1. Introduction
Unmanned aerial vehicles (UAVs) are increasingly being used in a wide range of applications, from surveillance and disaster management, to infrastructure inspection, precision agriculture, or even emergency medical services [
1]. As a special subclass, small UAVs, which weight less than 1 kg and fly at velocities less than 10 m/s, are very popular due to their compact size and small cost, being used in several industries, from commercial and education, to research and military [
2]. Among the different types of small UAVs, the quadcopter is the most often encountered, due to its easy-to-understand flight principles, simple architecture, high maneuverability and vertical landing/take-off. Despite these advantages, there are several challenges and open problems that limit the performance of these type of drones in real life applications. First, the quadcopter is an unstable and nonlinear process, so the control design for stability and tracking is not a trivial matter [
3]. Second, not all of the states of the system are available, so different estimation algorithms need to be designed, depending on the available sensors, and whether the applications are indoor or outdoor [
4]. The controller is highly dependent on the accuracy of these estimates. Third, there are computational limitations, both at a software and hardware level, while the autonomy is extremely limited [
1]. Lastly, there is the problem of path planning, which is usually treated at a higher level, separated from the control problem [
2]. This involves the task of generating the sequence of waypoints from the drone’s current position to the target (goal) position (the reference trajectory sent to the controller), ensuring collision avoidance [
5], synchronization with other agents (robots or even manned vehicles) [
6], or the optimization of some resources like battery autonomy or wireless transmission signal strength [
7]. The interrelation between the control loop and path re-planning is an area of active research, and still represents a challenging task in practice.
As the systems in everyday applications become more and more interconnected, we can say that networked systems, and in particular networked control systems, are becoming ubiquitous [
8]. This brings multiple benefits like increased reliability and scalability, ease of maintenance and higher performances overall. However, the network can induces extra problems like packet loss (information loss), time varying transmission delays, or bandwidth limitations [
9]. Research in this field has focused on two areas: control over networks (i.e., to control one or multiple processes with a remote controller) [
10] and control of networks (i.e., optimize the network performance, e.g., in terms of Quality of Service parameters) [
11]. Networked control systems are highly used in applications with mobile robots (in particular drones), involving wide spatial areas, due to their increased autonomy. In such applications, using the already available computer networks infrastructure helps reduce costs and increases the overall performance. For small UAVs, moving a part of the control structure remotely helps in addressing the computational limitations mentioned before. Moreover, this permits a better integration between the control algorithm and the path planning algorithm, and facilitates extensions to cooperative control of multiple agents (robots).
One of the biggest challenges recently in using mobile robots in real life applications, involving interactions with other robots but also human–robot interaction, is ensuring safety and resilience [
12] (Ch. 4). Safety, from a Control Theory perspective, involves that the system is not only stable, but also that it operates in a certain predefined safe region, where the integrity of the robot and of the surrounding environment is ensured. Although safety has been traditionally addressed in the robotics community at a higher level, a multi-level approach is needed for the safety of complex autonomous system. To this end, mid-level and low-level solutions for safety are subject to intensive research, with notable solutions in this direction being the safety filter [
13] or the reference governor [
14]. Besides safety, it is important that the system is resilient to less frequent but severe disruptions, like cyberattacks, natural disasters, etc. Resilience is different from the classical concept of robustness through the fact that it considers major perturbations, which can be identified in real-time, and the nominal performances can be recovered in a non-conservative manner. Both from a safety and resilience perspective, cybersecurity of network control systems involving mobile robots represents an emerging research field [
15].
In this context, the current study proposes a networked control approach for small UAVs resilient to cyberattacks. We focus on indoor drone applications, where motion camera systems can provide position feedback, thus alleviating the sensing problem. The safety and resilience become of high priority, due to possible human–robot interactions and the constraint management needed in narrow closed environments. The original contribution consists of a mid-to-low-level approach in addressing the cybersecurity problem, by using a combination of a reference governor (RG) and a unknown input disturbance observer (UIDO). We focus on two often encountered types of cyberattacks: denial of service (DoS) and man in the middle (MitM). The DoS attack involves a sudden variation in the network time delay. Different from previous studies involving RG with time delays, like [
16], we consider here that the time delay variation can be estimated through a time stamping technique. We extend the RG to include the time delay model, such that it uses the online delay estimate to predict future safety violations, and adapts the reference accordingly. The MitM attack involves false data injection, and since our focus is on stealthy attacks, we model the attack as an additive slow varying input disturbance. For the detection and mitigation of such an attack, we use a combination of a RG with an UIDO. The disturbance is estimated by the UIDO and rejected in steady state. The RG is extended to predict possible transients during disturbance compensation that can cause safety violations, and again adapts the reference in accordance. We show real time experiments on a Parrot Mambo drone that validate our solution.
