Research Article

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence

Algorithm 1

Data spoofing attack algorithm.
Input: (arrival determining threshold), (-th UAV)
Output: (desired combined heading angle of the i-th UAV after the attack)
(1)//normal
(2)when the first-arrival is within scope of its destination then:
(3)   sends arrival status (T) to the following UAVs;
(4)   flies along its desired combined heading angle calculated by flocking algorithm without ;
(5) //with attack
(6)when the first-arrival is within scope of its destination then:
(7)  Attacker masquerades as exploiting rushing attack;
(8)  The attacker generates data spoofing of arrival status and sends the malicious arrival status (F) to following UAVs;
(9)   flies along its desired combined heading angle calculated by flocking algorithm including ;
(10)return