ways which UAVs may be
108 J Intell Robot Syst (2016) 84:107–120

used in today’s society, such as search and rescue, law An attack against the Flight Control Com-
enforcement, firefighting, weather forecasting, and puter could result in the adulteration of flight con-
communications [4]. trol laws by jeopardizing communication onboard
The widespread use of UAVs brings about an abun- the UAV, and could result in the change of mis-
dance of security concerns. One major concern is for sion parameters. An appropriate defense against this
the UAV’s sensing and avoidance capabilities; this is type of attack can be determined by the specifics
an area in which improved flight reliability is greatly of the onboard hardware and software. This may
needed and is in development [5]. Another major con- include real-time estimation of the controller status
cern is the data integrity and health monitoring of a and the flight plan based on the available sensor
UAV, which could prevent a UAV from falling from data.
the sky, flying to an unauthorized location, or having An attack against the Navigation Sensors could
its mission monitored by an intruder [6, 7]. result in a loss of positional information or in the
In this paper a system for health monitoring and receiving of modified or misleading feedback infor-
security evaluation of UAVs is put forth. This sys- mation. An example of this would be the onboard
tem is able to operate in real time and can accurately GPS sensors being attacked with various spoofing
estimate the UAV control laws and airframe param- techniques as evidenced by Shepard et al. in [11].
eters. This system can detect immediate changes in Attacks against the Communications Channel on
the critical UAV parameters due to a cyber attack or a the UAV could result in a loss of communication with
hardware failure. the ground control station, or in malicious commands
being sent to and accepted by the UAVs. Current
UAVs used by the U.S. military accept only encrypted
2 Threat Model commands, making this a difficult attack method
for military drones. However, most civilian UAVs
We propose UAV threat modes as the following: use unencrypted communication links which make
sending false and malicious data a viable possibility
Malicious Hardware is a threat in which part of the [12].
UAV’s hardware has been tampered with so that it will Attacks against the Ground Control Station
behave in a way which is not specified by its design- (GCS) are against a computer running dedicated soft-
ers. This is a recent attack method which assumes ware to control and communicate with the UAV. A
that the hardware was tampered with to accomplish a successful attack would enable an attacker to send
specific goal, ranging from failing under a certain set erroneous or malicious commands to the UAV. This
of conditions, to the exfiltration of data. One recent is the most difficult attack method to detect from
example of this type of attack happened when more the UAV because the UAV has no way to ver-
than one hundred thousand computers were bugged ify if the GCS has been compromised. Although
with monitoring devices to conduct surveillance [10]. it is possible to implement multiple ground station
authentication techniques, many civilian UAVs and
Hardware Failure is when there is a malfunction in ground control systems do not support this scheme
either the UAV’s mechanical or electronic system, [13, 14].
which leads to an inability of the UAV to complete
its mission. This can occur for many reasons such as
battlefield damage, general wear, and environmental 3 Contributions
factors. It is extremely important that in the event of a
hardware failure, any damage that is done to the UAV This paper focuses on addressing the first three types
is minimized. This safeguarding is possible by utiliz- of attacks: hardware failure, malicious hardware,
ing existing adaptive control algorithms [8, 9]. In the and attacks against the flight control computer. Our
event of hardware failure, the UAV should take action approach is the development of a system that monitors
accordingly. UAV behavior and detects the aforementioned attacks.
J Intell Robot Syst (2016) 84:107–120 109

This system utilizes the following technologies: step t, t = kt, and y(t), V (t) turn into y(k),
V (k).
• Automatic detection of changes in UAV airframe To adopt this method for our needs, we define the
dynamics indicative of mechanical degradation input vector as a concatenation of vectors containing
• Automatic detection of changes in UAV flight system inputs and outputs
control law indicative of cyber attacks
• Real time anomaly detection system which V (k) = [u1 (k) u2 (k) , . . . um (k) , x1 (k) x2 (k) , . . . xn (k)]T
detects deviations in UAV parameters (1)

