SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction
Abstract
1. Introduction
1.1. Problem Definition and Motivation
1.2. Technical Challenge
1.3. SMART DShot: Our Solution Approach
1.4. Key Contributions
1.5. Paper Organization
2. Background and Related Work
2.1. DShot Protocol and ESC Communication
2.1.1. Protocol Architecture
2.1.2. Timing Characteristics and Constraints
2.2. Security Vulnerabilities in Motor Control
2.2.1. Attack Taxonomy
2.2.2. Limitations of Current Countermeasures
2.3. ML in Embedded Systems
2.4. Experimental Validation Methodology
2.4.1. Statistical Requirements
2.4.2. Performance Metrics
2.5. Related Work
2.6. Our Contribution
3. Threat Model and Security Requirements
3.1. Threat Model Definition
3.1.1. Adversary Capabilities and Assumptions
3.1.2. Attack Surface Analysis
3.2. Specific Attack Scenarios
3.3. CVSS v3.1 Scoring Methodology
3.4. Security Requirements
3.5. Evaluation Metrics Framework
4. SMART DShot: ML-Enhanced Architecture
4.1. System Architecture Overview
4.2. ML Algorithm Framework
4.2.1. Core Algorithm Suite
- -
- Spectral Radius Control: The system maintains stability by ensuring the spectral radius remains within stable bounds, where is the state transition matrix, is the Kalman gain, and is the observation matrix.
- -
- Bounded Gain Design: is designed with appropriate bounds to prevent unstable gain values that could lead to divergence.
- -
- Empirical Validation: Our experimental results demonstrate convergence across all test scenarios, with KFTC achieving 24.51% success rate in the comprehensive evaluation spanning 8000 tests per algorithm.
4.2.2. Algorithm Selection Strategy
4.3. Hardware Implementation Architecture
4.4. Integration and Scalability
5. Experimental Evaluation
5.1. Experimental Framework
5.2. Algorithm Performance Results
5.2.1. Overall Performance Comparison
5.2.2. Scenario-Specific Performance Analysis
- Gaussian Noise: Direct mapping from Gaussian Noise scenario
- Systematic Drift: Direct mapping from Drift scenario
- Burst Attack: Direct mapping from Burst Attack scenario
- Multi-Source Noise: Direct mapping from Multi Noise scenario
- Environmental Stress: Average of six environmental scenarios
- –
- Temperature variations: Temp. Low (−40 °C), Temp. High (+85 °C)
- –
- Voltage variations: Volt. Low (2.8 V), Volt. High (3.8 V)
- –
- EMI interference and Combined environmental stress
- Attack Average: Average of six attack scenarios
- –
- Stealth. Attack, Desync. Attack, Burst. Attack
- –
- Replay. Attack, Coord. Attack, Firmware. Attack
5.2.3. Graceful Degradation and Fallback Mechanisms
5.3. FPGA Implementation Results
5.4. Security Enhancement Validation
5.4.1. Attack Detection Performance
5.4.2. ROC Curve Analysis
5.5. Statistical Validation and Robustness Analysis
5.6. Comparative Analysis and Key Findings
6. Security Analysis and Discussion
6.1. Security Enhancement Analysis
6.2. Deployment Considerations and Practical Security
- -
- HATC achieves the highest 31.01% success rate but requires 180 ns latency and 7.1 KB memory
- -
- FLTC provides 29.34% success rate with only 50 ns latency and 1.8 KB memory
- -
- The system achieves 2.16% LUT utilization while maintaining 3.1× timing margin
6.3. Security Architecture Analysis
6.4. Regulatory and Certification Implications
7. Conclusions
7.1. Summary of Contributions
7.2. Impact and Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| ANOVA | Analysis of Variance |
| APB | Advanced Peripheral Bus |
| AUC | Area Under the Curve |
| CRC | Cyclic Redundancy Check |
| CVSS | Common Vulnerability Scoring System |
| DSHOT | Digital Shot |
| EMI | Electromagnetic Interference |
| ESC | Electronic Speed Controller |
| FC | Flight Controller |
| FLTC | Fuzzy Logic Timing Corrector |
| FPGA | Field-Programmable Gate Array |
| HATC | Hybrid Adaptive Timing Corrector |
| IoT | Internet of Things |
