Skip to main content
Top

2024 | OriginalPaper | Chapter

7. Resilient Estimation and Safe Planning for UAVs in GPS-Denied Environments

Authors : Wenbin Wan, Hunmin Kim, Naira Hovakimyan, Petros Voulgaris, Lui R. Sha

Published in: Control of Autonomous Aerial Vehicles

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Unmanned aerial vehicles (UAVs) suffer from intolerable sensor drifts in global positioning system (GPS)-denied environments, leading to potentially dangerous situations. This chapter proposes a safety-constrained control framework that adapts UAVs at a path re-planning level to support resilient state estimation in GPS-denied environments. The proposed framework consists of an anomaly detector, a resilient state estimator, a robust controller, a pursuer location tracker (PLT), and an escape controller (EsC). The detector ensures anomaly detection and provides a switching criterion between the robust control and emergency control modes. PLT is developed to track the pursuer’s location by the unscented Kalman filter with sliding window outputs. Using the estimates from PLT, we design an EsC based on the model predictive controller such that the UAV escapes from the effective range of the spoofing device within the escape time that is defined as the safe time within which the estimation errors remain in a tolerable region with high probability. Subsequently, the proposed framework is extended for the multi-UAV systems that perform the time-critical coordination task.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Maza I, Kondak K, Bernard M, Ollero A (2009) Multi-UAV cooperation and control for load transportation and deployment. In: Selected papers from the 2nd international symposium on UAVs, Reno, Nevada, USA. Springer, pp 417–449 Maza I, Kondak K, Bernard M, Ollero A (2009) Multi-UAV cooperation and control for load transportation and deployment. In: Selected papers from the 2nd international symposium on UAVs, Reno, Nevada, USA. Springer, pp 417–449
2.
go back to reference Hardin PJ, Jackson MW (2005) An unmanned aerial vehicle for rangeland photography. Rangeland Ecol Manag 58(4):439–442CrossRef Hardin PJ, Jackson MW (2005) An unmanned aerial vehicle for rangeland photography. Rangeland Ecol Manag 58(4):439–442CrossRef
3.
go back to reference Candiago S, Remondino F, De Giglio M, Dubbini M, Gattelli M (2015) Evaluating multispectral images and vegetation indices for precision farming applications from UAV images. Remote Sens 7(4):4026–4047CrossRef Candiago S, Remondino F, De Giglio M, Dubbini M, Gattelli M (2015) Evaluating multispectral images and vegetation indices for precision farming applications from UAV images. Remote Sens 7(4):4026–4047CrossRef
4.
go back to reference Warner JS, Johnston RG (2003) GPS spoofing countermeasures. Homeland Secur J 25(2):19–27 Warner JS, Johnston RG (2003) GPS spoofing countermeasures. Homeland Secur J 25(2):19–27
5.
go back to reference Warner JS, Johnston RG (2002) A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. J Secur Adm 25(2):19–27 Warner JS, Johnston RG (2002) A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. J Secur Adm 25(2):19–27
6.
go back to reference McMilin E, De Lorenzo DS, Walter T, Lee TH, Enge P (2014) Single antenna GPS spoof detection that is simple, static, instantaneous and backwards compatible for aerial applications. In: International technical meeting of the satellite division of the institute of navigation. Institute of Navigation, Tampa, FL, pp 2233–2242 McMilin E, De Lorenzo DS, Walter T, Lee TH, Enge P (2014) Single antenna GPS spoof detection that is simple, static, instantaneous and backwards compatible for aerial applications. In: International technical meeting of the satellite division of the institute of navigation. Institute of Navigation, Tampa, FL, pp 2233–2242
7.
go back to reference Montgomery PY, Humphreys TE, Ledvina BM (2009) Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: International technical meeting of the institute of navigation, pp 124–130 Montgomery PY, Humphreys TE, Ledvina BM (2009) Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: International technical meeting of the institute of navigation, pp 124–130
8.
