The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The la...The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The lack of security features in ADS-B leaves any processes dependent upon the information vulnerable to a variety of threats from compromised and dishonest UAVs.This could result in substantial losses or damage to properties.This research proposes a new distance-bounding scheme for verifying the distance and flight trajectory in the ADS-B broadcast data from surrounding UAVs.The proposed scheme enables UAVs or ground stations to identify fraudulent UAVs and avoid collisions.The scheme was implemented and tested in the ArduPilot SITL(Software In The Loop)simulator to verify its ability to detect fraudulent UAVs.The experiments showed that the scheme achieved the desired accuracy in both flight trajectory measurement and attack detection.展开更多
基金This research was partially funded by Texas State University Research Enhancement Program.
文摘The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The lack of security features in ADS-B leaves any processes dependent upon the information vulnerable to a variety of threats from compromised and dishonest UAVs.This could result in substantial losses or damage to properties.This research proposes a new distance-bounding scheme for verifying the distance and flight trajectory in the ADS-B broadcast data from surrounding UAVs.The proposed scheme enables UAVs or ground stations to identify fraudulent UAVs and avoid collisions.The scheme was implemented and tested in the ArduPilot SITL(Software In The Loop)simulator to verify its ability to detect fraudulent UAVs.The experiments showed that the scheme achieved the desired accuracy in both flight trajectory measurement and attack detection.