Next Article in Journal
An Adaptive Task Planning Method for UAVC Task Layer: DSTCA
Next Article in Special Issue
Safety-Critical Fixed-Time Formation Control of Quadrotor UAVs with Disturbance Based on Robust Control Barrier Functions
Previous Article in Journal
Prototype for Multi-UAV Monitoring–Control System Using WebRTC
Previous Article in Special Issue
A Fault-Tolerant Multi-Agent Reinforcement Learning Framework for Unmanned Aerial Vehicles–Unmanned Ground Vehicle Coverage Path Planning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Networked Control of a Small Drone Resilient to Cyber Attacks

by
Octavian Ștefan
1 and
Alexandru Codrean
2,*
1
Department of Automation and Applied Informatics, Politehnica University Timișoara, Bvd. Vasile Parvan, No. 2, 300223 Timișoara, Romania
2
Department of Automation, Technical University of Cluj-Napoca, Str. Memorandumului, No. 28, 400114 Cluj-Napoca, Romania
*
Author to whom correspondence should be addressed.
Drones 2024, 8(10), 552; https://doi.org/10.3390/drones8100552
Submission received: 30 August 2024 / Revised: 1 October 2024 / Accepted: 3 October 2024 / Published: 5 October 2024
(This article belongs to the Special Issue Flight Control and Collision Avoidance of UAVs)

Abstract

:
With increasing advances in networked systems and networked control systems in everyday life, the problem of cybersecurity becomes crucial. Moreover, in some applications like small UAVs, the safety and integrity of the system and its surroundings are highly susceptible to cyberattacks. In this context, the current paper proposes a resilient networked control approach. The control structure is split into an inner and an outer loop. The outer position control loop uses measurements from motion cameras connected to a remote computer, while the commands are sent through the network. We consider the resilience problem for two types of cyberattacks: denial of service (DoS), emulated as an increase in the network transmission delay, and man in the middle (MitM), emulated as additive input disturbances. The mitigation for the DoS attack is performed through the help of a reference governor (RG), which uses the delay estimates and the system’s model to predict future safety violations and adapts the reference accordingly. The MitM attack is mitigated by an unknown input disturbance observer (UIDO) together with a RG. Experimental results on a Parrot Mambo drone show that both types of attacks are rejected successfully, ensuring a safe and stable flight.

1. Introduction

Unmanned aerial vehicles (UAVs) are increasingly being used in a wide range of applications, from surveillance and disaster management, to infrastructure inspection, precision agriculture, or even emergency medical services [1]. As a special subclass, small UAVs, which weight less than 1 kg and fly at velocities less than 10 m/s, are very popular due to their compact size and small cost, being used in several industries, from commercial and education, to research and military [2]. Among the different types of small UAVs, the quadcopter is the most often encountered, due to its easy-to-understand flight principles, simple architecture, high maneuverability and vertical landing/take-off. Despite these advantages, there are several challenges and open problems that limit the performance of these type of drones in real life applications. First, the quadcopter is an unstable and nonlinear process, so the control design for stability and tracking is not a trivial matter [3]. Second, not all of the states of the system are available, so different estimation algorithms need to be designed, depending on the available sensors, and whether the applications are indoor or outdoor [4]. The controller is highly dependent on the accuracy of these estimates. Third, there are computational limitations, both at a software and hardware level, while the autonomy is extremely limited [1]. Lastly, there is the problem of path planning, which is usually treated at a higher level, separated from the control problem [2]. This involves the task of generating the sequence of waypoints from the drone’s current position to the target (goal) position (the reference trajectory sent to the controller), ensuring collision avoidance [5], synchronization with other agents (robots or even manned vehicles) [6], or the optimization of some resources like battery autonomy or wireless transmission signal strength [7]. The interrelation between the control loop and path re-planning is an area of active research, and still represents a challenging task in practice.
As the systems in everyday applications become more and more interconnected, we can say that networked systems, and in particular networked control systems, are becoming ubiquitous [8]. This brings multiple benefits like increased reliability and scalability, ease of maintenance and higher performances overall. However, the network can induces extra problems like packet loss (information loss), time varying transmission delays, or bandwidth limitations [9]. Research in this field has focused on two areas: control over networks (i.e., to control one or multiple processes with a remote controller) [10] and control of networks (i.e., optimize the network performance, e.g., in terms of Quality of Service parameters) [11]. Networked control systems are highly used in applications with mobile robots (in particular drones), involving wide spatial areas, due to their increased autonomy. In such applications, using the already available computer networks infrastructure helps reduce costs and increases the overall performance. For small UAVs, moving a part of the control structure remotely helps in addressing the computational limitations mentioned before. Moreover, this permits a better integration between the control algorithm and the path planning algorithm, and facilitates extensions to cooperative control of multiple agents (robots).
One of the biggest challenges recently in using mobile robots in real life applications, involving interactions with other robots but also human–robot interaction, is ensuring safety and resilience [12] (Ch. 4). Safety, from a Control Theory perspective, involves that the system is not only stable, but also that it operates in a certain predefined safe region, where the integrity of the robot and of the surrounding environment is ensured. Although safety has been traditionally addressed in the robotics community at a higher level, a multi-level approach is needed for the safety of complex autonomous system. To this end, mid-level and low-level solutions for safety are subject to intensive research, with notable solutions in this direction being the safety filter [13] or the reference governor [14]. Besides safety, it is important that the system is resilient to less frequent but severe disruptions, like cyberattacks, natural disasters, etc. Resilience is different from the classical concept of robustness through the fact that it considers major perturbations, which can be identified in real-time, and the nominal performances can be recovered in a non-conservative manner. Both from a safety and resilience perspective, cybersecurity of network control systems involving mobile robots represents an emerging research field [15].
In this context, the current study proposes a networked control approach for small UAVs resilient to cyberattacks. We focus on indoor drone applications, where motion camera systems can provide position feedback, thus alleviating the sensing problem. The safety and resilience become of high priority, due to possible human–robot interactions and the constraint management needed in narrow closed environments. The original contribution consists of a mid-to-low-level approach in addressing the cybersecurity problem, by using a combination of a reference governor (RG) and a unknown input disturbance observer (UIDO). We focus on two often encountered types of cyberattacks: denial of service (DoS) and man in the middle (MitM). The DoS attack involves a sudden variation in the network time delay. Different from previous studies involving RG with time delays, like [16], we consider here that the time delay variation can be estimated through a time stamping technique. We extend the RG to include the time delay model, such that it uses the online delay estimate to predict future safety violations, and adapts the reference accordingly. The MitM attack involves false data injection, and since our focus is on stealthy attacks, we model the attack as an additive slow varying input disturbance. For the detection and mitigation of such an attack, we use a combination of a RG with an UIDO. The disturbance is estimated by the UIDO and rejected in steady state. The RG is extended to predict possible transients during disturbance compensation that can cause safety violations, and again adapts the reference in accordance. We show real time experiments on a Parrot Mambo drone that validate our solution.
The paper is structured as follows. Section 2 presents some preliminaries on the cybersecurity problem in networked control systems. Section 3 presents the baseline networked control structure for small drones used, and how the controllers are designed. Section 4 describes the resilient networked control structure, detailing the design of the RG and UIDO for detecting and mitigating the two types of attacks—DoS and MitM. The experiments on the real Parrot Mambo drone are presented in Section 5, while Section 6 discusses some final conclusions.
Notation. We denote by R and Z the sets of real and integer numbers, and Z + represents the set of positive integers. For a continuous signal f(t) sampled with a sampling period T s , we denote by f [ k ] the value at the kth sampling instance, i.e., f [ k ] = f ( k T s ) . I n denotes the identity matrix of dimension n × n , while 0 n represents the zero matrix of dimensions n × n . s ( · ) and c ( · ) are shorthand notations for s i n ( · ) and c o s ( · ) . Throughout this paper, we use the dot convention for the time derivative ( x ˙ : = d x d t ), and the time dependence ( x : = x ( t ) ) is omitted whenever the meaning is obvious.