where
4 Approach
k = 1, 2, . . . N is the discrete-time index,
Our approach relies on the ability to identify and ui (k) − i-th input i ∈ 1..m
track flight dynamics of the UAV. We use the Recur- xj (k) − j-th output j ∈ 1..n
sive Least Squares (RLS) method to identify imme-
diate values of system parameters and detect devi- For our flight model, we can choose to monitor
ations from their nominal values. Since the change all available flight data including roll, pitch, yaw,
of the flight dynamics is usually caused by incipient elevator, throttle, rudder, aileron, and GPS location.
mechanical failures or ice buildup, we can use the RLS The N-th step of RLS procedure is outlined in
method to identify these conditions. Fig. 1.
In a similar way, flight controller parameters may where:
change unexpectedly from cyber attack, software
bugs, or electronics failure. By monitoring flight con-
A0 represents the initial values of the estimated
troller parameters, we can detect if the controller
parameters (nominal parameter values are uti-
behaves according to the design specifications.
lized).
P0 is the covariance matrix of vector V (t)
4.1 Recursive Least Squares
I is the identity matrix
KN represents the Kalman Gain
This method offers a recursive modification of the
Least Squares procedure ideal for real-time estimation
In the following sections, we will show how the
and tracking of system parameters based on continual
RLS method can be applied to UAV parameter estima-
measurements of relevant input/output signals.
tion. We present the application of RLS to state space
The RLS method is well described in [15]. The
parameter estimation and as an aspect of our anomaly
RLS procedure is a numerically efficient algorithm
detection system.
that enables estimation and tracking of the parame-
ters A of a linear equation y (t) = V (t) A, where
y(t) represents the output variable and V (t) is the vec-
tor of input variables. At each time step, separated by
a constant t, the procedure acquires two new mea-
surements, y (t) and V (t), and updates the previously
obtained parameter estimation Â(t − 1), i.e. computes
Â(t). With reasonable initial conditions and enough
samples, the sequence of parameter estimates, Â(t),
t =1,2,3,... will eventually converge to the “true”
parameter values ATRUE . A finite-memory version of
the RLS procedure allows for tracking time-dependent
parameters ATRUE (t). Note that for a constant time Fig. 1 Recursive least squares procedure implementation
110 J Intell Robot Syst (2016) 84:107–120

4.2 State Space Parameter Estimation Y (t) = CX(t) (5)

A dynamic system, such as an UAV, can be described


in the matrix-vector format [16]. The following consti- U (t) = R(t) − F X(t) (6)
tutes an open-loop system description that represents
where:
the propertied of the airframe (no feedback controller
in the loop). F is a matrix containing the parameters of the state-
X(t + 1) = QX(t) + BU (t) (2) variable controller,
R is the reference signal for the control loop, con-
sistent with desired flight path or aircraft position,
Y (t) = CX(t) (3)
The fundamental matrix for the closed-loop system
where:
in that case can be written as:
t = 1,2,3,... is discrete time index,
QCL = Q − BF (7)
X (t) = [x1 (t) x2 (t) x3 (t) . . . xm (t)]T represents
the state vector of the system comprising m state Using the RLS method enables us to estimate matrix
variables, Q and matrix B of the airframe, matrix QCL and
Y (t) = [y1 (t) y2 (t) y3 (t) . . . yn (t)]T represents finally matrix F of the state-variable controller.
the output vector of the system, Consider j -th state Eq. 2:
U (t) = [u1 (t) u2 (t) u3 (t) . . . uk (t)]T represents m k
an input vector containing control efforts and exter- xj (t + 1) = qj i xi (t) + bj i ui (t),
i=1 i=1
nal forcing functions.
assume
Q is a m × m matrix and is known as the fun-
damental matrix of the system, representing system y(N ) = xj (t + 1),
inertia and interactions between particular state vari- V (N ) = [x1 (t), x2 (t), . . . , xm (t), u1 (t), u2 (t), . . . , uk (t)]T ,
ables. In our case, matrix Q represents the unique A = [qj 1 , qj 2 , . . . , qj m , bj 1 , bj 2 , . . . , bj k ]T
dynamic properties of the airframe reflecting its iner-
tia and interaction with the environment. Matrix B
has dimension m × k and describes the effect of forc- Now, Fig. 1 explains how the row number j of
ing functions on individual state equations. One can the matrix Q of the open-loop system could be esti-
realize that such factors as ice buildup, mechanical mated. This procedure, repeatedly utilized for every
failures, and battlefield damage can be detected and j =1,2,..,m would result in the estimates Q(N) and
assessed in flight only by the estimation of matrix Q B(N) at the every step of the RLS procedure.
and matrix B of the airframe. A similar approach is applied for the estimation
C is a n × m matrix providing the definition of the of the fundamental matrix of the closed-loop system,
system’s output variables through the state variables. QCL . Indeed, assume
In our system we assume that n = m and matrix C is
an identity matrix of n × n. y(N ) = xj (t + 1),
While Eqs. 2, 3 represent of the UAV airframe, V (N ) = [x1 (t), x2 (t), . . . , xm (t), r1 (t), r2 (t), . . . , rk (t)]T ,
a complete description of UAV dynamics includes a
1 , qj 2 , . . . , qj m , bj 1 , bj 2 , . . . , bj k ]
A = [qjCL CL CL T
controller capable of automatically stabilized flight
that follows waypoints and avoids obstacles. This state
space description is referred to as the closed-loop where
system as there is a feedback controller in the loop.
The matrix vector description of the controlled air- ri (t), i=1, 2,. . . are components of the vector R(t),
frame and its state variable feedback controller can be qijCL are appropriate elements of matrix QCL ,
written as follows:
then every N-th step of the RLS procedure results in
X(t + 1) = QX(t) + BU (t) (4) estimated matrix QCL (N).Thus while an estimated
J Intell Robot Syst (2016) 84:107–120 111

Q(N) also exists, matrix F of the state-variable con- and Kjj is the j -th diagonal element of the covari-
troller could be also estimated as ance matrix of the “input” vector V (t).
 