go back to reference Magiera J, Katulski R (2015) Detection and mitigation of GPS spoofing based on antenna array processing. J Appl Res Technol 13(1):45–57CrossRef Magiera J, Katulski R (2015) Detection and mitigation of GPS spoofing based on antenna array processing. J Appl Res Technol 13(1):45–57CrossRef
9.
go back to reference Chen Y-H (2012) A study of geometry and commercial off-the-shelf (COTS) antennas for controlled reception pattern antenna (CRPA) arrays. In: ION GNSS. The Institute of Navigation, pp 907–914 Chen Y-H (2012) A study of geometry and commercial off-the-shelf (COTS) antennas for controlled reception pattern antenna (CRPA) arrays. In: ION GNSS. The Institute of Navigation, pp 907–914
10.
go back to reference Chen Y-H, Lo S, Akos DM, De Lorenzo DS, Enge P (2013) Validation of a controlled reception pattern antenna (CRPA) receiver built from inexpensive general-purpose elements during several live-jamming test campaigns. In: International technical meeting. The Institute of Navigation, San Diego, CA, pp 154–163 Chen Y-H, Lo S, Akos DM, De Lorenzo DS, Enge P (2013) Validation of a controlled reception pattern antenna (CRPA) receiver built from inexpensive general-purpose elements during several live-jamming test campaigns. In: International technical meeting. The Institute of Navigation, San Diego, CA, pp 154–163
11.
go back to reference Jansen K, Pöpper C (2017) Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. In: Conference on security and privacy in wireless and mobile networks. Association of Computer Machinery, Boston, MA, pp 156–159 Jansen K, Pöpper C (2017) Advancing attacker models of satellite-based localization systems: the case of multi-device attackers. In: Conference on security and privacy in wireless and mobile networks. Association of Computer Machinery, Boston, MA, pp 156–159
12.
go back to reference Mo Y, Garone E, Casavola A, Sinopoli B (2010) False data injection attacks against state estimation in wireless sensor networks. In: Conference on decision and control. IEEE, Atlanta, GA, pp 5967–5972 Mo Y, Garone E, Casavola A, Sinopoli B (2010) False data injection attacks against state estimation in wireless sensor networks. In: Conference on decision and control. IEEE, Atlanta, GA, pp 5967–5972
13.
go back to reference Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467MathSciNetCrossRefMATH Fawzi H, Tabuada P, Diggavi S (2014) Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans Autom Control 59(6):1454–1467MathSciNetCrossRefMATH
14.
go back to reference Pajic M, Weimer J, Bezzo N, Tabuada P, Sokolsky O, Lee I, Pappas GJ (2014) Robustness of attack-resilient state estimators. In: International conference on cyber-physical systems. ACM/IEEE, Berlin, Germany, pp 163–174 Pajic M, Weimer J, Bezzo N, Tabuada P, Sokolsky O, Lee I, Pappas GJ (2014) Robustness of attack-resilient state estimators. In: International conference on cyber-physical systems. ACM/IEEE, Berlin, Germany, pp 163–174
15.
go back to reference Pasqualetti F, Dörfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans Autom Control 58(11):2715–2729MathSciNetCrossRefMATH Pasqualetti F, Dörfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans Autom Control 58(11):2715–2729MathSciNetCrossRefMATH
16.
go back to reference Wan W, Kim H, Hovakimyan N, Voulgaris PG (2019) Attack-resilient estimation for linear discrete-time stochastic systems with input and state constraints. In: Conference on decision and control, Nice, France, pp 5107–5112 Wan W, Kim H, Hovakimyan N, Voulgaris PG (2019) Attack-resilient estimation for linear discrete-time stochastic systems with input and state constraints. In: Conference on decision and control, Nice, France, pp 5107–5112
17.
go back to reference Wan W, Kim H, Hovakimyan N, Voulgaris P (2022) Constrained attack-resilient estimation of stochastic cyber-physical systems. Soc Sci Res Netw 1–12 Wan W, Kim H, Hovakimyan N, Voulgaris P (2022) Constrained attack-resilient estimation of stochastic cyber-physical systems. Soc Sci Res Netw 1–12
18.