2. Cybersecurity in Networked Control Systems

Security is defined in computer science as having the following goals: confidentiality, integrity and availability [17] (Ch. 1). Confidentiality refers to keeping information or resources concealed from unauthorized access. Integrity means how much the information can be trusted that it has not been modified by an unauthorized third party (attacker). Availability can be regarded as the access to information in a timely manner (availability to the information can be withhold or denied through a security breach). These concepts can be transferred to the security of cyber-physical systems, and in particular to networked control systems, but their meaning holds greater weight. A security breach in cyber-physical systems involving control loops on real physical process can have disastrous consequences, affecting the stability and safety of the system. This can be seen more clearly from an attacker’s perspective, in terms of disclosure attacks, deception attacks, and disruption attacks, which correspond to the three security goals mentioned above [18].
Although disclosure attacks are of greater interest in information-theoretic studies [19] (e.g., eavesdropping), in networked control systems, this can also have dire consequences because a malicious third party can have access to data involving the dynamics of the physical process, which can be further used in more complex cyberattacks in the future (inference attacks). In discussing deception and disruption attacks, we will make use of the generic networked control structure from Figure 1, where the cyberattacks are at the network level, either on the direct-actuator path ( a d p ) or the feedback-sensing path ( a f b ). In a deception attack the signals send through the network are corrupted, for example through false data injection (this is sometimes referred to as a man in the middle attack—MitM). Such attacks can be modeled as
u n [ k ] = u [ k ] + a d p [ k ] , y n [ k ] = y [ k ] + a f p [ k ] ,
and represent the strongest attacks from a control perspective, because they have the greatest impact on closed loop stability [18]. In a disruption attack, the signals are either blocked or delayed (e.g., denial of service—DoS), which induces time varying delays or packet loss in the control loop. If we consider packet loss, the attack can be modeled as
u n [ k ] = u [ k ] a d p [ k ] , y n [ k ] = y [ k ] a f p [ k ] ,
where a d p [ k ] and a f p [ k ] take the value 0 in case of an attack, and 1 otherwise. When considering a delay attack type, we can use the model
u n [ k ] = u [ k τ n τ a d p ] = u [ k τ n ] + ( u [ k τ n ] + u [ k τ n τ a d p ] ) a d p [ k ] , y n [ k ] = y [ k τ n τ a f p ] = y [ k τ n ] + ( y [ k τ n ] + y [ k τ n τ a f p ] ) a f b [ k ] ,
where τ n represents the nominal network transmission delay and { τ a d p , τ a f p } the attack induced delays. Note that if the nominal delay is less than the sample period, we can simplify the above model by letting τ n = 0 . Also, the distinction between the packet loss and the time delay variation case depends on the packet handling strategy at the receiving end: if the delay exceeds a certain threshold, the packet can be considered lost [9].
These three types of attacks are not mutually exclusive; different combinations can be imagined and implemented by an attacker. The damage of the attack depends also on factors like duration (how long are { a d p , a f p } active), attack profile (profile of the signals { a d p , a f p } ), or stealthiness (how long it takes to detect the attack) [19].
Next, we move our discussion towards the defense mechanisms for cyberattacks. We can group them according to the function they serve (prevention, detection or mitigation), or according to the level of intervention (high-level methods, from computer science and information technology, or low-level methods, from control and systems theory).
The high-level solutions for cyberattacks have been adapted from the information technology field [17]. Different cryptographic methods are used to assure the confidentiality, integrity, and authenticity of the data transmitted through the network. The main challenge here is the high computational needs of the algorithms, which makes them unsuitable for an important class of network control systems with energy constraints or with limited computational power and memory. Thus, the research community has started to develop new lightweight methods to meet those constraints, for both symmetric and asymmetric key cryptography. Symmetric key cryptography uses basic logical operations and is inherently more suitable for cyberphysical systems. Several lightweight stream and block ciphers have been designed, like CHACHA, EXPRESSO, Humming Bird, SIMON, or different AES-based versions [20]. Lightweight asymmetric methods have also been the focus of recent research; for example, in [21], the authors propose a key exchange protocol for Industry 4.0 that uses digital certificates based on lightweight Elliptic Curve Qu-Vanstone (ECQV) for trust building and key generation. In [22], a new source anonymous message authentication (SAMA) scheme is presented that allows online/offline computation, making it more versatile for devices with constrained computation power. The implementation of cryptographic methods offers significant protection against MitM and Replay attacks. On the other hand, DoS and distributed denial of service (DDoS) attacks are harder to mitigate using high-level methods, as they overload the computational and network resources that are already limited. Another category of cyber attacks aims to exploit the software and hardware vulnerabilities of the elements composing the network control loop. In these cases, the mitigation solutions also adopt specific techniques from the information technology domain like the use of firewalls and intrusion detection and prevention systems. For example, ref. [23] evaluates the performance of an industrial application-layer firewall, as its use may have an impact on the network delay and jitter and can severely alter the network control performance and stability. The authors develop and validate simple models for the firewall that can be used by engineers for control loop design. Modern methods, using deep packet inspection, have also been proposed to identify malicious traffic and filter attacks. For example, ref. [24] evaluates the mitigation performances of three open source next-generation firewalls (Snort, Suricata, Bro), by addressing known attacks exploiting Modbus/TCP vulnerabilities. Finally, ref. [25] proposes a machine learning method for intrusion detection in industrial control systems (ICS) to cope with unknown attacks, which cannot be detected based on specific signatures. The authors present a detection model that addresses the imbalanced nature of the ICS datasets, by filtering out anomaly traffic from normal one, and identify unknown attacks, by comparing anomaly traffic with known attack traffic. Experimental results show high detection rate of unknown attacks. To sum up, although high-level solutions are available from computer science and information technology, these may not always be suitable or available for networked control systems that have real-time constraints with limited software and hardware capabilities.
Low-level approaches have been the focus of the control community, especially on detection and mitigation, as alternatives with lower resource needs, and which integrate better with the baseline control structure. The most often encountered prevention approach is based on randomization methods [18]. For example, in addressing confidentiality attacks, ref. [26] proposed a randomization approach by switching between different stabilizing control gains from a given set. On detection and mitigation, there are several approaches proposed in the literature, usually specific to different attack types or class of systems [27]. In ref. [28], an event triggering resilience mechanism is proposed for sensor DoS attacks. The event based system, as an alternative to a sample based system, is regarded as being more tolerant to network delays and packet loss, and leads to less communication consumption. The resulting event based controller, together with the DoS attacks modeled as time delays, are tested and validated in simulations. A different approach is proposed in ref. [29] for MitM attacks, called physical authentication or watermarking. The idea refers to injecting a known noisy input to the system, of which the attacker has no information. The effect is expected to be visible at the level of the measured outputs. The approach is tested on a linear discrete plant, with an LQG controller. The watermarking algorithm proposed ensures a trade off between detection and control performances. A robust control approach is explored in ref. [30], where unknown time delays and stochastic malicious attacks are considered. An H controller is designed in terms of linear matrix inequalities (LMIs). Although the results are validated in simulations on simple linear plants, the LMIs could prove to be conservative in real life applications. An interesting idea is given in [31], where the cyber security problem is represented as a two player stochastic game, between the controller and an attacker, which have antagonistic objectives. A model predictive controller which adapts its receding horizon depending on the attack, and calls at each prediction step a particle swarm optimization algorithm, is designed and tested in a formation control simulation scenario. In ref. [32], the authors designed an adaptive neural network for detection of deception attacks. The online tuning of the neural network was performed through a Kalman filter. The technique is validated on UAV cyberattack scenarios.
Most cyberattack mitigation approaches encountered in engineering practice are high-level. However, there are some situations when high-level methods do not work, or they need to be complemented by low-level methods. The cybersecurity of networked control systems with UAVs is an emergent field [27], with relatively few studies in the literature on the cyberattack mitigation of networked control of drones with real life experiments. The most important attacks to consider for networked control of low cost drones are disruption and deception attacks, as these can directly affect the stability and safety of the system. Consequently, in this paper, we will present a new low-level approach to detect and mitigate DoS and MitM attacks, in order to ensure the resilience of the system. Our approach has the advantage that it is relatively straightforward and intuitive to design, requires low online computational power, and proves to be efficient in experiments on small drones.

