Please use this identifier to cite or link to this item:
|Title:||An efficient UAV hijacking detection method using onboard inertial measurement unit||Authors:||Feng, Zhiwei
|Keywords:||Engineering::Computer science and engineering||Issue Date:||2018||Source:||Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., & Yi, W. (2018). An efficient UAV hijacking detection method using onboard inertial measurement unit. ACM Transactions on Embedded Computing Systems, 17(6), 96-. doi:10.1145/3289390||Journal:||ACM Transactions on Embedded Computing Systems||Abstract:||With the fast growth of civil drones, their security problems meet significant challenges. A commercial drone may be hijacked by a GPS-spoofing attack for illegal activities, such as terrorist attacks. The target of this article is to develop a technique that only uses onboard gyroscopes to determine whether a drone has been hijacked. Ideally, GPS data and the angular velocities measured by gyroscopes can be used to estimate the acceleration of a drone, which can be further compared with the measurement of the accelerometer to detect whether a drone has been hijacked. However, the detection results may not always be accurate due to some calculation and measurement errors, especially when no hijacking occurs in curve trajectory situations. To overcome this, in this article, we propose a novel and simple method to detect hijacking only based on gyroscopes’ measurements and GPS data, without using any accelerometer in the detection procedure. The computational complexity of our method is very low, which is suitable to be implemented in the drones with micro-controllers. On the other hand, the proposed method does not rely on any accelerometer to detect attacks, which means it receives less information in the detection procedure and may reduce the results accuracy in some special situations. While the previous method can compensate for this flaw, the high detection results also can be guaranteed by using the above two methods. Experiments with a quad-rotor drone are conducted to show the effectiveness of the proposed method and the combination method.||URI:||https://hdl.handle.net/10356/144758||ISSN:||1539-9087||DOI:||10.1145/3289390||Rights:||© 2018 Association for Computing Machinery. All rights reserved.||Fulltext Permission:||none||Fulltext Availability:||No Fulltext|
|Appears in Collections:||SCSE Journal Articles|
Updated on May 14, 2021
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.