Research Article

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence

Table 10

Comparison of different attack methods.

MethodTargetAttack effect

PhysicallySon et al. [27]Gyroscopic sensorCrash
Choi et al. [28]GPS sensorPath deviation
Trippel et al. [29]AccelerometersUnstable flight
Davidson et al. [20]Optical flow sensorPosition error
Tippenhauer et al. [19]GPS sensorPosition error

Through malwareDash et al. [11]Software stackUnstable flight
Mazloom et al. [10]Software stackUnstable flight

WirelesslyHighnam et al. [30]Wireless channelDisrupted communications
Ghanavati et al. [31]PDE algorithmTime delay
Our methodFlocking algorithmTime delay