| ISO | International Organization for Standardization |
| KFTC | Kalman Filter Timing Corrector |
| LUT | Look-Up Table |
| ML | Machine Learning |
| NIST | National Institute of Standards and Technology |
| NN | Neural Network |
| PWM | Pulse Width Modulation |
| RLSTC | Recursive Least Squares Timing Corrector |
| ROC | Receiver Operating Characteristic |
| UAV | Unmanned Aerial Vehicle |
References
- Lin, C.; He, D.; Kumar, N.; Choo, K.-K.R.; Vinel, A.; Huang, X. Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 2018, 56, 64–69. [Google Scholar] [CrossRef]
- Yaacoub, J.-P.; Noura, H.; Salman, O.; Chehab, A. Security Analysis of Drone Systems: Attacks, Limitations, and Recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef]
- Sun, X.; Ng, D.W.K.; Ding, Z.; Xu, Y.; Zhong, Z. Physical Layer Security in UAV Systems: Challenges and Opportunities. IEEE Wireless Commun. 2019, 26, 40–47. [Google Scholar] [CrossRef]
- Dayanıklı, G.Y.; Sinha, S.; Muniraj, D.; Gerdes, R.M.; Farhood, M.; Mina, M. Physical-Layer Attacks Against PWM-Controlled Actuators. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 953–970. [Google Scholar]
- Ribeiro, V.G.; Hernandes, A.C.; Villela, G.B.; Becker, M. Comparative analysis of ESC and flight controller communication protocols in UAV systems. In Proceedings of the 15th Annual International Micro Air Vehicle Conference and Competition, Bristol, UK, 16–20 September 2024; pp. 292–299. [Google Scholar]
- Betaflight Developers. DSHOT—Betaflight Documentation. 2016. Available online: https://betaflight.com/docs/development/Dshot (accessed on 3 August 2025).
- Sihag, V.; Choudhary, G.; Choudhary, P.; Dragoni, N. Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones. Drones 2023, 7, 430. [Google Scholar] [CrossRef]
- Tsao, K.-Y.; Girdler, T.; Vassilakis, V.G. A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks. Ad Hoc Netw. 2022, 133, 102894. [Google Scholar] [CrossRef]
- Yu, Z.; Duan, X.; Cong, X.; Li, X.; Zheng, L. Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems. Mathematics 2023, 11, 943. [Google Scholar] [CrossRef]
- Nie, R.; Du, W.; Li, Z.; He, S. Sliding mode-based finite-time consensus tracking control for multi-agent systems under actuator attacks. Inf. Sci. 2023, 640, 119040. [Google Scholar] [CrossRef]
- Mahfouzi, R.; Aminifar, A.; Samii, S.; Payer, M.; Eles, P.; Peng, Z. Butterfly Attack: Adversarial Manipulation of Temporal Properties of Cyber-Physical Systems. In Proceedings of the IEEE Real-Time Systems Symposium (RTSS), Online, 2019; pp. 93–106. [Google Scholar]
- Warden, P.; Situnayake, D. TinyML: Machine Learning with TensorFlow Lite on Arduino and Ultra-Low-Power Microcontrollers; O’Reilly Media, Inc.: Sebastopol, CA, USA, 2019. [Google Scholar]
- Wu, C.; Pan, W.; Staa, R.; Liu, J.; Sun, G.; Wu, L. Deep reinforcement learning control approach to mitigating actuator attacks. Automatica 2023, 152, 110999. [Google Scholar] [CrossRef]
- Banbury, C.; Reddi, V.J.; Torelli, P.; Holleman, J.; Jeffries, N.; Kiraly, C.; Montino, P.; Kanter, D.; Ahmed, S.; Pau, D.; et al. MLPerf Tiny Benchmark. In Proceedings Neural Information Processing Systems Track on Datasets and Benchmarks; Neural Information Processing Systems Foundation, Inc.: Red Hook, NY, USA, 2021. [Google Scholar]
- Flyduino and Betaflight Developers. DShot—Digital ESC Protocol Specification. 2016. Available online: https://github.com/betaflight/betaflight/wiki/Dshot (accessed on 3 August 2025).
- PX4 Developers. DShot ESCs Documentation. In PX4 Autopilot User Guide; Dronecode Foundation: San Francisco, CA, USA, 2024; Available online: https://docs.px4.io/main/en/peripherals/dshot.html (accessed on 3 August 2025).
- Brushless Whoop Community. DSHOT—The Missing Handbook: Complete Technical Guide. 2020. Available online: https://brushlesswhoop.com/dshot-and-bidirectional-dshot/ (accessed on 3 August 2025).