go back to reference Yoon H-J, Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2019) Towards resilient UAV: escape time in GPS denied environment with sensor drift. IFAC-PapersOnLine 52(12):423–428CrossRef Yoon H-J, Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2019) Towards resilient UAV: escape time in GPS denied environment with sensor drift. IFAC-PapersOnLine 52(12):423–428CrossRef
19.
go back to reference Psiaki ML, O’Hanlon BW, Bhatti JA, Shepard DP, Humphreys TE (2013) GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans Aerosp Electron Syst 49(4):2250–2267CrossRef Psiaki ML, O’Hanlon BW, Bhatti JA, Shepard DP, Humphreys TE (2013) GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans Aerosp Electron Syst 49(4):2250–2267CrossRef
20.
go back to reference Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51:135–148MathSciNetCrossRefMATH Teixeira A, Shames I, Sandberg H, Johansson KH (2015) A secure control framework for resource-limited adversaries. Automatica 51:135–148MathSciNetCrossRefMATH
21.
go back to reference Wang X, Hovakimyan N, Sha L (2018) RSimplex: a robust control architecture for cyber and physical failures. Trans Cyber-Phys Syst 2(4):27 Wang X, Hovakimyan N, Sha L (2018) RSimplex: a robust control architecture for cyber and physical failures. Trans Cyber-Phys Syst 2(4):27
22.
go back to reference Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2020) A safety constrained control framework for UAVs in GPS denied environment. In: Conference on decision and control. IEEE, Jeju Island, Republic of Korea, pp 214–219 Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2020) A safety constrained control framework for UAVs in GPS denied environment. In: Conference on decision and control. IEEE, Jeju Island, Republic of Korea, pp 214–219
23.
go back to reference Wan W, Kim H, Cheng Y, Hovakimyan N, Voulgaris P, Sha L (2021) Safety constrained multi-UAV time coordination: a bi-level control framework in GPS denied environment. In: Aviation forum. Virtual Event, AIAA, p 2463 Wan W, Kim H, Cheng Y, Hovakimyan N, Voulgaris P, Sha L (2021) Safety constrained multi-UAV time coordination: a bi-level control framework in GPS denied environment. In: Aviation forum. Virtual Event, AIAA, p 2463
24.
go back to reference Friis HT (1946) A note on a simple transmission formula. Proc IRE 34(5):254–256 MayCrossRef Friis HT (1946) A note on a simple transmission formula. Proc IRE 34(5):254–256 MayCrossRef
25.
go back to reference Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS (2010) Cyber security analysis of state estimators in electric power systems. In: Conference on decision and control. IEEE, Atlanta, GA, pp 5991–5998 Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS (2010) Cyber security analysis of state estimators in electric power systems. In: Conference on decision and control. IEEE, Atlanta, GA, pp 5991–5998
26.
go back to reference Mo Y, Chabukswar R, Sinopoli B (2014) Detecting integrity attacks on SCADA systems. IEEE Trans Control Syst Technol 22(4):1396–1407CrossRef Mo Y, Chabukswar R, Sinopoli B (2014) Detecting integrity attacks on SCADA systems. IEEE Trans Control Syst Technol 22(4):1396–1407CrossRef
28.
go back to reference Barnard GA (1959) Control charts and stochastic processes. J R Stat Soc Ser B (Methodol), pp 239–271 Barnard GA (1959) Control charts and stochastic processes. J R Stat Soc Ser B (Methodol), pp 239–271
29.
go back to reference Lai TL (1995) Sequential changepoint detection in quality control and dynamical systems. J R Stat Soc Ser B (Methodol), pp 613–658 Lai TL (1995) Sequential changepoint detection in quality control and dynamical systems. J R Stat Soc Ser B (Methodol), pp 613–658
30.
go back to reference Julier SJ, Uhlmann JK (1997) New extension of the Kalman filter to nonlinear systems. In: Signal processing, sensor fusion, and target recognition VI, vol 3068. International Society for Optics and Photonics, Orlando, FL, pp 182–193 Julier SJ, Uhlmann JK (1997) New extension of the Kalman filter to nonlinear systems. In: Signal processing, sensor fusion, and target recognition VI, vol 3068. International Society for Optics and Photonics, Orlando, FL, pp 182–193
31.
