UAV Attack Dataset

Citation Author(s):
Jason
Whelan
Ontario Tech University
Thanigajan
Sangarapillai
Ontario Tech University
Omar
Minawi
Ontario Tech University
Abdulaziz
Almehmadi
University of Tabuk
Khalil
El-Khatib
Ontario Tech University
Submitted by:
Jason Whelan
Last updated:
Wed, 06/23/2021 - 15:00
DOI:
10.21227/00dg-0d12
Data Format:
License:
5
2 ratings - Please login to submit your rating.

Abstract 

 

GPS spoofing and jamming are common attacks against the UAV, however, conducting these experiments for research can be difficult in many areas. This dataset consists of a logs from a benign flight as well as one where the UAV experiences GPS spoofing and jamming. The Keysight EXG N5172B signal generator is used to provide the true coordinates as a location in Shanghai, China.

GPS spoofing: A Great Scott Gadgets HackRF software-defined radio is used with the GPS-SDR-SIM tool (https://github.com/osqzss/gps-sdr-sim) to broadcast 30.286502,120.032669. 

GPS jamming: Jamming is done by broadcasting white guassian noise using the HackRF, with an amplitude of 0.3 and a gain of -48dB.

Related paper: https://dlnext.acm.org/doi/10.1145/3416013.3426446

All experiments were conducted within an RF-denied research facility following all legalities

Instructions: 

PX4 Autopilot v1.11.3 (https://px4.io) is used for all experiments, running on Pixhawk 4 flight controller (PX4_FMU_V5) and Pixhawk GPS receiver. The UAV frame is the Holybro S500. QGroundControl (v4.0.9) is used for GCS (http://qgroundcontrol.com). 

Full flight data is contained in ULOG files (https://dev.px4.io/v1.9.0/en/log/ulog_file_format.html)

CSV files are obtained by conversion using the ulog2csv script (https://github.com/PX4/pyulog/blob/master/pyulog/ulog2csv.py)

Comments

Need logs to do some testing.

Thanks

Submitted by Cristian Bucur on Tue, 07/20/2021 - 22:41