The paper is structured as follows.
Section 2 presents some preliminaries on the cybersecurity problem in networked control systems.
Section 3 presents the baseline networked control structure for small drones used, and how the controllers are designed.
Section 4 describes the resilient networked control structure, detailing the design of the RG and UIDO for detecting and mitigating the two types of attacks—DoS and MitM. The experiments on the real Parrot Mambo drone are presented in
Section 5, while
Section 6 discusses some final conclusions.
Notation. We denote by and the sets of real and integer numbers, and represents the set of positive integers. For a continuous signal f(t) sampled with a sampling period , we denote by the value at the kth sampling instance, i.e., . denotes the identity matrix of dimension , while represents the zero matrix of dimensions . and are shorthand notations for and . Throughout this paper, we use the dot convention for the time derivative (), and the time dependence () is omitted whenever the meaning is obvious.
2. Cybersecurity in Networked Control Systems
Security is defined in computer science as having the following goals: confidentiality, integrity and availability [
17] (Ch. 1). Confidentiality refers to keeping information or resources concealed from unauthorized access. Integrity means how much the information can be trusted that it has not been modified by an unauthorized third party (attacker). Availability can be regarded as the access to information in a timely manner (availability to the information can be withhold or denied through a security breach). These concepts can be transferred to the security of cyber-physical systems, and in particular to networked control systems, but their meaning holds greater weight. A security breach in cyber-physical systems involving control loops on real physical process can have disastrous consequences, affecting the stability and safety of the system. This can be seen more clearly from an attacker’s perspective, in terms of disclosure attacks, deception attacks, and disruption attacks, which correspond to the three security goals mentioned above [
18].
Although disclosure attacks are of greater interest in information-theoretic studies [
19] (e.g., eavesdropping), in networked control systems, this can also have dire consequences because a malicious third party can have access to data involving the dynamics of the physical process, which can be further used in more complex cyberattacks in the future (inference attacks). In discussing deception and disruption attacks, we will make use of the generic networked control structure from
Figure 1, where the cyberattacks are at the network level, either on the direct-actuator path (
) or the feedback-sensing path (
). In a deception attack the signals send through the network are corrupted, for example through false data injection (this is sometimes referred to as a man in the middle attack—MitM). Such attacks can be modeled as
and represent the strongest attacks from a control perspective, because they have the greatest impact on closed loop stability [
18]. In a disruption attack, the signals are either blocked or delayed (e.g., denial of service—DoS), which induces time varying delays or packet loss in the control loop. If we consider packet loss, the attack can be modeled as
where
and
take the value 0 in case of an attack, and 1 otherwise. When considering a delay attack type, we can use the model
where
represents the nominal network transmission delay and
the attack induced delays. Note that if the nominal delay is less than the sample period, we can simplify the above model by letting
. Also, the distinction between the packet loss and the time delay variation case depends on the packet handling strategy at the receiving end: if the delay exceeds a certain threshold, the packet can be considered lost [
9].
These three types of attacks are not mutually exclusive; different combinations can be imagined and implemented by an attacker. The damage of the attack depends also on factors like duration (how long are
active), attack profile (profile of the signals
), or stealthiness (how long it takes to detect the attack) [
19].
Next, we move our discussion towards the defense mechanisms for cyberattacks. We can group them according to the function they serve (prevention, detection or mitigation), or according to the level of intervention (high-level methods, from computer science and information technology, or low-level methods, from control and systems theory).