- Mohsan, S.A.H.; Othman, N.Q.H.; Li, Y.; Alsharif, M.H.; Khan, M.A. Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends. Intell. Serv. Robot. 2023, 16, 109–137. [Google Scholar] [CrossRef]
- Aljumah, A. UAV-Based Secure Data Communication: Multilevel Authentication Perspective. Sensors 2024, 24, 996. [Google Scholar] [CrossRef]
- Ray, P.P. A review on TinyML: State-of-the-art and prospects. J. King Saud Univ.-Comput. Inf. Sci. 2022, 35, 1595–1623. [Google Scholar] [CrossRef]
- Lin, J.; Zhu, L.; Chen, W.-M.; Wang, W.-C.; Han, S. Tiny Machine Learning: Progress and Futures. IEEE Circuits Syst. Mag. 2023, 23, 8–34. [Google Scholar] [CrossRef]
- Suwannaphong, T.; Jovan, F.; Craddock, I.; McConville, R. Optimising TinyML with Quantization and Distillation of Transformer and Mamba Models for Indoor Localisation on Edge Devices. Sci. Rep. 2025, 15, 10081. [Google Scholar] [CrossRef]
- Chen, J.; Feng, Z.; Wen, J.-Y.; Liu, B.; Sha, L. A container-based DoS attack-resilient control framework for real time UAV systems. In Proceedings of the 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, 25–29 March 2019; pp. 1222–1227. [Google Scholar]
- He, K.; Kim, D.D.; Asghar, M.R. Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2023, 25, 538–566. [Google Scholar] [CrossRef]
- FIRST. Common Vulnerability Scoring System v3.1: Specification Document. FIRST.org, June 2019. Available online: https://www.first.org/cvss/v3.1/specification-document (accessed on 3 August 2025).
- Giorgi, G.; Narduzzi, C. Performance Analysis of Kalman-Filter-Based Clock Synchronization in IEEE 1588 Networks. IEEE Trans. Instrum. Meas. 2011, 60, 2902–2909. [Google Scholar] [CrossRef]
- Li, Q.; Guo, J.; Liu, W.; Gao, W.; Zhang, Y.; Hu, Y. An enhanced time synchronization method for a network based on Kalman filtering. Sci. Rep. 2024, 14, 21271. [Google Scholar] [CrossRef]
- Li, T.H. On Exponentially Weighted Recursive Least Squares for Estimating Time-Varying Parameters and its Application to Computer Workload Forecasting. J. Stat. Theory Pract. 2008, 2, 339–354. [Google Scholar] [CrossRef]
- Kovačević, B.; Banjac, Z.; Kovačević, I.K. Robust adaptive filtering using recursive weighted least squares with combined scale and variable forgetting factors. EURASIP J. Adv. Signal Process. 2016, 46, 37. [Google Scholar] [CrossRef]
- Takagi, T.; Sugeno, M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst. Man Cybern. 1985, SMC-15, 116–132. [Google Scholar] [CrossRef]
- Shoaip, N.; El-Sappagh, S.; Abuhmed, T.; Elmogy, M. A dynamic fuzzy rule-based inference system using fuzzy inference with semantic reasoning. Sci. Rep. 2024, 14, 4275. [Google Scholar] [CrossRef]
- Chu, X.; Cai, F.; Cui, C.; Hu, M.; Li, L.; Qin, Q. Adaptive recommendation model using meta learning for population-based algorithms. Inf. Sci. 2019, 476, 192–210. [Google Scholar] [CrossRef]
- Hespanha, J.P.; Liberzon, D.; Morse, A.S. Overcoming the limitations of adaptive control by means of logic-based switching. Syst. Control. Lett. 2003, 49, 49–65. [Google Scholar] [CrossRef]
- RTCA DO-178C; Software Considerations in Airborne Systems and Equipment Certification. Radio Technical Commission for Aeronautics (RTCA): Washington, DC, USA, 2011.
- ISO 26262:2018; Road Vehicles—Functional Safety. International Organization for Standardization (ISO): Geneva, Switzerland, 2018.
- NIST. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2018.