F (N) = B(N)−1 Q(N) − QCL (N) (8) One can conclude that a deviation between a nomi-
nal value of a system parameter ajNOM and its immedi-
This result is based on a realistic assumption that ate value represented by estimate aj (N)is statistically
the number of reference signals ri (t) is equal to the significant, and as such manifests an anomaly, if
number of state variables xi (t) and B is a square non-  
 
singular matrix. It should be noted that Eq. 8 does aj (N) − ajNOM  ≥ j (α) (10)
not represent the solution of the controller design
problem, but instead it is an attempt to deduct the con- In other words, the occurrence of condition (10) can
troller parameter values from the observed behavior be interpreted as an indicator of a systematic change
of the UAV. This task facilitates the detection of sig- to the monitored parameters, caused by a cyber attack
nificant discrepancies between the actual and nominal or physical changes in the airframe. The confidence
parameter values that could be attributed to a cyber level of such a conclusion is (1-2α).
attack. This method can be used to design an anomaly
detection system. This system monitors the UAV’s
4.3 Statistical Significance parameters and when there is a significant deviation it
is able to detect and take appropriate actions immedi-
The application of the RLS procedure to flight data ately. This is done by taking a sliding window of the
yields a sequence of parameter estimates that fluctu- data and analyzing it using RLSM and comparing the
ate with time due to measurement noise and a number difference between the normal flight and the current
of unaccounted factors. These estimates are randomly flight data.
distributed around some unknown “true” values that
represent the immediate status of the UAV. Our effort
is aimed at the detection and validation of the devia- 5 Implementation
tions between the immediate (estimated) and nominal
parameter values known to UAV designers. 5.1 Hardware Health Monitor
First, recall that for all practical purposes, after a
sufficient number of steps, RLS estimation becomes We propose to embed within the UAV a hardware
equivalent to Least Squares estimation, and as such health monitoring system, shown in Fig. 2, capable
results in a minimum variance unbiased estimates of of detecting various types of cyber attacks as well
unknown parameters. The “true” value of the esti- as hardware failures. The monitoring system will be
mated parameter, ρ T RU E , is defined as the mean value responsible for ensuring safe flight and completion of
of the obtained estimates, ρ (t), t = 1, 2, 3, . . . . . the flight mission
The distance between an RLS estimate of unknown The Health Monitor will take all available UAV
parameter aj (N) and its “true” value ajT RU E assum- data including sensor data, control surface positions,
ing that N>>1 can be characterized as: and other control efforts to determine UAV health,
  
 
aj (N) − ajT RU E  ≤ t (α, ∞)SE Kjj = j (α) (9)
Health
where: Sensors
Monitoring

t (α, ∞) is Student distribution defined for the cho-


sen level of significance α and infinite number of
degrees of freedom, Controller UAV
SE is standard deviation of the modeling error or operator actuators

E(N) = y(N) − A(N)T V (N) Fig. 2 Hardware health monitoring system


112 J Intell Robot Syst (2016) 84:107–120

which will be placed into one of the following cate- Flight Gear, an open source flight simulator pro-
gories: vides all flight data, including location, wind, and air
pressure to the ground control station, which in turn
• UAV operating normally
relays it to MAV Proxy. MAV Proxy then sends this
• UAV hardware failure
data to the ArduPilot, which generates control surface
• UAV controller failure
responses to maintain flight according to the plan gen-
The UAV health state can be determined by the erated by the GCS. The ArduPilot was configured to
implementation of the described approach to find sta- report all measured or controlled variables during the
tistically significant deviations from nominal UAV flight. This data is forwarded by MAV Proxy to the
hardware and control parameters. If a significant devi- Log Parser and Analysis Engine. This arrangement
ation is detected, the failsafe procedures are executed. allowed us to gather the necessary data for our experi-
The failsafe protocol may depend on the severity of ments such as roll, pitch, and yaw, as well as the servo
the detected failure, e.g. the UAV may attempt to motor control efforts such as aileron, ruder, elevator,
return back home or to execute an emergency landing. and throttle.
When running a flight simulation, environmental
variables such as flight location, wind, time of day,
6 Experiments and atmospheric pressure can affect collected mea-
surements. Therefore, environment can also affect
For experimental verification of our approach, we estimated parameters by introducing systemic errors.
chose to use the ArduPlane platform. ArduPlane is To keep the effect of the environmental conditions
an open source plane autopilot system developed by on our experiments minimal, we ran all experiments
the DIY Drones community, and is flashed onboard under the same environmental conditions and all of the
an Arduino micro controller board. The ArduPlane test flights flew along the same path pictured in Fig. 4.
open source platform is ideal for experimentation as
it allows for the modification of source code and the 6.2 Experimental Results
uploading of custom firmware to the pilot. ArduPlane
is able to connect to any GCS which supports the The experimental results were collected to empirically
MAVlink protocol. This allowed us to run fully script- verify our contributions, i.e. the ability to detect and
able missions in addition to real-time waypoint control interpret changes in airframe and control parameters.
and constant two-way communication to monitor the The first part of this section will demonstrate the per-
flight. formance of the parameter identification engine. The
second part will show that we were able to detect
6.1 Data Collection significant changes in the UAV control parameters.