3. Networked Control for Small Drones

We start from the baseline network control structure from Figure 2. The control structure is split into an inner loop and an outer loop. This relies on the assumption that the inner loop is much faster than the outer loop [2]. The inner loop controller is onboard the drone and controls the attitude (Euler angles—pitch, roll, yaw) and the altitude, based on onboard estimates from a Kalman filter. The outer loop control runs on a remote computer, uses the measurements from a motion capture system, and controls the X Y positions. It is important to note that the network is only on the direct path, because the position feedback is performed through the motion capture cameras. The networked control structure has the following benefits: (i) it addresses the drone hardware limitations, by moving a part of the control on a remote computer (outer control loop); (ii) it permits accurate position measurements from a motion capture system like OptiTrack (as alternative to onboard measurements and estimates); and (iii) the transmission delays and packet loss due to wireless transmissions are minimized by sending smaller data packets only one way.
In the next subsections, we describe the mathematical model of the drone, the inner control loop, and the outer control loop.

3.1. Drone Model

We define the pose P = [ ξ T η T ] T = [ x y z ϕ θ ψ ] T (see Figure 3), where the position in the world frame is given by { x , y , z } , and the orientation by the Euler angles ϕ (roll), θ (pitch), and ψ (yaw). The dynamic model of the drone, developed using the Euler–Lagrange formalism, is given by
x ¨ = [ c ( ϕ ) s ( θ ) c ( ψ ) + s ( ϕ ) s ( ψ ) ] U c o l l m y ¨ = [ c ( ϕ ) s ( θ ) s ( ψ ) s ( ϕ ) c ( ψ ) ] U c o l l m z ¨ = g + c ( ϕ ) c ( θ ) U c o l l m ϕ ¨ θ ¨ ψ ¨ = J 1 ( η ) U ϕ U θ U ψ C ( η , η ˙ ) η ˙
where J ( η ) denotes the Jacobian matrix and C ( η , η ˙ ) the Coriolis matrix. The full expressions are not given here, due to space constraints (for more details, see [33]). The control inputs are the torques on the three rotational axes U ϕ , U θ , U ψ , and the collective force U c o l l . The drone parameters are: mass m, gravitational acceleration g, and inertia moments on the X, Y, and Z axis ( I x , I y , I z ).
The nonlinear model (4) can be written in the state space form as
x ˙ = f ( x , u ) ,
with the state vector x = [ x y z ϕ θ ψ x ˙ y ˙ z ˙ ϕ ˙ θ ˙ ψ ˙ ] T and the input vector u = [ U c o l l U ϕ U θ U ψ ] T . Let the equilibrium point in hovering mode be x e = [ x e y e z e 0 1 × 9 ] T , with inputs u e = [ U c o l l e 0 0 0 ] T . The linearized model can be determined as
x ¨ = θ g y ¨ = ϕ g z ¨ = Δ U c o l l m ϕ ¨ = U ϕ I x θ ¨ = U θ I y ψ ¨ = U ψ I z
where Δ U c o l l = U c o l l m g . This model can also be written in standard linear state space form as
x ˙ l = A x l + B u l
where x l = x x e and u l = u u e , and the expressions for the matrices A and B are omitted due to space restrictions.

3.2. Inner Control Loop

Here, we design the inner loop for attitude (Euler angles) and altitude (z position) control. We first define the state vector for the inner loop x i = [ z , ϕ , θ , ψ , z ˙ , ϕ ˙ , θ ˙ , ψ ˙ ] T . Based on the linear model (6), the subsystem involving attitude and altitude can be extracted as
x ˙ i = A i x i + B i u l
A linear state feedback control will be further designed for tracking:
u l = K i e i = K i ( x i z r ϕ r θ r ψ r 0 4 × 1 ) ,
where z r is the altitude reference, which for simplification purposes will be considered constant (in the general case, when the altitude reference is not constant, it would need to be provided through the network). ψ r is the yaw orientation reference, which is considered zero for the purpose of position tracking control (we assume that the drone keeps the same orientation during position tracking). ϕ r and θ r are virtual control inputs provided by the outer control loop through the network (Figure 2): u o c n = [ ϕ r θ r ] T . The feedback gain K i can be designed using a linear quadratic regulator (LQR) approach [34], which implies minimizing the following objective function:
J i = 0 ( x i T Q i x i + u l T R i u l ) d t ,
where Q i and R i are diagonal matrices, representing state and control inputs weights.

3.3. Outer Control Loop

For the outer control loop of the structure from Figure 2, we consider ideally that ϕ ϕ r , θ θ r , ψ ψ r = 0 and z z r = z e (the inner control loop is faster than the outer loop control). Consequently, the inner loop can be modeled in a simplified manner, by also using the first two equations from (6):
x ˙ o = A o x o + B o u o c
where
x o = x y x ˙ y ˙ , A o = 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 , B o = 0 0 0 0 0 g g 0 , u o c = ϕ r θ r .
At this point, we consider that there are no delays or packet loss: u o c = u o c n . We further design a state feedback controller for this linear state space model,
u o c = K o e o = K o ( x o x r y r 0 2 × 1 ) .
The gain K o can again be designed for tracking using an LQR approach, i.e., by minimizing the objective function
J o = 0 ( x o T Q o x o + u o c T R o u o c ) d t ,
where Q o and R o are state and control inputs weights. x r and y r are the reference positions in the horizontal plane at a given altitude.