| Attack Type | CVSS Vector String | Score |
|---|---|---|
| Stealth Timing | AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H | 6.8 (M) |
| Desynchronization | AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H | 9.0 (C) |
| Burst Interference | AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L | 5.4 (M) |
| Replay Attack | AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L | 7.1 (H) |
| Multi-Channel Coord. | AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H | 8.3 (H) |
| Firmware Compromise | AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H | 7.2 (H) |
| Attack Type | Key Metric Justifications |
|---|---|
| Stealth Timing | AV:Adjacent (ESC line access required) |
| AC:High (precise timing manipulation) | |
| I/A:High (can cause flight instability) | |
| Desynchronization | AC:Low (relatively easy execution) |
| S:Changed (affects entire flight system) | |
| A:High (immediate crash risk) | |
| Burst Interference | I/A:Low (only temporary disruption, no persistent damage) |
| Replay Attack | I:High (arbitrary command injection possible) |
| A:Low (partial control loss) | |
| Multi-Channel | AC:High (complex synchronization required) |
| S:Changed (system-wide impact) | |
| Firmware | AV:Local (physical/bootloader access) |
| PR:High (admin rights required) | |
| CIA:High (complete system compromise) |
| Metric | KFTC | RLSTC | FLTC | HATC |
|---|---|---|---|---|
| Success Rate | 24.51% | 26.94% | 29.34% | 31.01% |
| Latency (ns) | 70 | 90 | 50 | 180 |
| Memory (KB) | 2.1 | 3.2 | 1.8 | 7.1 |
| Power (mW) | 3.2 | 4.1 | 2.8 | 8.9 |
| Gaussian Noise | ★★★ | ★★ | ★ | ★★★ |
| Linear Drift | ★★ | ★★★ | ★ | ★★★ |
| Burst Errors | ★ | ★ | ★★★ | ★★★ |
| Mixed Scenarios | ★★ | ★★ | ★★ | ★★★ |
| Module | LUTs | FFs | Power (mW) | Function |
|---|---|---|---|---|
| APB Interface | 312 | 256 | 8.2 | Configuration |
| DShot Core | 1824 | 2048 | 42.1 | 8-channel protocol |
| Timing Analyzer | 1256 | 1432 | 28.7 | Error measurement |
| ML Engine | 892 | 1024 | 23.4 | Algorithm execution |
| Neural Network | 756 | 645 | 18.9 | Anomaly detection |
| Feature Extractor | 462 | 382 | 11.3 | Real-time features |
| Total | 5502 | 5787 | 132.6 | Complete system |
| Utilization | 2.16% | 1.14% | 16.6 mW/ch | 8 channels |
| Performance | 156.8 MHz | 3.1× margin | 9.1 μs latency | PolarFire SoC |
| Algorithm | Success Rate | 95% CI | Effect Size a | Rank |
|---|---|---|---|---|
| KFTC | 24.51% | [23.8%, 25.2%] | – | 4 |
| RLSTC | 26.94% | [26.2%, 27.7%] | 0.51 | 3 |
| FLTC | 29.34% | [28.6%, 30.1%] | 0.59 | 2 |
| HATC | 31.01% | [30.2%, 31.8%] | 0.82 | 1 |
| Attack Type | Baseline Detection | SMART DShot | CVSS Reduction |
|---|---|---|---|
| Stealth Timing | 0.0% | 91.0% | 6.8 → 3.1 |
| Desynchronization | 0.0% | 88.0% | 9.0 → 2.8 |
| Burst Interference | 15.0% | 89.0% | 5.4 → 2.4 |
| Replay Attack | 73.0% | 91.0% | 7.1 → 3.3 |
| Multi-Channel Coordination | 0.0% | 90.0% | 8.3 → 3.0 |
| Firmware Compromise | 0.0% | 81.0% | 7.2 → 3.5 |
| Average Performance | 14.7% | 88.3% | 7.3 → 3.1 |
| False Positive Rate | N/A | 2.3% | – |
| Recovery Time | N/A | <35 ms | – |
| Metric | Baseline CRC | SMART DShot | Improvement |
|---|---|---|---|
| Attack Detection Rate | 14.7% | 88.3% | +520% |
| Timing Accuracy | ±20 μs | ±0.8 μs | +96% |
| Response Time | N/A | <10 ms | New capability |
| Resource Overhead | 0% | 2.16% | Minimal impact |
| Power Increase | 0% | 16.6% | Acceptable trade-off |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, H.; Shaik Kadu, Z.B.; Han, K. SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction. Appl. Sci. 2025, 15, 8619. https://doi.org/10.3390/app15158619
Kim H, Shaik Kadu ZB, Han K. SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction. Applied Sciences. 2025; 15(15):8619. https://doi.org/10.3390/app15158619
Chicago/Turabian StyleKim, Hyunmin, Zahid Basha Shaik Kadu, and Kyusuk Han. 2025. "SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction" Applied Sciences 15, no. 15: 8619. https://doi.org/10.3390/app15158619
APA StyleKim, H., Shaik Kadu, Z. B., & Han, K. (2025). SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction. Applied Sciences, 15(15), 8619. https://doi.org/10.3390/app15158619

