M. Rahman, Md. Tauhidur Rahman, M. Kisacikoglu, K. Akkaya
{"title":"Intrusion Detection Systems-Enabled Power Electronics for Unmanned Aerial Vehicles","authors":"M. Rahman, Md. Tauhidur Rahman, M. Kisacikoglu, K. Akkaya","doi":"10.1109/CyberPELS49534.2020.9311545","DOIUrl":null,"url":null,"abstract":"Compromised power electronics, due to firmware attacks and hardware Trojans, in a flight computer can jeopardize the safety and security of an Unmanned Aerial Vehicle (UAV). They can maliciously alter sensor measurements or control commands to make a UAV to take disastrous moves. Unfortunately, most of these attacks are difficult to detect before deploying components in the system. Therefore, detecting compromised behavior run-time is important, while it is challenging at the same time. In this work, we propose to build machine learning-based intrusion detection systems (IDSs) to be deployed at the power electronics/microcontorller level such that it can deal with malicious data/control commands initiated due to hardware attacks.","PeriodicalId":434320,"journal":{"name":"2020 IEEE CyberPELS (CyberPELS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE CyberPELS (CyberPELS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberPELS49534.2020.9311545","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Compromised power electronics, due to firmware attacks and hardware Trojans, in a flight computer can jeopardize the safety and security of an Unmanned Aerial Vehicle (UAV). They can maliciously alter sensor measurements or control commands to make a UAV to take disastrous moves. Unfortunately, most of these attacks are difficult to detect before deploying components in the system. Therefore, detecting compromised behavior run-time is important, while it is challenging at the same time. In this work, we propose to build machine learning-based intrusion detection systems (IDSs) to be deployed at the power electronics/microcontorller level such that it can deal with malicious data/control commands initiated due to hardware attacks.