Covert Attack Detection and Resilient Control of Quadcopter
This article addresses issues of covert attacks detection and resilient control of quadcopters. In the presence of generalized covert attacks characterized by strong stealth, passive detection techniques prove to be insufficient. Active detection methods are common solutions to this problem, but the...
Uloženo v:
| Vydáno v: | IEEE transactions on industrial informatics Ročník 21; číslo 5; s. 3924 - 3933 |
|---|---|
| Hlavní autoři: | , , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
01.05.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 1551-3203, 1941-0050 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | This article addresses issues of covert attacks detection and resilient control of quadcopters. In the presence of generalized covert attacks characterized by strong stealth, passive detection techniques prove to be insufficient. Active detection methods are common solutions to this problem, but the balance between the detection capability and the stability of quadcopters still remains as a challenge. Different from the existing active attack detection methods, a coding and channel switching approach and its matched resilient controller for quadcopters are proposed. First, the design and detectability analysis of the coding-based attack detection method are given. Once covert attacks revealed, a secure channel is activated to replace the attacked channel. Second, to enhance quadcopter resilience against covert attacks, a resilient control framework is proposed. It incorporates attack effect estimation and compensation via a fixed-time observer. This framework maintains the stability of the quadcopter's control system under covert attacks. Finally, the numerical simulation and real-world experiments are conducted to evaluate the effectiveness and feasibility of the proposed scheme. |
|---|---|
| Bibliografie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1551-3203 1941-0050 |
| DOI: | 10.1109/TII.2025.3528579 |