Security-aware synthesis of human-UAV protocols

Conference Paper

In this work, we synthesize collaboration protocols for human-unmanned aerial vehicle (H-UAV) command and control systems, where the human operator aids in securing the UAV by intermittently performing geolocation tasks to confirm its reported location. We first present a stochastic game-based model for the system that accounts for both the operator and an adversary capable of launching stealthy false-data injection attacks, causing the UAV to deviate from its path. We also describe a synthesis challenge due to the UAV's hidden-information constraint. Next, we perform human experiments using a developed RESCHU-SA testbed to recognize the geolocation strategies that operators adopt. Furthermore, we deploy machine learning techniques on the collected experimental data to predict the correctness of a geolocation task at a given location based on its geographical features. By representing the model as a delayed-action game and formalizing the system objectives, we utilize off-the-shelf model checkers to synthesize protocols for the human-UAV coalition that satisfy these objectives. Finally, we demonstrate the usefulness of the H-UAV protocol synthesis through a case study where the protocols are experimentally analyzed and further evaluated by human operators.

Full Text

Duke Authors

Cited Authors

  • Elfar, M; Zhu, H; Cummings, ML; Pajic, M

Published Date

  • May 1, 2019

Published In

Volume / Issue

  • 2019-May /

Start / End Page

  • 8011 - 8017

International Standard Serial Number (ISSN)

  • 1050-4729

International Standard Book Number 13 (ISBN-13)

  • 9781538660263

Digital Object Identifier (DOI)

  • 10.1109/ICRA.2019.8794385

Citation Source

  • Scopus