4. Resilience to Cyber Attacks

In this paper, we propose the networked control structure resilient to cyberattacks from Figure 4. As discussed in Section 2, we mainly consider two types of cyberattacks: DoS and MitM. We interpret the DoS attack as an increase in the network time delay τ . If the delay increases over a predefined threshold τ m a x , we consider that the communication is interrupted. Thus, we define a manageable DoS attack when τ ( t ) < τ m a x , and a major attack when τ ( t ) > τ m a x . We interpret the MitM attack as an additive disturbance on the command sent through the network. If the disturbance is slow-varying or piece-wise, with amplitude smaller than the saturation limit | u o c n ( t ) | < u m a x , we define the attack to be sneaky, but manageable. If the disturbance is fast varying, and pushes the command u o c n ( t ) in saturation, we consider again that in this case the communication is interrupted (major attack).
For major cyberattacks, either DoS when τ ( t ) > τ m a x or MitM when | u o c n ( t ) | > u m a x , for a number of consecutive sample instances greater than a predefined threshold k a , we consider the communication as interrupted. In this case, the practical solution is to activate a back-up position controller onboard the drone (not shown in Figure 4), that stabilizes the drone in hovering, and eventually ensure a safe landing procedure. This gives time for higher level security responses to the cyberattack.
For manageable cyberattacks, our solution consists of using a combination between a RG and an UIDO. The RG changes the reference signals such that the systems remains in a safe region (the states satisfy some predefined safety constraints) [14], while the UIDO estimates unknown inputs and helps the controller to compensate their effect [35]. We consider also that the states x o are available: the positions are directly accessible from OptiTrack measurements, while the velocities we can calculate through numerical differentiation.
The next subsections will present different designs for this approach, depending on the attack type—DoS or MitM. Although the attacks are treated separately for reasons of simplicity and clarity, the control structure from Figure 4 can be designed to be resilient to both types of attacks.

4.1. Reference Governor for DoS Attack

Here, we consider the DoS (manageable) attack as a change in time-varying network transmission delay that affects the control signal from Figure 4:
u o c n [ k ] = u o c [ k τ d ] ,
where τ d is the discrete delay, considered as a multiple of the sampling period T s o ( τ d = τ T s o ). We assume the baseline outer loop controller can handle some delay variation, such that the systems remains stable (if this does not hold, one can design an additional time delay compensator for a nominal/average value of the delay).
In addressing the resilience to a DoS attack based on the approach from Figure 4, we will restrict our attention only to the X axis movement, since our outer loop model assumes that the movement on the X and Y axes are decoupled. The whole discussion can also be adapted easily to the Y axis. We first extract from (11) just the part related to the X axis movement:
x ˙ o x = A o x x o x + B o x u o c x y x = C o x x o x
where
x o x = x x ˙ , A o x = 0 1 0 0 , B o x = 0 g , u o c x = θ r , C o x = 1 0 .
Because the RG framework is usually in discrete-time, we discretize (15) through the zero order hold method [34], and add the delay model (14):
x o x [ k + 1 ] = A o x d x o x [ k ] + B o x d u o c x [ k τ d ] y x [ k ] = C o x d x o x [ k ] ,
where k the index of the current sampling instance. The control law for the X axis is
u o c x [ k ] = K o x ( x o x [ k ] x r [ k ] ) ,
with x r [ k ] = [ x r [ k ] 0 ] T . As indicated in ref. [36], we can define τ d additional states x i d [ k ] = x [ k ( τ d ( i 1 ) ) ] x r [ k ( τ d ( i 1 ) ) ] (where i = 1 , , τ d ), such that closed loop system can be written as
x e o x [ k + 1 ] = A e o x x e o x [ k ] + B e o x x r [ k ] y e x [ k ] = C e o x x o e x [ k ] ,
with the extended state vector x e o x = [ x o x [ k ] T x 1 d [ k ] T x τ d d [ k ] T ] T and
A e o x = A o x d B o x d K o x 0 2 0 2 0 2 0 2 I 2 0 0 2 0 2 0 2 I 2 I 2 0 2 0 2 0 , B e o x = 0 2 I 2 , C e o x = C o x d 0 2 0 2 .
We further design the RG for (18) considering that all of the states are accessible (a buffer can be used to store the delayed state values). Instead of applying directly the reference x r , we will use the RG to calculate at each time instance the virtual reference v x which, if held constant from the current time onward, will make the output satisfy some safety constraint. With this idea in mind, we define the polytopic constraint for the output
y e x [ k ] Y s : = { y e x : S y e x s } ,
where s is the safety limit, while S provides additional freedom for linear combinations of outputs. The maximal admissible set (MAS) is defined as the set of all initial states and constant inputs, such that the outputs constraint (19) is satisfied for all future times [14]:
O : = { ( x e o x 0 , v x 0 ) R 3 + 2 τ d : x e o x [ 0 ] = x e o x 0 , v x [ k ] = v x 0 , y e x [ k ] Y s , k Z + } .
Next, the output y e x can be calculated explicitly depending on the initial conditions x e o x 0 and constant input v x 0 :
y e x [ k ] = C e o x A e o x k x e o x 0 + C e o x ( I A e o x ) 1 ( I A e o x k ) B e o x v x 0
Consequently, the MAS (20) can be defined by an infinite number of inequalities:
O : = { ( x e o x 0 , v x 0 ) R 3 + 2 τ d : H x x e o x 0 + H v v x 0 h } ,
with H x = [ C e o x A e o x k ] , H v = [ C e o x ( I A e o x ) 1 ( I A e o x k ) B e o x ] , h = [ s T s T ] T . However, to make the computation tractable, we want the matrices H x , H v and h to be finite dimensional. It is proved in ref. [37] that we can always calculate an inner approximation of O through the use of the steady state value of y e x :
y e x s s : = ( C e o x ( I A e o x ) 1 B e o x ) v x 0 ( 1 ϵ ) Y s ,
where 0 < ϵ 1 is a steady state margin. Thus, by introducing (23) in (22), there always exists a finite prediction time k * for which all future time steps ( k > k * ) make the inequalities become redundant [14]. This gives us the finitely determined inner approximation of O , denoted further as O ˜ .
The delay τ d is actually time varying in network transmissions. Here, we assume that the delay is piecewise constant (when this does not hold in practice, we can always adopt an averaging approach in order to eliminate jitters), and that it can take values in the set D τ d = { 1 , 2 , 3 , , τ d m a x } . Through a so-called time stamping technique, we can actually determine online an estimation of the time delay variation [9]. Because the MAS can be calculated offline, we can calculate a priori several MASs for (18) for each delay values from D τ d . Then, we just have to switch online between the different MASs corresponding to the current estimated delay τ d .
We can now introduce the scalar RG that calculates online the virtual reference v x , based on the equation
v x [ k ] = v x [ k 1 ] + k ( x r [ k ] v [ k 1 ] ) ,
where k is determined by solving the following linear program:
maximize k [ 0 , 1 ] k subject to ( x e o x [ k ] , v x [ k ] ) O ~ , v x [ k ] = v x [ k 1 ] + k ( x r [ k ] v [ k 1 ] ) .
Note that when k = 0 , we obtain v x [ k ] = v x [ k 1 ] . This means that, in order to keep the system safe, we can not change the reference for the current time moment. When there are no violations of the constraint, we obtain k = 1 and thus v x [ k ] = x r [ k ] .
To sum up, in case of a DoS attack, we assume step changes in τ d . This change can be estimated online, and the MAS is switched accordingly, such that the RG can predict possible safety constraint violations and adapt the virtual reference sent to the system.