The high-level solutions for cyberattacks have been adapted from the information technology field [
17]. Different cryptographic methods are used to assure the confidentiality, integrity, and authenticity of the data transmitted through the network. The main challenge here is the high computational needs of the algorithms, which makes them unsuitable for an important class of network control systems with energy constraints or with limited computational power and memory. Thus, the research community has started to develop new lightweight methods to meet those constraints, for both symmetric and asymmetric key cryptography. Symmetric key cryptography uses basic logical operations and is inherently more suitable for cyberphysical systems. Several lightweight stream and block ciphers have been designed, like CHACHA, EXPRESSO, Humming Bird, SIMON, or different AES-based versions [
20]. Lightweight asymmetric methods have also been the focus of recent research; for example, in [
21], the authors propose a key exchange protocol for Industry 4.0 that uses digital certificates based on lightweight Elliptic Curve Qu-Vanstone (ECQV) for trust building and key generation. In [
22], a new source anonymous message authentication (SAMA) scheme is presented that allows online/offline computation, making it more versatile for devices with constrained computation power. The implementation of cryptographic methods offers significant protection against MitM and Replay attacks. On the other hand, DoS and distributed denial of service (DDoS) attacks are harder to mitigate using high-level methods, as they overload the computational and network resources that are already limited. Another category of cyber attacks aims to exploit the software and hardware vulnerabilities of the elements composing the network control loop. In these cases, the mitigation solutions also adopt specific techniques from the information technology domain like the use of firewalls and intrusion detection and prevention systems. For example, ref. [
23] evaluates the performance of an industrial application-layer firewall, as its use may have an impact on the network delay and jitter and can severely alter the network control performance and stability. The authors develop and validate simple models for the firewall that can be used by engineers for control loop design. Modern methods, using deep packet inspection, have also been proposed to identify malicious traffic and filter attacks. For example, ref. [
24] evaluates the mitigation performances of three open source next-generation firewalls (Snort, Suricata, Bro), by addressing known attacks exploiting Modbus/TCP vulnerabilities. Finally, ref. [
25] proposes a machine learning method for intrusion detection in industrial control systems (ICS) to cope with unknown attacks, which cannot be detected based on specific signatures. The authors present a detection model that addresses the imbalanced nature of the ICS datasets, by filtering out anomaly traffic from normal one, and identify unknown attacks, by comparing anomaly traffic with known attack traffic. Experimental results show high detection rate of unknown attacks. To sum up, although high-level solutions are available from computer science and information technology, these may not always be suitable or available for networked control systems that have real-time constraints with limited software and hardware capabilities.
Low-level approaches have been the focus of the control community, especially on detection and mitigation, as alternatives with lower resource needs, and which integrate better with the baseline control structure. The most often encountered prevention approach is based on randomization methods [
18]. For example, in addressing confidentiality attacks, ref. [
26] proposed a randomization approach by switching between different stabilizing control gains from a given set. On detection and mitigation, there are several approaches proposed in the literature, usually specific to different attack types or class of systems [
27]. In ref. [
28], an event triggering resilience mechanism is proposed for sensor DoS attacks. The event based system, as an alternative to a sample based system, is regarded as being more tolerant to network delays and packet loss, and leads to less communication consumption. The resulting event based controller, together with the DoS attacks modeled as time delays, are tested and validated in simulations. A different approach is proposed in ref. [
29] for MitM attacks, called physical authentication or watermarking. The idea refers to injecting a known noisy input to the system, of which the attacker has no information. The effect is expected to be visible at the level of the measured outputs. The approach is tested on a linear discrete plant, with an LQG controller. The watermarking algorithm proposed ensures a trade off between detection and control performances. A robust control approach is explored in ref. [
30], where unknown time delays and stochastic malicious attacks are considered. An
controller is designed in terms of linear matrix inequalities (LMIs). Although the results are validated in simulations on simple linear plants, the LMIs could prove to be conservative in real life applications. An interesting idea is given in [
31], where the cyber security problem is represented as a two player stochastic game, between the controller and an attacker, which have antagonistic objectives. A model predictive controller which adapts its receding horizon depending on the attack, and calls at each prediction step a particle swarm optimization algorithm, is designed and tested in a formation control simulation scenario. In ref. [
32], the authors designed an adaptive neural network for detection of deception attacks. The online tuning of the neural network was performed through a Kalman filter. The technique is validated on UAV cyberattack scenarios.
Most cyberattack mitigation approaches encountered in engineering practice are high-level. However, there are some situations when high-level methods do not work, or they need to be complemented by low-level methods. The cybersecurity of networked control systems with UAVs is an emergent field [
27], with relatively few studies in the literature on the cyberattack mitigation of networked control of drones with real life experiments. The most important attacks to consider for networked control of low cost drones are disruption and deception attacks, as these can directly affect the stability and safety of the system. Consequently, in this paper, we will present a new low-level approach to detect and mitigate DoS and MitM attacks, in order to ensure the resilience of the system. Our approach has the advantage that it is relatively straightforward and intuitive to design, requires low online computational power, and proves to be efficient in experiments on small drones.
