Research Article
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence
Table 10
Comparison of different attack methods.
| Method | Target | Attack effect |
| Physically | Son et al. [27] | Gyroscopic sensor | Crash | Choi et al. [28] | GPS sensor | Path deviation | Trippel et al. [29] | Accelerometers | Unstable flight | Davidson et al. [20] | Optical flow sensor | Position error | Tippenhauer et al. [19] | GPS sensor | Position error |
| Through malware | Dash et al. [11] | Software stack | Unstable flight | Mazloom et al. [10] | Software stack | Unstable flight |
| Wirelessly | Highnam et al. [30] | Wireless channel | Disrupted communications | Ghanavati et al. [31] | PDE algorithm | Time delay | Our method | Flocking algorithm | Time delay |
|
|