4.2. Unknown Input Disturbance Observer and Reference Governor for MitM Attack

We assume that the MitM (manageable) attack ca be modeled as an additive slow-varying or piece-wise disturbance
u o c n [ k ] = u o c [ k ] + d [ k ] .
As in the previous subsection, the resilience to a MitM attack, based on the approach from Figure 4, is discussed only for X axis movement (but this can also be easily adapted to the Y axis). The zero order hold discretization of (15) along with this new input can be written as
x o x [ k + 1 ] = A o x d x o x [ k ] + B o x d u o c x [ k ] + B o x d d x [ k ] y x [ k ] = C o x d x o x [ k ] ,
First, we want to design the UIDO such that we can estimate the disturbance (i.e., to detect the attack). Considering the disturbance model d [ k + 1 ] = d [ k ] , the observer can be designed based on (27) extended with this additional state [38]:
x ^ d o x [ k + 1 ] = A d o x x ^ d o x [ k ] + B d o x u o c x [ k ] + L x ( y x [ k ] C d o x x ^ d o x [ k ] ) d ^ x [ k ] = C d o d x ^ d o x [ k ] ,
with
x ^ d o x = x ^ o x d ^ x , A d o x = A o x d B o x d 0 1 × 2 1 , B d o x = B o x d 0 , C d o x = C o x d 0 , C d o d = 0 0 1 .
The observer gain L x can be determined through pole placement. The control law (17) for the X axis can now be extended with a disturbance compensation term,
u o c x [ k ] = K o x ( x o x [ k ] x r [ k ] ) d ^ x [ k ] .
Through this approach, the disturbance can be compensated completely at least in steady state, and keep the system stable, despite the attack. However, due to the convergence time needed by the observer, we can still have transients that can violate our safety constraints. Thus, we proceed by adding a RG on top of the closed loop system formed by coupling (27) and (28) with (29):
x e o x [ k + 1 ] = A e o x x e o x [ k ] + B e o x x r [ k ] + B e o x d d x [ k ] y e x [ k ] = C e o x x o e x [ k ] .
The state vector for the closed loop system is x e o x = [ x o x T x ^ d o x T ] T .
Now, we have to adapt the RG design presented in the previous subsection for the case of an input disturbance d x . Because d x is not accessible for measurements, when adopting model (30) for the RG, we will actually use an upper bound of the estimated disturbance d ^ x . We first split the disturbance set into several intervals,
{ ( d m , d m 1 ] , , ( d 2 , d 1 ] , ( d 1 , d 0 ] , ( d 0 , d 0 ) , [ d 0 , d 1 ) , , [ d m 1 , d m ) } .
The number of intervals is limited by the maximum disturbance d m which, in our case, is given by the command saturation limit d m = u m a x . Whenever the estimated disturbance is in one of these intervals, the RG will use the upper bound of the absolute value (e.g., for [ d 1 , d 2 ) , the bound is d 2 , and for [ d 3 , d 2 ) , the bound is d 3 ). The only exception is the middle interval ( d 0 , d 0 ) , for which we impose the “bound” 0 for practical reasons (in practice the UIDO can estimate additional effects like model uncertainty, noise, or other unmodeled disturbances). Thus, we will work with piece-wise disturbance bounds, switched depending on the disturbance online estimate, which are fed to the RG.
Let us denote the discrete disturbance bound as d ¯ x , which can take values in the set D d = { d m , , d 1 , 0 , d 1 , , d m } . The MAS for constraint (19) can be recalculated (without the delay) as
O : = { ( x e o x 0 , v x 0 , d ¯ x 0 ) R 6 : H x x e o x 0 + H v v x 0 + H d d ¯ x 0 ) h } ,
based on the output response with
y e x [ k ] = C e o x A e o x k x e o x 0 + C e o x ( I A e o x ) 1 ( I A e o x k ) B e o x v x 0 + C e o x ( I A e o x ) 1 ( I A e o x k ) B e o x d d ¯ x 0 .
Because we assume that, in a steady state, the disturbance is completely compensated (i.e., the disturbance vanishes in steady state), for the finite inner approximation O ~ we will use the same steady state condition (23). Several MASs can be computed offline for each disturbance bound from D d . We can further use the same RG online as the one defined by (24), but now the MASs are switched depending on corresponding bound d ¯ x of the estimated disturbance.
Thus, in case of a MitM attack, we assume step changes in d . The disturbance is estimated and compensated in steady state through UIDO and controller, while the transients that can cause safety constraints violations are taken into account by the RG, which changes the virtual reference accordingly.

5. Experiments

This section will present some experimental results for the two cyberattack scenarios discussed throughout the paper: DoS and MitM. The experimental setup is given in Figure 5. The Parrot Mambo drone (Figure 3) communicates wireless via Bluetooth with a remote computer (Intel i7 processor, 16GB RAM, Windows 11). The Parrot Mambo drone has 0.18 × 0.18 m, weights only 0.063 kg, and the propellers are actuated by four DC motors. As onboard sensors, the drone has an accelerometer, a gyroscope, an ultrasound sensor, a barometer, and a temperature sensor. The software interface with the sensors, actuators and network communication is made possible due to a firmware specifically developed for Matlab [39]. An OptiTrack motion camera system with four cameras is connected to the remote computer. As software running on the computer, we used MATLAB and Simulink Real Time for networked control, and the OptiTrack Motive 1.8.0 software for data capturing, which communicates with Simulink through a middleware client-server application.
The parameters of the drone are given in Table 1. In the control structure from Figure 2, we first design the baseline inner loop and outer loop controllers. The following tuning matrices were adopted for the two LQRs:
Q i = d i a g ( [ 1000 500 500 1 100 10 10 10 ] ) · 0.001 , R i = d i a g ( [ 10 / 15 10000 10000 1000 ] ) , Q o = d i a g ( [ 1000 1000 20 20 ] ) , R o = d i a g ( [ 5000 5000 ] ) .
The weights for Q i and Q o were designed empirically through experiments, considering position weights larger than the velocity weights (it is more important for position to converge faster to equilibrium). The weights R i and R o were chosen such that, during experiments, under nominal conditions (when there are no cyberattacks), the control signals do not reach saturation. Through this design, we obtained in nominal operating conditions (i.e., when there is no cyberattack), an overshoot of less than 10 % , a settling time of less than 2 s, and a maximum steady state error of 0.1 m. For the inner loop control, the sampling period is limited by the hardware to T s i = 5 ms, while for the outer loop, the sampling period is limited by the Bluetooth transmissions and drone hardware. Our experiments revealed that a sampling period too small leads to a large amount of packet loss and large time-varying transmission delays of several hundreds milliseconds (this was also confirmed in [40]). On the other hand, a large sampling period makes the control miss important transient behavior of the real drone, with control performance deteriorating significantly. After multiple experiments with the Parrot Mambo drone, we arrived empirically at a compromise solution for the outer loop sampling period of T s o = 30 ms. The outer loop command saturation values are chosen as u m a x = 0.5 rad. For the inner loop, the states are estimated using a steady-state linear Kalman filter. For the outer loop, the states are obtained from the OptiTrack measurements.

