可重构性
计算机科学
隐蔽的
计算机网络
观察员(物理)
网络拓扑
无线网络
遥控水下航行器
无线
分散系统
实时计算
班级(哲学)
分布式计算
控制(管理)
人工智能
机器人
移动机器人
电信
哲学
物理
量子力学
语言学
作者
Mohammad Bahrami,Hamidreza Jafarnejadsani
标识
DOI:10.1109/icuas54217.2022.9836208
摘要
A network of unmanned aerial vehicles (UAVs) provides distributed coverage, reconfigurability, and maneuverability in performing complex cooperative tasks. However, it relies on wireless communications that can be susceptible to cyber adversaries and intrusions, disrupting the entire network's operation. This paper develops model-based centralized and decentralized observer techniques for detecting a class of stealthy intrusions, namely zero-dynamics and covert attacks, on networked UAVs in formation control settings. The centralized observer that runs in a control center leverages switching in the UAVs' communication topology for attack detection, and the decentralized observers, implemented onboard each UAV in the network, use the model of networked UAVs and locally available measurements. Experimental results are provided to show the effectiveness of the proposed detection schemes in different case studies.
科研通智能强力驱动
Strongly Powered by AbleSci AI