We chose to use a Hardware in the Loop (HIL) setup 6.2.1 Identification of Airframe and Controller State
to run our experiments in the configuration displayed Space Parameters
in Fig. 3.
Before takeoff, we loaded our UAV controller with
known nominal parameters for the UAV airframe to be
Analysis flown. Then the UAV was flown along the path shown
Flight Gear ArduPilot
Engine in Fig. 5 for 15 minutes while we collected UAV state
data such as roll, pitch, yaw, and servo responses. The
measured airplane attitude data is presented in Fig. 5.
Ground Each UAV state space data point was forwarded to
Control MAV Proxy Log Parser
our parameter estimation engine depicted in Fig. 1.
Station
The parameter estimation engine produced eighteen
Fig. 3 Simulation setup estimates for the airframe and controller state space
J Intell Robot Syst (2016) 84:107–120 113

Fig. 4 Flight path

parameters. The parameters estimated for the closed important to focus upon are 1, 8, and 15. These are
loop (CL) and open loop (OL) systems are seen in roll, pitch and yaw.
Table 1. Table 1 demonstrates that the parameters remain
The estimated parameters in Table 1 cover 15- constant between flights if the airframe and control
minute flights during which the simulated UAV exe- law were not altered. Consider parameter 4 for the
cuted 6 loops and 24 turns. The parameters that are open loop. It has not changed, remaining constant at

Fig. 5 UAV state vector UAV State Space


plot 1
Roll
0.8
Pitch
0.6 Yaw
0.4
Roll/Pitch/Yaw

0.2

-0.2

-0.4

-0.6

-0.8

-1
0 500 1000 1500 2000 2500 3000 3500 4000 4500
Samples Ts=.2s
114 J Intell Robot Syst (2016) 84:107–120

0.28. For the closed loop, parameter 4 changed negli- with different controller parameters. For example,
gibly. The same can be said about all other parameters; parameter 4 has changed from 2.71 to 5.58 due to
all parameters show little or no change. change in the control law. The same effect can be
observed for a number of estimated parameters.
6.2.2 Identification of Parameter Alteration in State To compare the parameters identified in each of
Space the flights, we used Normalized Root Mean Square
Deviation (NRMSD).
To test the ability of our system to detect control 
parameter changes, we loaded the UAV controller with n
E(A, B) = ([ai ] − [bi ])2 /var(ai ) (11)
a different set of control law parameters and ran the i=0
same flight plan as presented in Fig. 4 for ten minutes.
According to our computations, the estimated control where:
law parameters did reflect the applied change in the
control law. When viewing the flight in the simula- A, B are the flights being compared
tion environment, we noticed that it was not as smooth [ai ] and [bi ] are the mean values for the i-th esti-
when compared to normal flight. mated parameters in flights A and B.
We applied the same analysis method to the flight var(ai ) is the variance of the i-th estimated parame-
data collected with an altered flight controller. The ter in flight A
estimates for the airframe parameters and for the flight
controller are presented in Table 2. The closer two sets of parameters are to each other,
The Table 2 clearly shows that the estimated param- the lower the NRMSD will be. Table 3 compares the
eters have changed noticeably from those in Table 1. flights in Tables 1 and 2 using NRMSD.
This change is caused by the UAV being initialized There were minimal differences in the NRMSD
values between flights when parameters were kept

Table 1 Identified UAV state space parameters (Normal


Flight) Table 2 Identified UAV state space parameters (Altered Flight)

Normal flight 0 Normal flight 1 Altered flight 0 Altered flight 1

Parameter OL CL OL CL Parameter OL CL OL CL

1 1.02 1.01 1.02 1 1 0.87 1.05 0.87 1.05


2 0.04 −0.14 0.02 −0.15 2 −0.43 −0.93 −0.48 −0.93
3 0 0 0 −0.01 3 0.02 0 0 0
4 0.28 2.63 0.28 2.71 4 0.17 5.43 0.17 5.58
5 0.01 −2.49 0.01 −2.59 5 −0.02 −4.79 0.02 −4.91
6 −0.3 −0.13 −0.3 −0.12 6 −0.21 −0.64 −0.23 −0.64
7 0.02 −0.03 0.02 −0.03 7 0 −0.05 −0.01 −0.05
8 0.96 0.86 0.96 0.87 8 0.79 0.8 0.77 0.78
9 0.01 0 0 −0.01 9 0 −0.01 0 −0.01
10 0.06 −0.31 0.05 −0.39 10 0 −0.4 0 −0.42
11 −0.2 0.39 −0.19 0.44 11 −0.02 0.54 −0.02 0.51
12 0.11 −0.08 0.12 −0.06 12 0.02 −0.14 0.02 −0.09
13 −0.02 −0.01 0 −0.01 13 0 0 0 −0.01
14 −0.04 −0.04 0.05 −0.02 14 0 −0.04 −0.02 −0.06
15 1 1.01 1 1.01 15 1 1.01 1 1.01
16 −0.01 −0.02 0.01 −0.1 16 0 −0.04 0 −0.08
17 0.02 −0.45 −0.02 −0.4 17 −0.01 −0.48 0 −0.44
18 −0.01 0.47 0.01 0.5 18 0.01 0.51 0 0.52
J Intell Robot Syst (2016) 84:107–120 115