5.1. DoS Attack

We adopt the maximum number of samples for the delay τ d m a x = 10 (i.e., τ m a x = 0.3 s), and then calculate offline several MASs for different possible transmissions delays, from 1 to τ d m a x . The delay bound was adopted considering maximum network latency values under high channel load, receiving buffer size, but also the stability margin of the system. A scalar RG is designed and implemented for X axis, and one for Y axis, according to the methodology from Section 4.1. For the steady state approximation of the MASs, we adopt ϵ = 0.001 , such that we obtain a good enough approximation with reasonable computational effort. The time delay is estimated online using time stamps. As the time delay changes, due to communication disturbances or cyberattacks, the MAS is switched accordingly.
We emulate a DoS attack by considering a sudden increase in the network transmission delay. Several experiments were conducted for different delay values. Here, for illustrative purposes, we will show two representative DoS attacks: one for a delay of six samples (DoS attack 1) and one for a delay of eight samples (DoS attack 2).
For DoS attack 1, we increase the network transmission delay from one sample to six samples, at time moment t = 23 s. In this scenario, the drone moves on the X axis, tracking multiple step references (equivalent results could have been shown for the Y axis). The constraint on X axis is s = 1 , i.e., the safe space on X is [ 1 , + 1 ] m. Figure 6 shows the results using the baseline network control structure without the RG. The first 10 s are the take off initialization phase. The tracking controller exhibits some steady state error due to modeling uncertainties, but we consider the control performances satisfactory for the purpose of this paper—i.e., resilience to cyberattacks. It can be noticed that due to the increase in the network transmission delay (DoS attack), the step reference at time t = 25 s induces oscillations that violate the constraint (dashed green horizontal line). This can be seen more clearly in the zoomed version from Figure 7. Figure 8 shows that when using the RG approach proposed in this paper (see the control structure from Figure 4), the safety constraints are no longer violated, thus ensuring resilience to this type of cyber attack. This is performed through the fact that the RG anticipates the safety constraint violation based on the model and the time delay information, and as response it increases the reference more gradually (slowly), as shown in Figure 9, thus reducing the oscillations. The reference is first increased to a value of about 0.86 m, and it gradually reaches the desired reference value after 0.5 s.
DoS attack 2 implies a delay of eight samples, with the same scenario described previously. When we use the baseline control structure, the safety constraint are violated as before. If we add the RG for low-level cyberattack mitigation, we obtain the result from Figure 10, where we can see that response is with damped oscillations, and it does not violate the safety constraint. The RG modifies the reference as shown more clearly in the zoomed version from Figure 11: the reference is first increased to a value of about 0.82 m, and only after 0.85 s it reaches the desired reference value.
So, the RG changes the references more gradually depending on the delay induced by the DoS attack such that the safety constraints are enforced. The safety constraints are important because they could represent an obstacle or a wall in real life applications.

5.2. MitM Attack

We emulate the MitM attack by an additive piecewise disturbance on the control signal. The disturbance input is detected by the UIDO, and then compensated in steady state. The gain of the UIDO was designed through pole placement: L x = [ 0.2376 0.6259 0.0559 ] T . A RG is designed to account for the transient regime during compensation. Several MASs are computed offline for different intervals of the disturbance: [ 0.5 , 0.3 ] , [ 0.3 , 0.1 ] , [ 0.1 , 0.1 ] , [ 0.1 , 0.3 ] , [ 0.3 , 0.5 ] . For each interval, the worst case values are actually computed for the MAS: e.g., a disturbance in the interval [ 0.1 , 0.3 ] is adopted as 0.3 . Because the UIDO estimates also the effect of model uncertainties and network delay effect, the interval [ 0.1 , 0.1 ] is neglected, i.e., the MAS is computed for a zero disturbance. The RG switches the MAS according to the estimated disturbance. We assume the disturbance is slow varying or piecewise constant. Because the saturation limit is ± 0.5 , the disturbance can not be larger than this limit.
We consider a scenario when the drone follows step reference signals on the X axis (an equivalent scenario could have been shown on the Y axis). Several experiments were conducted for different disturbance amplitudes and timings. Here, for illustrative purposes, we will show two representative MitM attacks: one of disturbance amplitude 0.3 (MitM attack 1) and one of amplitude 0.4 (MitM attack 2).
The MitM attack 1 consists of a step disturbance of amplitude 0.3 . Figure 12 shows the effect of the attack (disturbance) on the baseline control, when there is no UIDO or RG. The vertical dashed green line indicates the onset of the attack. Although the control manages to stabilize the drone, the steady state offset is very large, and there is no way of controlling the drone such that it remains in a safe region.
Figure 13 shows the systems response to the attack when we add the UIDO. The disturbance effect is compensated in steady state, but the transient regime, due to the observer convergence time, may still cause safety problems. The problem with the transient regime can not be eliminated by further tuning the observer gains (increasing the gains further actually induces oscillations in the control loop). Figure 14 illustrates the scenario when the reference changes after the onset of the attack, which causes damped oscillations in the systems response. Due to these oscillations, the drone violates the safety constraint shown with dashed green horizontal line. This can be seen more clearly in the zoomed version (Figure 15). This shows that using just an UIDO can not always ensure safety in case of MitM cyberattacks, due to the observer convergence time.
When we add also the RG, which uses the disturbance estimate provided by the UIDO, and thus use the control structure from Figure 4, we obtain the results from Figure 16. The RG anticipates the transient regime due to the UIDO, and increases the reference in slower steps (first to a value of about 0.57 m, and it gradually reaches the desired value after 0.17 s), thus reducing the oscilations. The fact that the the safety constraints are now enforced by the combination of RG and UIDO can be seen more clearly in the zoom version from Figure 17.
The MitM attack 2, when the disturbance has amplitude 0.4, also violates the safety constraints when we use only the baseline control structure. When we adopt our low-level mitigation approach, with UIDO and RG, we obtain the results from Figure 18. As seen also in the zoomed version from Figure 19, the RG now changes more drastically the reference by keeping it constant for a few samples, and then increasing it slowly to its desired values (reaching the desired value after 0.34 s), in such a manner that the safety constraints are not violated.
So, one can conclude that the RG modifies the reference slower, depending on the severity of the MitM attack and possible safety violations, and may even keep the reference constant (i.e., keep the previous value) for several sample instances. Although in above presented scenarios the RG still managed to increase the reference to its final desired value, in case of major cyber attacks, depending on the scenario, the RG may choose to keep the reference constant (i.e., hold the previous reference value), until the attack passes or it is mitigated at a higher level.

6. Conclusions

In this paper, we have proposed a new resilient networked control architecture for small drones. Because of the sensing and computational limitations of such drones, the control structure was split in an inner loop and an outer loop. Our focus was on the outer loop which controls the positions in the horizontal plane. We considered the case when the network is only on the direct path, while the sensing needed for the feedback path is provided by OptiTrack cameras connected to a remote computer. Two types of cyberattacks were considered: DoS, emulated as a switch in the network transmission delay, and MitM, emulated as additive piecewise input disturbances. The DoS attack, i.e., the change in the network time delay, can be detected through time stamping.
The main contribution of the study consists of the low level mitigation approach to these attack types, with application to low cost small UAVs, based on the structure from Figure 4. The mitigation for the DoS attack implies adopting a RG that uses the delay estimate and the system’s model to predict future safety violations, and adapts the reference accordingly. The MitM attack is detected by an UIDO. The attack is rejected in steady state through a disturbance compensation loop, while the possible transients that can cause safety violations are predicted by a RG, and the reference is again adapted in concordance. We show real time experimental validations of both approaches on a Parrot Mambo drone.
The results with the DoS attack illustrate that our approach ensures stability and safety for network transmission delays of up to 0.3 s. For the MitM attack, the attack bound is given by the saturation limit, which in our case was 0.5 rad. The experimental results illustrate that the safety constraints are enforced despite this type of attacks. In both attack cases, our approach implies to temporally sacrifice reference tracking in case of cyberattacks, in order to preserve stability and safety. The low-level mitigation approach with RG and UIDO is independent of the controller, so it can be augmented on other drones with different baseline controllers. In case of major cyberattacks, when these bounds are violated for a number of consecutive samples, we considered that we actually have an interruption in the network transmissions, and the drone switches to a back-up onboard position controller that ensures safe landing.
As a future work, we will focus on increasing the control robustness to model uncertainty, and extend the whole approach to cooperative resilient control of multiple drones.

