Two methods for jamming identification in UAV networks using new synthetic dataset

Bibliographic Details
Main Author: Viana, J.
Publication Date: 2022
Other Authors: Farkhari, H., Campos, L. M., Sebastião, P., Cercas, F., Bernardo, L., Dinis, R.
Language: eng
Source: Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
Download full: http://hdl.handle.net/10071/28842
Summary: Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.
id RCAP_3eca14b4385e938d7ecba2cb8ca0d6fb
oai_identifier_str oai:repositorio.iscte-iul.pt:10071/28842
network_acronym_str RCAP
network_name_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository_id_str https://opendoar.ac.uk/repository/7160
spelling Two methods for jamming identification in UAV networks using new synthetic datasetCybersecurityConvolutional Neural Networks (CNNs)Deep learningJamming detectionJamming identificationUAVUnmanned Aerial Vehicles4G5GUnmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.IEEE2023-06-30T09:09:40Z2022-01-01T00:00:00Z20222023-06-30T10:44:28Zconference objectinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/10071/28842eng978-1-6654-8243-11090-303810.1109/VTC2022-Spring54318.2022.9860816Viana, J.Farkhari, H.Campos, L. M.Sebastião, P.Cercas, F.Bernardo, L.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-07-07T03:23:20Zoai:repositorio.iscte-iul.pt:10071/28842Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T18:22:13.641887Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse
dc.title.none.fl_str_mv Two methods for jamming identification in UAV networks using new synthetic dataset
title Two methods for jamming identification in UAV networks using new synthetic dataset
spellingShingle Two methods for jamming identification in UAV networks using new synthetic dataset
Viana, J.
Cybersecurity
Convolutional Neural Networks (CNNs)
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
title_short Two methods for jamming identification in UAV networks using new synthetic dataset
title_full Two methods for jamming identification in UAV networks using new synthetic dataset
title_fullStr Two methods for jamming identification in UAV networks using new synthetic dataset
title_full_unstemmed Two methods for jamming identification in UAV networks using new synthetic dataset
title_sort Two methods for jamming identification in UAV networks using new synthetic dataset
author Viana, J.
author_facet Viana, J.
Farkhari, H.
Campos, L. M.
Sebastião, P.
Cercas, F.
Bernardo, L.
Dinis, R.
author_role author
author2 Farkhari, H.
Campos, L. M.
Sebastião, P.
Cercas, F.
Bernardo, L.
Dinis, R.
author2_role author
author
author
author
author
author
dc.contributor.author.fl_str_mv Viana, J.
Farkhari, H.
Campos, L. M.
Sebastião, P.
Cercas, F.
Bernardo, L.
Dinis, R.
dc.subject.por.fl_str_mv Cybersecurity
Convolutional Neural Networks (CNNs)
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
topic Cybersecurity
Convolutional Neural Networks (CNNs)
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
description Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.
publishDate 2022
dc.date.none.fl_str_mv 2022-01-01T00:00:00Z
2022
2023-06-30T09:09:40Z
2023-06-30T10:44:28Z
dc.type.driver.fl_str_mv conference object
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10071/28842
url http://hdl.handle.net/10071/28842
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 978-1-6654-8243-1
1090-3038
10.1109/VTC2022-Spring54318.2022.9860816
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv IEEE
publisher.none.fl_str_mv IEEE
dc.source.none.fl_str_mv reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron:RCAAP
instname_str FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron_str RCAAP
institution RCAAP
reponame_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
collection Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository.name.fl_str_mv Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
repository.mail.fl_str_mv info@rcaap.pt
_version_ 1833597365305475072