consistent. When parameters were changed e.g., health. Since the data for each window is expected
between normal flight 0 and altered flight 0, the to fall within a normal distribution, a significant z-
NRMSD takes a noticeably larger value. This result score can determine that an observed flight does not
allowed us to build an anomaly detection system that match the data corresponding to a normal flight. A z-
detects parameter deviations. score of 3 or greater means that the observed value
assigned this z-score is 3 or more standard deviations
6.2.3 Real Time Anomaly Detection System away from the mean, either above or below the mean.
Since this is a normal distribution as stated previously,
The main goal of this research was to develop a real- this would mean that 99.7 % of normal values would
time anomaly detection system which could detect have a z-score less than 3, and therefore only 0.3 % of
deviations in the UAV’s flight parameters mid-flight. cases could exhibit such a z-score. This low probabil-
The ability of the system to self-monitor mid-flight ity of normalcy is an statistically reasonable cause for
fully protects the system, leaving no time-specific determining any observed data greater than 3 standard
weaknesses for an attacker to take advantage of. Also, deviations from the mean to be indicative of anoma-
the isolation of this system to the UAV itself makes lous behavior. This is how the comparison of expected
it invulnerable to communication-channel faults and values and observed values leads to a conclusion of
ground control station attacks. Any UAV using this systemic faults.
system off-line can detect systemic faults. The plan Our designed system was tested with a normal
of recourse of the detected fault would be specifically flight and an altered flight for performance evaluation.
designed for each UAV and its purpose. Figure 6 shows the recorded findings from the nor-
In our designed system, flight data of the closed mal flight. Parameters roll, pitch, and yaw were all
loop system is continually logged for analysis. The individually monitored in this trial. Figure 7 shows
nature of the data required the use of the RLSM pro- the recorded findings from the altered flight. In this
cedure to make the data continuous. The acquired data flight, the controller roll parameter was altered, and
was windowed in blocks of 500 samples. As flight the designed system was used to detect such a change.
time passed, data was collected and each new set of The same parameters were monitored. In this altered
500 samples constituted a new immediate window for flight, the roll parameter was changed approximately
analysis. The mean and standard deviation for each 11 minutes into the flight, and then returned to its
window were calculated. Since each window now original value 31 minutes into the flight. This con-
could be analyzed by statistical means, these mean and trol alteration emulates a systemic change we would
standard deviation parameters allowed for the compar- aim to detect, whether it would be from malicious
ison of the particular window’s observed values to the
values expected for this window.
The ability to judge each window of flight time pro-
vides the ability to evaluate the system at each window
of flight time. This is how the system is capable of
detecting anomalous behavior mid-flight. This config-
uration can be used to evaluate system stability and

Table 3 Flight parameters comparison (Closed Loop)

Normal Normal Altered Altered


flight 0 flight 1 flight 0 flight 1

Normal flight 0 0 0.77 139.38 147.81


Normal flight 1 0.75 0 129.43 137.72
Altered flight 0 7.85 7.40 0 0.22
Altered flight 1 9.16 8.47 0.23 0
Fig. 6 UAV anomaly detection system: normal flight
116 J Intell Robot Syst (2016) 84:107–120

changing of mission plan, equipment malfunction, or airframe and control parameters of the UAV. We
physical damage. also confirmed that any significant changes to UAV
The comparison of these two results, normal flight control law can be detected through our anomaly
(Fig. 6) and altered flight (Fig. 7) is clear proof of the detection system. We believe that hardware degra-
designed system’s ability to detect systemic changes. dation or damage can be identified with the same
As expected, Fig. 7 shows similar pitch and yaw method.
parameter values as in Fig. 6, while the altered param-
eter, roll, shows dramatic deviations in Fig. 7. The
results accompanying the trial in Fig. 7 also exhibit 7 Discussion
a significantly higher standard deviation for the roll
parameter than in the trial accompanied by Fig. 6. This paper presents a method for the real time auto-
The results of this system test prove the acute abil- matic detection of anomalous status of a UAV that
ity of our design to detect anomalies in the UAV. While might be the result of cyber attack or mechanical
the test provided an example of a change in the con- failure. This method is designed to address particu-
troller, the same detection logic makes this useful for lar types of anomalies associated with adulteration of
an anomaly caused by any of our targeted UAV threats. control laws and degradation of the properties of the
The little disruption the change in the roll parameter airframe. This method has limitations outside of its
had on the pitch and yaw parameters shows that there application area.
is little cross-talk between parameters. The decoupling
of the parameters allows for successful detection and 7.1 Limitations
future isolation of faults.
The same method can be applied to the open loop The cyber attack against the UAV may have many
system. Changes in the identified open loop sys- different implementations and could cause failures
tem parameters may indicate physical damages to the at multiple levels. Our method reliably detects the
airframe or flight equipment. changes in the UAV dynamics which is important for
flight safety. Our method is not designed to and will
6.3 Results Summary not be able to detect attacks against the GPS sys-
tem or the waypoint scheduling system. Our method
Our experimental results successfully support our for real time anomaly detection relies heavily on the
claim that it is possible to automatically identify length of the window, if the window is too large
or too small the methods accuracy would drastically
decrease.
The results presented in this paper were obtained in
an advanced simulation environment which might not
completely capture the complexity of the real world.
However, we believe that all significant aspects of
UAV flight were successfully modeled by our simula-
tion.

