Two methods for jamming identification in UAV networks using new synthetic dataset
Autor(a) principal: | |
---|---|
Data de Publicação: | 2022 |
Outros Autores: | , , , , , |
Idioma: | eng |
Título da fonte: | Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
Texto Completo: | http://hdl.handle.net/10071/28842 |
Resumo: | Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters. |
id |
RCAP_3eca14b4385e938d7ecba2cb8ca0d6fb |
---|---|
oai_identifier_str |
oai:repositorio.iscte-iul.pt:10071/28842 |
network_acronym_str |
RCAP |
network_name_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository_id_str |
https://opendoar.ac.uk/repository/7160 |
spelling |
Two methods for jamming identification in UAV networks using new synthetic datasetCybersecurityConvolutional Neural Networks (CNNs)Deep learningJamming detectionJamming identificationUAVUnmanned Aerial Vehicles4G5GUnmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.IEEE2023-06-30T09:09:40Z2022-01-01T00:00:00Z20222023-06-30T10:44:28Zconference objectinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/10071/28842eng978-1-6654-8243-11090-303810.1109/VTC2022-Spring54318.2022.9860816Viana, J.Farkhari, H.Campos, L. M.Sebastião, P.Cercas, F.Bernardo, L.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-07-07T03:23:20Zoai:repositorio.iscte-iul.pt:10071/28842Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T18:22:13.641887Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse |
dc.title.none.fl_str_mv |
Two methods for jamming identification in UAV networks using new synthetic dataset |
title |
Two methods for jamming identification in UAV networks using new synthetic dataset |
spellingShingle |
Two methods for jamming identification in UAV networks using new synthetic dataset Viana, J. Cybersecurity Convolutional Neural Networks (CNNs) Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
title_short |
Two methods for jamming identification in UAV networks using new synthetic dataset |
title_full |
Two methods for jamming identification in UAV networks using new synthetic dataset |
title_fullStr |
Two methods for jamming identification in UAV networks using new synthetic dataset |
title_full_unstemmed |
Two methods for jamming identification in UAV networks using new synthetic dataset |
title_sort |
Two methods for jamming identification in UAV networks using new synthetic dataset |
author |
Viana, J. |
author_facet |
Viana, J. Farkhari, H. Campos, L. M. Sebastião, P. Cercas, F. Bernardo, L. Dinis, R. |
author_role |
author |
author2 |
Farkhari, H. Campos, L. M. Sebastião, P. Cercas, F. Bernardo, L. Dinis, R. |
author2_role |
author author author author author author |
dc.contributor.author.fl_str_mv |
Viana, J. Farkhari, H. Campos, L. M. Sebastião, P. Cercas, F. Bernardo, L. Dinis, R. |
dc.subject.por.fl_str_mv |
Cybersecurity Convolutional Neural Networks (CNNs) Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
topic |
Cybersecurity Convolutional Neural Networks (CNNs) Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
description |
Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters. |
publishDate |
2022 |
dc.date.none.fl_str_mv |
2022-01-01T00:00:00Z 2022 2023-06-30T09:09:40Z 2023-06-30T10:44:28Z |
dc.type.driver.fl_str_mv |
conference object |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10071/28842 |
url |
http://hdl.handle.net/10071/28842 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
978-1-6654-8243-1 1090-3038 10.1109/VTC2022-Spring54318.2022.9860816 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
IEEE |
publisher.none.fl_str_mv |
IEEE |
dc.source.none.fl_str_mv |
reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia instacron:RCAAP |
instname_str |
FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
collection |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository.name.fl_str_mv |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
repository.mail.fl_str_mv |
info@rcaap.pt |
_version_ |
1833597365305475072 |