go back to reference Wan EA, Van Der Merwe R (2000) The unscented Kalman filter for nonlinear estimation. In: Adaptive systems for signal processing, communications, and control symposium. IEEE, Lake Louise, AB, pp 153–158 Wan EA, Van Der Merwe R (2000) The unscented Kalman filter for nonlinear estimation. In: Adaptive systems for signal processing, communications, and control symposium. IEEE, Lake Louise, AB, pp 153–158
32.
go back to reference Van Hessem D, Bosgra O (2002) A conic reformulation of model predictive control including bounded and stochastic disturbances under state and input constraints. In: Conference on decision and control, vol 4. IEEE, Las Vegas, NV, pp 4643–4648 Van Hessem D, Bosgra O (2002) A conic reformulation of model predictive control including bounded and stochastic disturbances under state and input constraints. In: Conference on decision and control, vol 4. IEEE, Las Vegas, NV, pp 4643–4648
33.
go back to reference Köhler J, Soloperto R, Müller MA, Allgöwer F (2020) A computationally efficient robust model predictive control framework for uncertain nonlinear systems. IEEE Trans Autom Control 66(2):794–801MathSciNetCrossRefMATH Köhler J, Soloperto R, Müller MA, Allgöwer F (2020) A computationally efficient robust model predictive control framework for uncertain nonlinear systems. IEEE Trans Autom Control 66(2):794–801MathSciNetCrossRefMATH
34.
go back to reference Schlüter H, Allgöwer F (2020) A constraint-tightening approach to nonlinear stochastic model predictive control under general bounded disturbances. In: World congress, vol 53, no 2. IFAC, pp 7130–7135 Schlüter H, Allgöwer F (2020) A constraint-tightening approach to nonlinear stochastic model predictive control under general bounded disturbances. In: World congress, vol 53, no 2. IFAC, pp 7130–7135
35.
go back to reference Ge SS, Cui YJ (2000) New potential functions for mobile robot path planning. IEEE Trans Robot Autom 16(5):615–620CrossRef Ge SS, Cui YJ (2000) New potential functions for mobile robot path planning. IEEE Trans Robot Autom 16(5):615–620CrossRef
36.
37.
go back to reference Choset HM, Hutchinson S, Lynch KM, Kantor G, Burgard W, Kavraki LE, Thrun S (2005) Principles of robot motion: theory, algorithms, and implementation. MIT Press, Boston, MAMATH Choset HM, Hutchinson S, Lynch KM, Kantor G, Burgard W, Kavraki LE, Thrun S (2005) Principles of robot motion: theory, algorithms, and implementation. MIT Press, Boston, MAMATH
38.
go back to reference Wolf MT, Burdick JW (2008) Artificial potential functions for highway driving with collision avoidance. In: IEEE international conference on robotics and automation, pp 3731–3736 Wolf MT, Burdick JW (2008) Artificial potential functions for highway driving with collision avoidance. In: IEEE international conference on robotics and automation, pp 3731–3736
39.
40.
go back to reference Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control via GPS spoofing. J Field Robot 31(4):617–636CrossRef Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control via GPS spoofing. J Field Robot 31(4):617–636CrossRef
41.
go back to reference Mesbahi M, Egerstedt M (2010) Graph theoretic methods in multiagent networks, vol 33. Princeton University Press, Princeton, NJ Mesbahi M, Egerstedt M (2010) Graph theoretic methods in multiagent networks, vol 33. Princeton University Press, Princeton, NJ
42.
go back to reference Bartels RH, Beatty JC, Barsky BA (1995) An introduction to splines for use in computer graphics and geometric modelling. Morgan Kaufmann Bartels RH, Beatty JC, Barsky BA (1995) An introduction to splines for use in computer graphics and geometric modelling. Morgan Kaufmann
Metadata
Title
Resilient Estimation and Safe Planning for UAVs in GPS-Denied Environments
Authors
Wenbin Wan
Hunmin Kim
Naira Hovakimyan
Petros Voulgaris
Lui R. Sha
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-39767-7_7

Premium Partner