8 Related Work

In the domain of UAV security, many approaches are


taken to detect failures and intrusions in UAV sys-
tems. The work done by Freeman et al. is similar to
this paper in its fault detection system [17]. They com-
pared both model-based and data-driven techniques,
Fig. 7 UAV anomaly detection system: altered flight and concluded that a combination of both would be
J Intell Robot Syst (2016) 84:107–120 117

the most realistically useful approach. In their model- possibility of the monitoring system being compro-
based approach, the model is an aerodynamic model mised by the attacker.
based on physics, as opposed to our modern control
model. An H∞ model-matching procedure was uti- 8.2 Attacker Profiling
lized which minimizes the norm of error signals in
the controllers. Weighting functions were used to ade- In the scheme of UAV intrusion detection, many works
quately minimize sensitivity to sensor noise. Their have taken advantage of expected reasoning of an
data-driven approach fed system parameters through attack to formulate the best defense. Goppert et al.
a Fourier transform to create a baseline parameter, used classification of the attacker in their detection
and collected windowed values of this baseline param- model [19]. Their attacker profiles were separated
eter were collected into a normal distribution. The based on three different cases of malicious intent:
observed baseline value was compared to obtain the obstruction of the mission, overtaking control of the
probability that this baseline occurred in the system UAV, and UAV destruction. This scheme was quite
without a flaw in the system, and then the prob- robust, accounting for more recent threats, such as
ability score was given a z-score to determine the GPS spoofing. In this design, the profile perspective
normalcy of the result. Their results showed that a was used to parameterize the failure model. Failure
data-driven technique was circumstantially less suc- was detected as an envelope including UAV location,
cessful than a model-driven approach. The work done altitude with respect to location, and so on. Their
here shows a slightly similar approach to that of this approach was successful in many ways, but weak
paper, demonstrating how predetermined data about when confronted with cross-coupled system interfer-
the system allow for a more meaningful detection of ences, such as noise in the sensors and an intruder.
system changes. In a similar approach, Mitchell and Chen profiled
Though the work by Freeman et al. was similar to the detected attacks into three categories of attack-
this process, many of these approaches differ from the ers: reckless, random, and opportunistic [18]. This
approach in this paper as they rely on a predetermined categorical profiling was then used to determine a
set of conditions for failure statuses or profiling of the probability of event patterns, to compare expected
malicious system attacker. Also, many other works do events. Their detection success was heavily dependent
not operate on a closed loop, requiring external moni- on the expected event probability, and while very suc-
toring infrastructure to determine a status of failure or cessful in with the ideal modeling, any inaccuracies in
intrusion. this model would result in dramatically increased false
positive and false negative rates.
8.1 External Detection
8.3 Predetermined Failure Cases
Many past works in UAV threat detection have relied
on external monitoring systems to detect an intrusion Of all of the trends in this field, the use of prede-
or system failure. In particular, Mitchell and Chen termined failure types seems to be one of the most
implemented a Behavior Rule-based UAV Intrusion prevalent methods of detection. In the work done
Detection System (BRUIDS) with both internal sen- by Mitchell and Chen, the contemporary publicized
sors and neighboring UAVs for monitoring [18]. Cer- attacks and system weaknesses were evaluated to
tain configurations of the internal monitoring sensors determine seven categorical threat behaviors, such
would leave vulnerabilities to doubly-spoofed sensor as attempting to target a friendly entity [18]. Their
reading; one sensor would be false and the monitor- model was strategic in its prioritized order of behavior
ing sensor would report no issues. Also demonstrated rules. Rules of behavior, such as not opening weapons
by Mitchell and Chen, the need for wireless com- outside of a battle scene, were ranked on priority
munication alone added the issue of signal integrity of system integrity down to information integrity. If
into the detection performance. A method that would any events were detected that violated one of these
not require an external system to detect failures and rules, the system determined a threat. The ordering
attacks in a UAV would also be invulnerable to the of these behavior rules allowed for the more urgent
118 J Intell Robot Syst (2016) 84:107–120

