Security-aware synthesis of human-UAV protocols
Conference Paper
In this work, we synthesize collaboration protocols for human-unmanned aerial vehicle (H-UAV) command and control systems, where the human operator aids in securing the UAV by intermittently performing geolocation tasks to confirm its reported location. We first present a stochastic game-based model for the system that accounts for both the operator and an adversary capable of launching stealthy false-data injection attacks, causing the UAV to deviate from its path. We also describe a synthesis challenge due to the UAV's hidden-information constraint. Next, we perform human experiments using a developed RESCHU-SA testbed to recognize the geolocation strategies that operators adopt. Furthermore, we deploy machine learning techniques on the collected experimental data to predict the correctness of a geolocation task at a given location based on its geographical features. By representing the model as a delayed-action game and formalizing the system objectives, we utilize off-the-shelf model checkers to synthesize protocols for the human-UAV coalition that satisfy these objectives. Finally, we demonstrate the usefulness of the H-UAV protocol synthesis through a case study where the protocols are experimentally analyzed and further evaluated by human operators.
Full Text
Duke Authors
Cited Authors
- Elfar, M; Zhu, H; Cummings, ML; Pajic, M
Published Date
- May 1, 2019
Published In
Volume / Issue
- 2019-May /
Start / End Page
- 8011 - 8017
International Standard Serial Number (ISSN)
- 1050-4729
International Standard Book Number 13 (ISBN-13)
- 9781538660263
Digital Object Identifier (DOI)
- 10.1109/ICRA.2019.8794385
Citation Source
- Scopus