4. Resilience to Cyber Attacks
In this paper, we propose the networked control structure resilient to cyberattacks from
Figure 4. As discussed in
Section 2, we mainly consider two types of cyberattacks: DoS and MitM. We interpret the DoS attack as an increase in the network time delay
. If the delay increases over a predefined threshold
, we consider that the communication is interrupted. Thus, we define a manageable DoS attack when
, and a major attack when
. We interpret the MitM attack as an additive disturbance on the command sent through the network. If the disturbance is slow-varying or piece-wise, with amplitude smaller than the saturation limit
, we define the attack to be sneaky, but manageable. If the disturbance is fast varying, and pushes the command
in saturation, we consider again that in this case the communication is interrupted (major attack).
For major cyberattacks, either DoS when
or MitM when
, for a number of consecutive sample instances greater than a predefined threshold
, we consider the communication as interrupted. In this case, the practical solution is to activate a back-up position controller onboard the drone (not shown in
Figure 4), that stabilizes the drone in hovering, and eventually ensure a safe landing procedure. This gives time for higher level security responses to the cyberattack.
For manageable cyberattacks, our solution consists of using a combination between a RG and an UIDO. The RG changes the reference signals such that the systems remains in a safe region (the states satisfy some predefined safety constraints) [
14], while the UIDO estimates unknown inputs and helps the controller to compensate their effect [
35]. We consider also that the states
are available: the positions are directly accessible from OptiTrack measurements, while the velocities we can calculate through numerical differentiation.
The next subsections will present different designs for this approach, depending on the attack type—DoS or MitM. Although the attacks are treated separately for reasons of simplicity and clarity, the control structure from
Figure 4 can be designed to be resilient to both types of attacks.
4.1. Reference Governor for DoS Attack
Here, we consider the DoS (manageable) attack as a change in time-varying network transmission delay that affects the control signal from
Figure 4:
where
is the discrete delay, considered as a multiple of the sampling period
(
). We assume the baseline outer loop controller can handle some delay variation, such that the systems remains stable (if this does not hold, one can design an additional time delay compensator for a nominal/average value of the delay).
In addressing the resilience to a DoS attack based on the approach from
Figure 4, we will restrict our attention only to the X axis movement, since our outer loop model assumes that the movement on the X and Y axes are decoupled. The whole discussion can also be adapted easily to the Y axis. We first extract from (
11) just the part related to the X axis movement:
where
Because the RG framework is usually in discrete-time, we discretize (
15) through the zero order hold method [
34], and add the delay model (
14):
where
k the index of the current sampling instance. The control law for the X axis is
with
. As indicated in ref. [
36], we can define
additional states
(where
), such that closed loop system can be written as
with the extended state vector
and
We further design the RG for (
18) considering that all of the states are accessible (a buffer can be used to store the delayed state values). Instead of applying directly the reference
, we will use the RG to calculate at each time instance the virtual reference
which, if held constant from the current time onward, will make the output satisfy some safety constraint. With this idea in mind, we define the polytopic constraint for the output
where
s is the safety limit, while
S provides additional freedom for linear combinations of outputs. The maximal admissible set (MAS) is defined as the set of all initial states and constant inputs, such that the outputs constraint (
19) is satisfied for all future times [
14]:
Next, the output
can be calculated explicitly depending on the initial conditions
and constant input
:
Consequently, the MAS (
20) can be defined by an infinite number of inequalities:
with
,
,
. However, to make the computation tractable, we want the matrices
,
and
h to be finite dimensional. It is proved in ref. [
37] that we can always calculate an inner approximation of
through the use of the steady state value of
:
where
is a steady state margin. Thus, by introducing (
23) in (
22), there always exists a finite prediction time
for which all future time steps (
) make the inequalities become redundant [
14]. This gives us the finitely determined inner approximation of
, denoted further as
.
The delay
is actually time varying in network transmissions. Here, we assume that the delay is piecewise constant (when this does not hold in practice, we can always adopt an averaging approach in order to eliminate jitters), and that it can take values in the set
. Through a so-called time stamping technique, we can actually determine online an estimation of the time delay variation [
9]. Because the MAS can be calculated offline, we can calculate a priori several MASs for (
18) for each delay values from
. Then, we just have to switch online between the different MASs corresponding to the current estimated delay
.