threats to be detected first, efficiently using time to We put forth a novel process for defining UAV
detect. flight behavior. Our proposed technology allows us to
In an alternative study, Keller et al. designed a detect a cyber attack against UAV electronic hardware.
failure detection filter (FDF) using a linear observer It also can detect UAV hardware degradation and
[20]. The filter relied directly on preconceived fail- failure.
ure modes to alert the system to an intrusion. Their Our research resulted in a prototype UAV monitor-
filter used minimal information (accelerometer and ing system, which captures flight data and estimates
angular rate measurements) as input to their FDF and airframe and controller parameters. Estimated param-
with considerable success. As Keller et al. progressed eters are constantly compared to previously known
through the work; they identified the complexity of parameters. If a significant change in parameters is
using a filter in such a way, and noted that this type observed, the system alerts the ground control station
of filter is not properly suited for detection of system and may execute predefined actions.
degradation. We adapted the Recursive Least Squares method
The approach to this method taken by Lang et al. to implement an estimator for UAV parameters. This
is arguably less vulnerable to classification failures, estimator is used in conjunction with the state space
and therefore a more successful use of failure clas- model parameters and difference equation parameters.
sification techniques [21]. The focus of this method The vectors of estimated parameters are accumulated
was in evaluating the aerodynamic envelope: the set and subjected to confidence interval testing. If the
of parameters available and reasonably controlled to monitored parameters fall off the corresponding con-
safely land the UAV. This classification begins with fidence interval, the statistically significant deviation
differentiating airframe damage from control actuator is detected. We also show that simpler normalized root
faults. Since the UAV’s expected envelope is deter- squared deviation can be used to detect anomalous
mined with extensive controlled wind-tunnel testing, parameter change.
the first case of airframe damage required mathemat- We tested our system with a set of experiments
ical estimation of each flight parameter (drag, lift, based on a state of the art flight simulator. Our experi-
etc) with linear regression. This is a highly math- ments demonstrated that it is possible to automatically
ematical process which utilized progressive model establish UAV flight parameters and detect significant
updating. Their approach allowed the model to con- deviations.
tinually acquire new data and incrementally improve Our results establish that achieving efficient
the temporary model. While inaccurate at first, the anomaly detection in flight is possible through the
method could theoretically react to any type of air- intelligent application of statistical methods to system
frame damage provided enough computational time. behavioral profiling.
The second case of failure is control actuator faults,
which were easily modeled based on expected possi-
ble categorical failures being previously modeled. The Acknowledgments This project became possible due to the
support of graduate student research at Binghamton University
information from the UAV could be compared to an
by the Air Force Office of Scientific Research. In addition, the
offline library and then used for online stabilization of authors would like to thank Dr. George Siouris for his expertise
the aircraft. The use of a pragmatic failure library does and valuable suggestions.
make for a very timely response, but inherently leaves
the system vulnerable to an unforeseen or expectedly
unlikely failure type. References

1. Amazon Prime Air http://www.amazon.com/b?node=8037


9 Conclusion 720011, accessed on 13 Feb 2014
2. UAV Roundup 2013 http://www.aerospaceamerica.org/
Documents/AerospaceAmerica-PDFs-2013/July-August-
The increasing widespread use of Unmanned Aerial 2013/UAVRoundup2013t-AA-Jul-Aug2013.pdf, accessed
Vehicles (UAVs) raises a host of new security concerns. on 13 Feb 2014
J Intell Robot Syst (2016) 84:107–120 119

