A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
Main Author: | |
---|---|
Publication Date: | 2022 |
Other Authors: | , , , , , , |
Language: | eng |
Source: | Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
Download full: | http://hdl.handle.net/10071/28843 |
Summary: | When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m. |
id |
RCAP_4ea8feee115df356d434535ae18a889e |
---|---|
oai_identifier_str |
oai:repositorio.iscte-iul.pt:10071/28843 |
network_acronym_str |
RCAP |
network_name_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository_id_str |
https://opendoar.ac.uk/repository/7160 |
spelling |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interferenceCybersecurityConvolutional neural networksDeep learningJamming detectionJamming identificationUnmanned Aerial Vehicles5GWhen users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m.IEEE2023-06-30T09:26:16Z2022-01-01T00:00:00Z20222023-06-30T10:23:35Zconference objectinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/10071/28843eng978-1-6654-5468-11090-303810.1109/VTC2022-Fall57202.2022.10012726Viana, J.Farkhari, H.Campos, L. M.Sebastião, P.Koutlia, K.Lagén, S.Bernardo, L.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-07-07T03:05:02Zoai:repositorio.iscte-iul.pt:10071/28843Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T18:15:27.897506Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse |
dc.title.none.fl_str_mv |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
title |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
spellingShingle |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference Viana, J. Cybersecurity Convolutional neural networks Deep learning Jamming detection Jamming identification Unmanned Aerial Vehicles 5G |
title_short |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
title_full |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
title_fullStr |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
title_full_unstemmed |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
title_sort |
A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference |
author |
Viana, J. |
author_facet |
Viana, J. Farkhari, H. Campos, L. M. Sebastião, P. Koutlia, K. Lagén, S. Bernardo, L. Dinis, R. |
author_role |
author |
author2 |
Farkhari, H. Campos, L. M. Sebastião, P. Koutlia, K. Lagén, S. Bernardo, L. Dinis, R. |
author2_role |
author author author author author author author |
dc.contributor.author.fl_str_mv |
Viana, J. Farkhari, H. Campos, L. M. Sebastião, P. Koutlia, K. Lagén, S. Bernardo, L. Dinis, R. |
dc.subject.por.fl_str_mv |
Cybersecurity Convolutional neural networks Deep learning Jamming detection Jamming identification Unmanned Aerial Vehicles 5G |
topic |
Cybersecurity Convolutional neural networks Deep learning Jamming detection Jamming identification Unmanned Aerial Vehicles 5G |
description |
When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m. |
publishDate |
2022 |
dc.date.none.fl_str_mv |
2022-01-01T00:00:00Z 2022 2023-06-30T09:26:16Z 2023-06-30T10:23:35Z |
dc.type.driver.fl_str_mv |
conference object |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10071/28843 |
url |
http://hdl.handle.net/10071/28843 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
978-1-6654-5468-1 1090-3038 10.1109/VTC2022-Fall57202.2022.10012726 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
IEEE |
publisher.none.fl_str_mv |
IEEE |
dc.source.none.fl_str_mv |
reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia instacron:RCAAP |
instname_str |
FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
collection |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository.name.fl_str_mv |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
repository.mail.fl_str_mv |
info@rcaap.pt |
_version_ |
1833597289155788800 |