We can now introduce the scalar RG that calculates online the virtual reference
, based on the equation
where
k is determined by solving the following linear program:
Note that when
, we obtain
. This means that, in order to keep the system safe, we can not change the reference for the current time moment. When there are no violations of the constraint, we obtain
and thus
.
To sum up, in case of a DoS attack, we assume step changes in . This change can be estimated online, and the MAS is switched accordingly, such that the RG can predict possible safety constraint violations and adapt the virtual reference sent to the system.
4.2. Unknown Input Disturbance Observer and Reference Governor for MitM Attack
We assume that the MitM (manageable) attack ca be modeled as an additive slow-varying or piece-wise disturbance
As in the previous subsection, the resilience to a MitM attack, based on the approach from
Figure 4, is discussed only for X axis movement (but this can also be easily adapted to the Y axis). The zero order hold discretization of (
15) along with this new input can be written as
First, we want to design the UIDO such that we can estimate the disturbance (i.e., to detect the attack). Considering the disturbance model
, the observer can be designed based on (
27) extended with this additional state [
38]:
with
The observer gain
can be determined through pole placement. The control law (
17) for the X axis can now be extended with a disturbance compensation term,
Through this approach, the disturbance can be compensated completely at least in steady state, and keep the system stable, despite the attack. However, due to the convergence time needed by the observer, we can still have transients that can violate our safety constraints. Thus, we proceed by adding a RG on top of the closed loop system formed by coupling (
27) and (
28) with (
29):
The state vector for the closed loop system is
.
Now, we have to adapt the RG design presented in the previous subsection for the case of an input disturbance
. Because
is not accessible for measurements, when adopting model (
30) for the RG, we will actually use an upper bound of the estimated disturbance
. We first split the disturbance set into several intervals,
The number of intervals is limited by the maximum disturbance
which, in our case, is given by the command saturation limit
. Whenever the estimated disturbance is in one of these intervals, the RG will use the upper bound of the absolute value (e.g., for
, the bound is
, and for
, the bound is
). The only exception is the middle interval
, for which we impose the “bound” 0 for practical reasons (in practice the UIDO can estimate additional effects like model uncertainty, noise, or other unmodeled disturbances). Thus, we will work with piece-wise disturbance bounds, switched depending on the disturbance online estimate, which are fed to the RG.
Let us denote the discrete disturbance bound as
, which can take values in the set
. The MAS for constraint (
19) can be recalculated (without the delay) as
based on the output response with
Because we assume that, in a steady state, the disturbance is completely compensated (i.e., the disturbance vanishes in steady state), for the finite inner approximation
we will use the same steady state condition (
23). Several MASs can be computed offline for each disturbance bound from
. We can further use the same RG online as the one defined by (
24), but now the MASs are switched depending on corresponding bound
of the estimated disturbance.
Thus, in case of a MitM attack, we assume step changes in . The disturbance is estimated and compensated in steady state through UIDO and controller, while the transients that can cause safety constraints violations are taken into account by the RG, which changes the virtual reference accordingly.
5. Experiments
This section will present some experimental results for the two cyberattack scenarios discussed throughout the paper: DoS and MitM. The experimental setup is given in
Figure 5. The Parrot Mambo drone (
Figure 3) communicates wireless via Bluetooth with a remote computer (Intel i7 processor, 16GB RAM, Windows 11). The Parrot Mambo drone has
m, weights only 0.063 kg, and the propellers are actuated by four DC motors. As onboard sensors, the drone has an accelerometer, a gyroscope, an ultrasound sensor, a barometer, and a temperature sensor. The software interface with the sensors, actuators and network communication is made possible due to a firmware specifically developed for Matlab [
39]. An OptiTrack motion camera system with four cameras is connected to the remote computer. As software running on the computer, we used MATLAB and Simulink Real Time for networked control, and the OptiTrack Motive 1.8.0 software for data capturing, which communicates with Simulink through a middleware client-server application.
