2019 8th International Conference on Systems and Control (ICSC) 2019
DOI: 10.1109/icsc47195.2019.8950619
|View full text |Cite
|
Sign up to set email alerts
|

Frequency-based detection of replay attacks: application to a quadrotor UAV

Abstract: Unmanned aerial vehicles (UAVs) are reported to be highly exposed as possible targets of cyber attacks, due to their strong strategic and economic value, and their increasing use in a wide range of operations. Among the most critical cyber attacks, replay attacks are performed by replacing the real data coming from the sensors with previously recorded data, causing deterioration of the control system's performance and potentially allowing other types of attacks without being discovered. The main contribution o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 21 publications
0
1
0
Order By: Relevance
“…In summary, physical layer security in UAVs involves employing a combination of different techniques to protect the wireless communication link from unauthorized access, interference, and interception and allows to ensure reliable and secure wireless communication between the UAVs and the GCS. [103] Detection mechanisms and introduction of a timestamp [126,131,132] Unencrypted radio communication Eavesdropping attack [133] Encrypted and authenticated communication [52],…”
Section: Physical Layer Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…In summary, physical layer security in UAVs involves employing a combination of different techniques to protect the wireless communication link from unauthorized access, interference, and interception and allows to ensure reliable and secure wireless communication between the UAVs and the GCS. [103] Detection mechanisms and introduction of a timestamp [126,131,132] Unencrypted radio communication Eavesdropping attack [133] Encrypted and authenticated communication [52],…”
Section: Physical Layer Securitymentioning
confidence: 99%
“…In [131], the authors simulated a frequency based Replay attack detection mechanism by comparing the energy of a sine wave with a time-varying frequency introduced into the closed-loop system. They checked if the time profile of the frequency components in the output signal is compatible with the authentication signal.…”
Section: Physical Layer Securitymentioning
confidence: 99%
“…In addition, we can also consider the potential consequences of a successful replay attack by mathematical formulation: Let C denote the potential cost or harm caused by a successful attack. Then, a model of the expected cost of a replay attack can be written as E(C) = P(success) * C. This formulation helps us to quantify the potential impact of a replay attack and can guide our efforts to implement effective security measures to prevent such attacks [35].…”
mentioning
confidence: 99%