Skip to main content
Log in

Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation

  • Published:
Journal of Intelligent & Robotic Systems Aims and scope Submit manuscript

Abstract

The proliferation of Unmanned Aerial Vehicles (UAVs) brings about many new security concerns. A common concern with UAV security is for an intruder to take control of a UAV, which leads for a need for a real time anomaly detection system. This research resulted in a prototype UAV monitoring system that captures flight data, and then performs real time estimation and tracking of the airframe and controller parameters. The aforementioned is done by utilizing the Recursive Least Squares Method (RLSM). Using statistical validation and trend analysis, parameter estimates are critical for the detection of cyber attacks and incipient hardware failures that can invariably jeopardize mission success. The results demonstrate that achieving efficient anomaly detection during flight is possible through the application of statistical methods to profile system behavior. The anomaly detection system that was designed can be performed in real time while the UAV is in flight, constantly verifying its parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Amazon Prime Air http://www.amazon.com/b?node=8037720011, accessed on 13 Feb 2014

  2. UAV Roundup 2013 http://www.aerospaceamerica.org/Documents/AerospaceAmerica-PDFs-2013/July-August-2013/UAVRoundup2013t-AA-Jul-Aug2013.pdf, accessed on 13 Feb 2014

  3. Federal Aviation Administration selects Rutgers for drone research program. http://www.dailytargum.com/news/federal-aviation-administration-selects-rutgers-for-drone-research-program/article_403dc68a-7888-11e3-a0c2-0019bb30f31a.html, accessed on 13 Feb 2014

  4. Unmanned Aircraft Systems: PercePtions & Potential, http://www.aia-aerospace.org/assets/AIA_UAS_Report_small.pdf, accessed on 13 Feb 2014

  5. FAA Selects Six Sites for Unmanned Aircraft Research. http://www.faa.gov/mobile/index.cfm?event=news.read&update=75399, accessed on 13 Feb 2014

  6. Rawnsley, A.: Iran’s alleged drone hack: tough, but possible, http://www.wired.com/dangerroom/2011/12/iran-drone-hack-gps, accessed on 13 Feb 2014

  7. Gorman, S., Dreazen, Y.J., Cole, August: Insurgents hack US drones, The Wall Street Journal 17. Dow Jones and Company, Inc (2009)

  8. Case Study: Rockwell Collins demonstrates damage tolerant flight controls and autonomous landing capabilities. http://www.rockwellcollins.com/sitecore/content/Data/Success_Stories/DARPA_Damage_Tolerance.aspx, accessed on 13 Feb 2014

  9. Nguyen, N.T., Krishnakumar, K.: Hybrid intelligent flight control with adaptive learning parameter estimation. J. Aerosp. Comput. Inf. Commun. 6(3), 171–186 (2009)

    Article  Google Scholar 

  10. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?_r=1, accessed on 13 Feb 2014

  11. Shepard, D.P., et al.: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of the ION GNSS Meeting (2012)

  12. SkyJack: Hacker-drone that can wirelessly hijack & control other drones. http://rt.com/news/hacker-drone-aircraft-parrot-704/, accessed on 13 Feb 2014

  13. Nilsson, D.K., Larson, U.: A defense-in-depth approach to securing the wireless vehicle infrastructure. Journal of Networks 4(7), 552–564

  14. Javaid, A.Y., Sun, W., Devabhaktuni, V.K., Alam, M.: Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In: 2012 IEEE Conference on Technologies for Homeland Security (HST). 13-15 Nov, p 585,590 (2012)

  15. Spripada, N.R., Fisher, D.G.: Improved least squares identification. Int. J. Control. 46(6), 1889–1913 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  16. Siouris, G.M.: Missile Guidance and Control Systems. Springer (2004)

  17. Freeman, P.: Model-Based and Data-Driven Fault Detection Performance for a Small UAV. IEEE/ASME Trans. on Mechatronics 18(4), 1300–1309 (2013). doi:10.1109/TMECH.2013.2258678

    Article  Google Scholar 

  18. Mitchell, R., Chen, I.: Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications. IEEE Transactions on Systems, Man, and Cybernetics: Systems 44(5), 593–604 (2013). doi:10.1109/TSMC.2013.2265083

    Article  MathSciNet  Google Scholar 

  19. Goppert, J., et al.: Numerical analysis of cyberattacks on unmanned aerial systems. In: in Infrotech@Aerospace 2012, Garden Grove, California, 2012

  20. Keller, J.D., et al.: Aircraft flight envelope determination using upset detection and physical modeling methods. In: AIAA Guidance, Navigation, and Control Conference, Chicago, Illinois (2009)

  21. Tang, L., et al.: Methodologies for adaptive flight envelope estimation and protection. In: AIAA Guidance, Navigation, and Control Conference, Chicago,Illinois (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edward O’Brien.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Birnbaum, Z., Dolgikh, A., Skormin, V. et al. Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation. J Intell Robot Syst 84, 107–120 (2016). https://doi.org/10.1007/s10846-015-0284-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10846-015-0284-1

Keywords

Navigation