The parameters of the drone are given in
Table 1. In the control structure from
Figure 2, we first design the baseline inner loop and outer loop controllers. The following tuning matrices were adopted for the two LQRs:
The weights for
and
were designed empirically through experiments, considering position weights larger than the velocity weights (it is more important for position to converge faster to equilibrium). The weights
and
were chosen such that, during experiments, under nominal conditions (when there are no cyberattacks), the control signals do not reach saturation. Through this design, we obtained in nominal operating conditions (i.e., when there is no cyberattack), an overshoot of less than
, a settling time of less than 2 s, and a maximum steady state error of
m. For the inner loop control, the sampling period is limited by the hardware to
ms, while for the outer loop, the sampling period is limited by the Bluetooth transmissions and drone hardware. Our experiments revealed that a sampling period too small leads to a large amount of packet loss and large time-varying transmission delays of several hundreds milliseconds (this was also confirmed in [
40]). On the other hand, a large sampling period makes the control miss important transient behavior of the real drone, with control performance deteriorating significantly. After multiple experiments with the Parrot Mambo drone, we arrived empirically at a compromise solution for the outer loop sampling period of
ms. The outer loop command saturation values are chosen as
rad. For the inner loop, the states are estimated using a steady-state linear Kalman filter. For the outer loop, the states are obtained from the OptiTrack measurements.
5.1. DoS Attack
We adopt the maximum number of samples for the delay
(i.e.,
s), and then calculate offline several MASs for different possible transmissions delays, from 1 to
. The delay bound was adopted considering maximum network latency values under high channel load, receiving buffer size, but also the stability margin of the system. A scalar RG is designed and implemented for X axis, and one for Y axis, according to the methodology from
Section 4.1. For the steady state approximation of the MASs, we adopt
, such that we obtain a good enough approximation with reasonable computational effort. The time delay is estimated online using time stamps. As the time delay changes, due to communication disturbances or cyberattacks, the MAS is switched accordingly.
We emulate a DoS attack by considering a sudden increase in the network transmission delay. Several experiments were conducted for different delay values. Here, for illustrative purposes, we will show two representative DoS attacks: one for a delay of six samples (DoS attack 1) and one for a delay of eight samples (DoS attack 2).
For DoS attack 1, we increase the network transmission delay from one sample to six samples, at time moment
s. In this scenario, the drone moves on the X axis, tracking multiple step references (equivalent results could have been shown for the Y axis). The constraint on X axis is
, i.e., the safe space on X is
m.
Figure 6 shows the results using the baseline network control structure without the RG. The first 10 s are the take off initialization phase. The tracking controller exhibits some steady state error due to modeling uncertainties, but we consider the control performances satisfactory for the purpose of this paper—i.e., resilience to cyberattacks. It can be noticed that due to the increase in the network transmission delay (DoS attack), the step reference at time
s induces oscillations that violate the constraint (dashed green horizontal line). This can be seen more clearly in the zoomed version from
Figure 7.
Figure 8 shows that when using the RG approach proposed in this paper (see the control structure from
Figure 4), the safety constraints are no longer violated, thus ensuring resilience to this type of cyber attack. This is performed through the fact that the RG anticipates the safety constraint violation based on the model and the time delay information, and as response it increases the reference more gradually (slowly), as shown in
Figure 9, thus reducing the oscillations. The reference is first increased to a value of about
m, and it gradually reaches the desired reference value after
s.
DoS attack 2 implies a delay of eight samples, with the same scenario described previously. When we use the baseline control structure, the safety constraint are violated as before. If we add the RG for low-level cyberattack mitigation, we obtain the result from
Figure 10, where we can see that response is with damped oscillations, and it does not violate the safety constraint. The RG modifies the reference as shown more clearly in the zoomed version from
Figure 11: the reference is first increased to a value of about
m, and only after
s it reaches the desired reference value.
So, the RG changes the references more gradually depending on the delay induced by the DoS attack such that the safety constraints are enforced. The safety constraints are important because they could represent an obstacle or a wall in real life applications.
5.2. MitM Attack
We emulate the MitM attack by an additive piecewise disturbance on the control signal. The disturbance input is detected by the UIDO, and then compensated in steady state. The gain of the UIDO was designed through pole placement: . A RG is designed to account for the transient regime during compensation. Several MASs are computed offline for different intervals of the disturbance: , , , , . For each interval, the worst case values are actually computed for the MAS: e.g., a disturbance in the interval is adopted as . Because the UIDO estimates also the effect of model uncertainties and network delay effect, the interval is neglected, i.e., the MAS is computed for a zero disturbance. The RG switches the MAS according to the estimated disturbance. We assume the disturbance is slow varying or piecewise constant. Because the saturation limit is , the disturbance can not be larger than this limit.
We consider a scenario when the drone follows step reference signals on the X axis (an equivalent scenario could have been shown on the Y axis). Several experiments were conducted for different disturbance amplitudes and timings. Here, for illustrative purposes, we will show two representative MitM attacks: one of disturbance amplitude 0.3 (MitM attack 1) and one of amplitude 0.4 (MitM attack 2).