3. Federal Aviation Administration selects Rutgers for drone 20. Keller, J.D., et al.: Aircraft flight envelope determina-
research program. http://www.dailytargum.com/news/fede- tion using upset detection and physical modeling methods.
ral-aviation-administration-selects-rutgers-for-drone-re- In: AIAA Guidance, Navigation, and Control Conference,
search-program/article 403dc68a-7888-11e3-a0c2-0019bb Chicago, Illinois (2009)
30f31a.html, accessed on 13 Feb 2014 21. Tang, L., et al.: Methodologies for adaptive flight envelope
4. Unmanned Aircraft Systems: PercePtions & Potential, http:// estimation and protection. In: AIAA Guidance, Navigation,
www.aia-aerospace.org/assets/AIA UAS Report small.pdf, and Control Conference, Chicago,Illinois (2009)
accessed on 13 Feb 2014
5. FAA Selects Six Sites for Unmanned Aircraft Research.
http://www.faa.gov/mobile/index.cfm?event=news.read& Zachary Birnbaum is a PhD student at Binghamton University.
update=75399, accessed on 13 Feb 2014 Upon completing BS in Electrical Engineering at Bingham-
6. Rawnsley, A.: Iran’s alleged drone hack: tough, but ton University, he immediately began his doctoral work. In
possible, http://www.wired.com/dangerroom/2011/12/iran- his first year, he developed a novel Intrusion Detection Sys-
drone-hack-gps, accessed on 13 Feb 2014 tem for computers capable of detecting cyber-attacks. He took
7. Gorman, S., Dreazen, Y.J., Cole, A.ugust.: Insurgents hack his winter and summer experience working for the navy to
US drones, The Wall Street Journal 17. Dow Jones and guide his current research direction, Unmanned Aerial Vehicle
Company, Inc (2009) (UAV) security. In this area he hopes to apply his knowl-
8. Case Study: Rockwell Collins demonstrates damage tol- edge of military systems and security to develop an origi-
erant flight controls and autonomous landing capabilities. nal security system for UAVs. His research interests include
http://www.rockwellcollins.com/sitecore/content/Data/Suc- intrusion detection, cyber physical system security, and data
cess Stories/DARPA Damage Tolerance.aspx, accessed on mining.
13 Feb 2014
9. Nguyen, N.T., Krishnakumar, K.: Hybrid intelligent flight
control with adaptive learning parameter estimation. J.
Andrey Dolgikh is a Research Scientist at Binghamton Univer-
Aerosp. Comput. Inf. Commun. 6(3), 171–186 (2009)
sity, where he also received his PhD in Electrical Engineering.
10. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries- His research interests include behavioural based intrusion detec-
open-computers-not-connected-to-internet.html? r=1, acces- tion, cloud security and industrial control systems security.
sed on 13 Feb 2014 For his PhD research he developed two behavioural detection
11. Shepard, D.P., et al.: Evaluation of smart grid and civilian engines: A Fast Coloured Petri Net based malicious function-
UAV vulnerability to GPS spoofing attacks. In: Proceedings ality detector, and control flow graph matching detector. The
of the ION GNSS Meeting (2012) current focus of his work is industrial control systems secuirty.
12. SkyJack: Hacker-drone that can wirelessly hijack & He also designed a new computer security class and teaches it
control other drones. http://rt.com/news/hacker-drone-air- at Binghamton University.
craft-parrot-704/, accessed on 13 Feb 2014
13. Nilsson, D.K., Larson, U.: A defense-in-depth approach
to securing the wireless vehicle infrastructure. Journal of
Victor Skormin is a Distinguished Service Professor at Bing-
Networks 4(7), 552–564
hamton University, Binghamton NY. He has an MS (1968) and
14. Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: PhD (1974) degrees. His research in the areas of technical
Cyber security threat analysis and modeling of an diagnostics, laser communications, and computer security was
unmanned aerial vehicle system. In: 2012 IEEE Conference supported by the NSF, NASA and Air Force. He has been active
on Technologies for Homeland Security (HST). 13-15 Nov, in industrial consulting. He served two terms as an Air Force
p. 585,590 (2012) Senior Research Associate appointed by the National Research
15. Spripada, N.R., Fisher, D.G.: Improved least squares iden- Council. He is an author/editor of several books and a large
tification. Int. J. Control. 46(6), 1889–1913 (1987) number of research papers; he supervised 20 PhD dissertations,
16. Siouris, G.M.: Missile Guidance and Control Systems. and served as an Editor for Space Systems of the IEEE AES
Springer (2004) Transactions. He is a Senior Member of IEEE.
17. Freeman, P.: Model-Based and Data-Driven Fault Detec-
tion Performance for a Small UAV. IEEE/ASME Trans.
on Mechatronics 18(4), 1300–1309 (2013). doi:10.1109/
TMECH.2013.2258678 Edward O’Brien graduated with his Master’s in Electrical
18. Mitchell, R., Chen, I.: Adaptive intrusion detection of Engineering from Binghamton University. After completing his
malicious unmanned air vehicles using behavior rule Bachelor’s at Binghamton University, he enrolled in an accel-
specifications. IEEE Transactions on Systems, Man, and erated program to complete his Master’s in one year while
Cybernetics: Systems 44(5), 593–604 (2013). doi:10.1109/ working on UAV security. He is currently working on research
TSMC.2013.2265083 and development on high pulsed currents, high pulsed voltages,
19. Goppert, J., et al.: Numerical analysis of cyberattacks AC-DC difference and high resistance. His primary interests
on unmanned aerial systems. In: in Infrotech@Aerospace are signal processing, FPGA development, control systems,
2012, Garden Grove, California, 2012 computer security and metrology.
120 J Intell Robot Syst (2016) 84:107–120

Daniel Muller is a junior at Binghamton University currently pur- Christina Stracquodaine is a Master’s student of Electrical
suing a BS in Computer Engineering. His research career started late Engineering at Binghamton University. As part of an acceler-
freshmen year when he began studying behavioral approaches to ated program, she began her master’s work in the final year
detecting attacks against Cyber Physical Systems (CPS), particularly of her BS. She is currently continuing the work done at Bing-
Unmanned Aerial Vehicles (UAVs). Since then he has fostered an hamton in Unmanned Aerial Vehicle (UAV) security. Outside
interest in security of CPS and continues to use UAVs as models of academia, she has also spent time working as an industrial
for behavioral based anomaly detection of CPS. His research at consultant for Control projects. In the future, she hopes to con-
Binghamton University has set a good foundation for what he tinue onto doctoral work in autonomous systems, where she can
hopes is a successful career in cyber security. apply her experience to Robotics.

Potrebbero piacerti anche