Author Contributions

Conceptualization, O.Ș. and A.C.; methodology, A.C.; software, O.Ș.; validation, O.Ș. and A.C.; formal analysis, A.C.; investigation, O.Ș. and A.C.; resources, O.Ș. and A.C; data curation, O.Ș.; writing—original draft preparation, O.Ș. and A.C.; writing—review and editing, O.Ș. and A.C.; visualization, O.Ș. and A.C.; supervision, A.C.; project administration, A.C.; funding acquisition, A.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by project ARUT no. 3/1.07.2024, funded through the GNAC ARUT 2023 competition.

Data Availability Statement

The data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Mohsan, S.A.; Othman, N.Q.; Li, Y.; Alsharif, M.H.; Khan, M.A. Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends. Intel. Serv. Robot. 2023, 16, 109–137. [Google Scholar] [CrossRef] [PubMed]
  2. Marshall, J.; Sun, W.; L’Afflitto, A. A survey of guidance, navigation, and control systems for autonomous multi-rotor small unmanned aerial systems. Annu. Rev. Control 2021, 52, 390–427. [Google Scholar] [CrossRef]
  3. Emran, B.; Najjaran, H. A review of quadrotor: An underactuated mechanical system. Annu. Rev. Control 2018, 46, 165–180. [Google Scholar] [CrossRef]
  4. Nascimento, T.; Saska, M. Position and attitude control of multi-rotor aerial vehicles: A survey. Annu. Rev. Control 2019, 48, 129–146. [Google Scholar] [CrossRef]
  5. Huang, S.; Teo, R.; Tan, K. Collision avoidance of multi unmanned aerial vehicles: A review. Annu. Rev. Control 2019, 48, 147–164. [Google Scholar] [CrossRef]
  6. Tahir, A.; Böling, J.; Haghbayan, M.H.; Toivonen, H.T.; Plosila, J. Swarms of Unmanned Aerial Vehicles—A Survey. J. Ind. Inf. Integr. 2019, 16, 100106. [Google Scholar] [CrossRef]
  7. Buşoniu, L.; Varma, V.S.; Lohéac, J.; Codrean, A.; Ştefan, O.; Morărescu, I.C.; Lasaulce, S. Learning control for transmission and navigation with a mobile robot under unknown communication rates. Control Eng. Pract. 2020, 100, 104460. [Google Scholar] [CrossRef]
  8. Tipsuwan, Y.; Chow, M.Y. Control methodologies in networked control systems. Control Eng. Pract. 2003, 11, 1099–1111. [Google Scholar] [CrossRef]
  9. Stefan, O.; Dragomir, T.; Codrean, A.; Silea, I. Issues of identifying, estimating and using delay times in telecontrol systems based on TCP/IP networks. IFAC Proc. 2010, 43, 143–148. [Google Scholar] [CrossRef]
  10. Hespanha, J.P.; Naghshtabrizi, P.; Xu, Y. A survey of recent results in networked control systems. Proc. IEEE 2007, 95, 138–162. [Google Scholar] [CrossRef]
  11. Stefan, O.; Codrean, A.; Dragomir, T.L. On the Robustness of Networked Control Systems with Quality of Service Adaptation Co-design. Control Eng. Appl. Inform. 2016, 18, 57–64. [Google Scholar]
  12. Annaswamy, A.M.; Johansson, K.H.; Pappas, G. (Eds.) Control for Societal-Scale Challenges: Road Map 2030; IEEE Control Systems Society Publication: New Delhi, India, 2023. [Google Scholar]
  13. Hsu, K.C.; Hu, H.; Fisac, J.F. The safety filter: A unified view of safety-critical control in autonomous systems. Annu. Rev. Control. Robot. Auton. Syst. 2023, 7, 47–72. [Google Scholar] [CrossRef]
  14. Liu, Y. Reference Governors for MIMO Systems and Preview Control: Theory, Algorithms, and Practical Applications; The University of Vermont and State Agricultural College: Burlington, VT, USA, 2022. [Google Scholar]
  15. Sandberg, H.; Gupta, V.; Johansson, K.H. Secure networked control systems. Annu. Rev. Control. Robot. Auton. Syst. 2022, 5, 445–464. [Google Scholar] [CrossRef]
  16. Di Cairano, S.; Kalabić, U.V.; Kolmanovsky, I.V. Reference governor for network control systems subject to variable time-delay. Automatica 2015, 62, 77–86. [Google Scholar] [CrossRef]
  17. Bishop, M. Computer Security Art and Science; Pearson: London, UK, 2019. [Google Scholar]
  18. Dibaji, S.M.; Pirani, M.; Flamholz, D.B.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. A systems and control perspective of CPS security. Annu. Rev. Control 2019, 47, 394–411. [Google Scholar] [CrossRef]
  19. Zhang, X.M.; Han, Q.L.; Ge, X.; Ding, D.; Ding, L.; Yue, D.; Peng, C. Networked control systems: A survey of trends and techniques. IEEE/CAA J. Autom. Sin. 2020, 7, 1–17. [Google Scholar] [CrossRef]
  20. Dutta, I.K.; Ghosh, B.; Bayoumi, M. Lightweight cryptography for internet of insecure things: A survey. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 475–481. [Google Scholar]
  21. Gaba, G.S.; Kumar, G.; Monga, H.; Kim, T.H.; Liyanage, M.; Kumar, P. Robust and lightweight key exchange (LKE) protocol for industry 4.0. IEEE Access 2020, 8, 132808–132824. [Google Scholar] [CrossRef]
  22. Wei, J.; Phuong, T.V.X.; Yang, G. An efficient privacy preserving message authentication scheme for internet-of-things. IEEE Trans. Ind. Inform. 2020, 17, 617–626. [Google Scholar] [CrossRef]
  23. Cheminod, M.; Durante, L.; Seno, L.; Valenzano, A. Performance evaluation and modeling of an industrial application-layer firewall. IEEE Trans. Ind. Inform. 2018, 14, 2159–2170. [Google Scholar] [CrossRef]
  24. Nyasore, O.N.; Zavarsky, P.; Swar, B.; Naiyeju, R.; Dabra, S. Deep packet inspection in industrial automation control system to mitigate attacks exploiting modbus/TCP vulnerabilities. In Proceedings of the 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing,(HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), Baltimore, MD, USA, 25–27 May 2020; pp. 241–245. [Google Scholar]
  25. Cao, Y.; Zhang, L.; Zhao, X.; Jin, K.; Chen, Z. An intrusion detection method for industrial control system based on machine learning. Information 2022, 13, 322. [Google Scholar] [CrossRef]
  26. Dibaji, S.M.; Pirani, M.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. Secure Control of Wide-Area Power Systems: Confidentiality and Integrity Threats. In Proceedings of the 2018 IEEE Conference on Decision and Control (CDC), Miami, FL, USA, 17–19 December 2018; pp. 7269–7274. [Google Scholar]
  27. Zacchia Lun, Y.; D’Innocenzo, A.; Smarra, F.; Malavolta, I.; Di Benedetto, M.D. State of the art of cyber-physical systems security: An automatic control perspective. J. Syst. Softw. 2019, 149, 174–216. [Google Scholar] [CrossRef]
  28. Sun, H.; Peng, C.; Zhang, W.; Yang, T.; Wang, Z. Security-based resilient event-triggered control of networked control systems under denial of service attacks. J. Frankl. Inst. 2019, 356, 10277–10295. [Google Scholar] [CrossRef]