The MitM attack 1 consists of a step disturbance of amplitude
.
Figure 12 shows the effect of the attack (disturbance) on the baseline control, when there is no UIDO or RG. The vertical dashed green line indicates the onset of the attack. Although the control manages to stabilize the drone, the steady state offset is very large, and there is no way of controlling the drone such that it remains in a safe region.
Figure 13 shows the systems response to the attack when we add the UIDO. The disturbance effect is compensated in steady state, but the transient regime, due to the observer convergence time, may still cause safety problems. The problem with the transient regime can not be eliminated by further tuning the observer gains (increasing the gains further actually induces oscillations in the control loop).
Figure 14 illustrates the scenario when the reference changes after the onset of the attack, which causes damped oscillations in the systems response. Due to these oscillations, the drone violates the safety constraint shown with dashed green horizontal line. This can be seen more clearly in the zoomed version (
Figure 15). This shows that using just an UIDO can not always ensure safety in case of MitM cyberattacks, due to the observer convergence time.
When we add also the RG, which uses the disturbance estimate provided by the UIDO, and thus use the control structure from
Figure 4, we obtain the results from
Figure 16. The RG anticipates the transient regime due to the UIDO, and increases the reference in slower steps (first to a value of about
m, and it gradually reaches the desired value after
s), thus reducing the oscilations. The fact that the the safety constraints are now enforced by the combination of RG and UIDO can be seen more clearly in the zoom version from
Figure 17.
The MitM attack 2, when the disturbance has amplitude 0.4, also violates the safety constraints when we use only the baseline control structure. When we adopt our low-level mitigation approach, with UIDO and RG, we obtain the results from
Figure 18. As seen also in the zoomed version from
Figure 19, the RG now changes more drastically the reference by keeping it constant for a few samples, and then increasing it slowly to its desired values (reaching the desired value after
s), in such a manner that the safety constraints are not violated.
So, one can conclude that the RG modifies the reference slower, depending on the severity of the MitM attack and possible safety violations, and may even keep the reference constant (i.e., keep the previous value) for several sample instances. Although in above presented scenarios the RG still managed to increase the reference to its final desired value, in case of major cyber attacks, depending on the scenario, the RG may choose to keep the reference constant (i.e., hold the previous reference value), until the attack passes or it is mitigated at a higher level.
6. Conclusions
In this paper, we have proposed a new resilient networked control architecture for small drones. Because of the sensing and computational limitations of such drones, the control structure was split in an inner loop and an outer loop. Our focus was on the outer loop which controls the positions in the horizontal plane. We considered the case when the network is only on the direct path, while the sensing needed for the feedback path is provided by OptiTrack cameras connected to a remote computer. Two types of cyberattacks were considered: DoS, emulated as a switch in the network transmission delay, and MitM, emulated as additive piecewise input disturbances. The DoS attack, i.e., the change in the network time delay, can be detected through time stamping.
The main contribution of the study consists of the low level mitigation approach to these attack types, with application to low cost small UAVs, based on the structure from
Figure 4. The mitigation for the DoS attack implies adopting a RG that uses the delay estimate and the system’s model to predict future safety violations, and adapts the reference accordingly. The MitM attack is detected by an UIDO. The attack is rejected in steady state through a disturbance compensation loop, while the possible transients that can cause safety violations are predicted by a RG, and the reference is again adapted in concordance. We show real time experimental validations of both approaches on a Parrot Mambo drone.
The results with the DoS attack illustrate that our approach ensures stability and safety for network transmission delays of up to 0.3 s. For the MitM attack, the attack bound is given by the saturation limit, which in our case was 0.5 rad. The experimental results illustrate that the safety constraints are enforced despite this type of attacks. In both attack cases, our approach implies to temporally sacrifice reference tracking in case of cyberattacks, in order to preserve stability and safety. The low-level mitigation approach with RG and UIDO is independent of the controller, so it can be augmented on other drones with different baseline controllers. In case of major cyberattacks, when these bounds are violated for a number of consecutive samples, we considered that we actually have an interruption in the network transmissions, and the drone switches to a back-up onboard position controller that ensures safe landing.
As a future work, we will focus on increasing the control robustness to model uncertainty, and extend the whole approach to cooperative resilient control of multiple drones.