  29. Mo, Y.; Weerakkody, S.; Sinopoli, B. Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs. IEEE Control Syst. Mag. 2015, 35, 93–109. [Google Scholar]
  30. Jing He, Y.L.; Yang, F. Robust control for a class of cyber-physical systems with multi-uncertainties. Int. J. Syst. Sci. 2021, 52, 505–524. [Google Scholar]
  31. Tiwari, A.; Smolka, S.A.; Esterle, L.; Lukina, A.; Yang, J.; Grosu, R. Attacking the V: On the Resiliency of Adaptive-Horizon MPC. In Proceedings of the Automated Technology for Verification and Analysis; D’Souza, D., Narayan Kumar, K., Eds.; Springer International Publishing: New York, NY, USA, 2017; pp. 446–462. [Google Scholar]
  32. Abbaspour, A.; Yen, K.K.; Noei, S.; Sargolzaei, A. Detection of Fault Data Injection Attack on UAV Using Adaptive Neural Network. Procedia Comput. Sci. 2016, 95, 193–200. [Google Scholar] [CrossRef]
  33. Máthé, A.K. Nonlinear Control for Commercial Drones in Autonomous Railway Maintenance. Ph.D. Thesis, Technical University of Cluj-Napoca, Cluj-Napoca, Romania, 2016. [Google Scholar]
  34. Franklin, G.; Powell, J.; Emami-Naeini, A. Feedback Control of Dynamic Systems; Pearson: London, UK, 2020. [Google Scholar]
  35. Chen, W.H.; Yang, J.; Guo, L.; Li, S. Disturbance-observer-based control and related methods—An overview. IEEE Trans. Ind. Electron. 2015, 63, 1083–1095. [Google Scholar] [CrossRef]
  36. Åström, K.J.; Wittenmark, B. Computer-Controlled Systems: Theory and Design; Courier Corporation: North Chelmsford, MA, USA, 2013. [Google Scholar]
  37. Gilbert, E.G.; Tan, K.T. Linear systems with state and control constraints: The theory and application of maximal output admissible sets. IEEE Trans. Autom. Control 1991, 36, 1008–1020. [Google Scholar] [CrossRef]
  38. Schrijver, E.; van Dijk, J. Disturbance Observers for Rigid Mechanical Systems: Equivalence, Stability, and Design. J. Dyn. Syst. Meas. Control 2002, 124, 539–548. [Google Scholar] [CrossRef]
  39. Matlab. Simulink Support Package for Parrot Minidrones; MathWorks: Natick, MA, USA, 2022. [Google Scholar]
  40. Scola, I.R.; Reyes, G.G.; Carrillo, L.G.; Hespanha, J.P.; Burlion, L. A Robust Control Strategy With Perturbation Estimation for the Parrot Mambo Platform. IEEE Trans. Control Syst. Technol. 2021, 29, 1389–1404. [Google Scholar] [CrossRef]
Figure 1. Cyberattacks in a networked control system.
Figure 1. Cyberattacks in a networked control system.
Drones 08 00552 g001
Figure 2. Baseline networked control structure from small drones.
Figure 2. Baseline networked control structure from small drones.
Drones 08 00552 g002
Figure 3. Coordinate frame for a small drone.
Figure 3. Coordinate frame for a small drone.
Drones 08 00552 g003
Figure 4. Networked control structure from small drones resilient to cyberattacks.
Figure 4. Networked control structure from small drones resilient to cyberattacks.
Drones 08 00552 g004
Figure 5. Experimental setup.
Figure 5. Experimental setup.
Drones 08 00552 g005
Figure 6. DoS attack 1 with a sudden increase in the network delay.
Figure 6. DoS attack 1 with a sudden increase in the network delay.
Drones 08 00552 g006
Figure 7. DoS attack 1 with a sudden increase in the network delay (zoomed).
Figure 7. DoS attack 1 with a sudden increase in the network delay (zoomed).
Drones 08 00552 g007
Figure 8. DoS attack 1 with a sudden increase in the network delay—resilience with RG.
Figure 8. DoS attack 1 with a sudden increase in the network delay—resilience with RG.
Drones 08 00552 g008
Figure 9. DoS attack 1 with a sudden increase in the network delay—resilience with RG (zoomed).
Figure 9. DoS attack 1 with a sudden increase in the network delay—resilience with RG (zoomed).
Drones 08 00552 g009
Figure 10. DoS attack 2 with a sudden increase in the network delay—resilience with RG.
Figure 10. DoS attack 2 with a sudden increase in the network delay—resilience with RG.
Drones 08 00552 g010
Figure 11. DoS attack 2 with a sudden increase in the network delay—resilience with RG (zoomed).
Figure 11. DoS attack 2 with a sudden increase in the network delay—resilience with RG (zoomed).
Drones 08 00552 g011
Figure 12. MitM disturbance attack 1.
Figure 12. MitM disturbance attack 1.
Drones 08 00552 g012
Figure 13. MitM disturbance attack 1 with UIDO.
Figure 13. MitM disturbance attack 1 with UIDO.
Drones 08 00552 g013
Figure 14. MitM disturbance attack 1 with UIDO and reference change.
Figure 14. MitM disturbance attack 1 with UIDO and reference change.
Drones 08 00552 g014
Figure 15. MitM disturbance attack 1 with UIDO and reference change (zoomed).
Figure 15. MitM disturbance attack 1 with UIDO and reference change (zoomed).
Drones 08 00552 g015
Figure 16. MitM disturbance attack 1 with UIDO and RG and reference change.
Figure 16. MitM disturbance attack 1 with UIDO and RG and reference change.
Drones 08 00552 g016
Figure 17. MitM disturbance attack 1 with UIDO and RG and reference change (zoomed).
Figure 17. MitM disturbance attack 1 with UIDO and RG and reference change (zoomed).
Drones 08 00552 g017
Figure 18. MitM disturbance attack 2 with UIDO and RG and reference change.
Figure 18. MitM disturbance attack 2 with UIDO and RG and reference change.
Drones 08 00552 g018
Figure 19. MitM disturbance attack 2 with UIDO and RG and reference change (zoomed).
Figure 19. MitM disturbance attack 2 with UIDO and RG and reference change (zoomed).
Drones 08 00552 g019
Table 1. Drone parameters.
Table 1. Drone parameters.
ParameterNotationValueUnits
Massm0.063kg
X-axis inertia moment I x 0.5829 · 10 4 kg m2
Y-axis inertia moment I y 0.7169 · 10 4 kg m2
Z-axis inertia moment I z 1.000 · 10 4 kg m2
Gravitational accelerationg9.8m/s2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ștefan, O.; Codrean, A. Networked Control of a Small Drone Resilient to Cyber Attacks. Drones 2024, 8, 552. https://doi.org/10.3390/drones8100552

AMA Style

Ștefan O, Codrean A. Networked Control of a Small Drone Resilient to Cyber Attacks. Drones. 2024; 8(10):552. https://doi.org/10.3390/drones8100552

Chicago/Turabian Style

Ștefan, Octavian, and Alexandru Codrean. 2024. "Networked Control of a Small Drone Resilient to Cyber Attacks" Drones 8, no. 10: 552. https://doi.org/10.3390/drones8100552

APA Style

Ștefan, O., & Codrean, A. (2024). Networked Control of a Small Drone Resilient to Cyber Attacks. Drones, 8(10), 552. https://doi.org/10.3390/drones8100552

Article Metrics

Back to TopTop