A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference

Bibliographic Details
Main Author: Viana, J.
Publication Date: 2022
Other Authors: Farkhari, H., Campos, L. M., Sebastião, P., Koutlia, K., Lagén, S., Bernardo, L., Dinis, R.
Language: eng
Source: Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
Download full: http://hdl.handle.net/10071/28843
Summary: When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m.
id RCAP_4ea8feee115df356d434535ae18a889e
oai_identifier_str oai:repositorio.iscte-iul.pt:10071/28843
network_acronym_str RCAP
network_name_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository_id_str https://opendoar.ac.uk/repository/7160
spelling A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interferenceCybersecurityConvolutional neural networksDeep learningJamming detectionJamming identificationUnmanned Aerial Vehicles5GWhen users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m.IEEE2023-06-30T09:26:16Z2022-01-01T00:00:00Z20222023-06-30T10:23:35Zconference objectinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/10071/28843eng978-1-6654-5468-11090-303810.1109/VTC2022-Fall57202.2022.10012726Viana, J.Farkhari, H.Campos, L. M.Sebastião, P.Koutlia, K.Lagén, S.Bernardo, L.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-07-07T03:05:02Zoai:repositorio.iscte-iul.pt:10071/28843Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T18:15:27.897506Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse
dc.title.none.fl_str_mv A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
title A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
spellingShingle A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
Viana, J.
Cybersecurity
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
Unmanned Aerial Vehicles
5G
title_short A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
title_full A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
title_fullStr A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
title_full_unstemmed A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
title_sort A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
author Viana, J.
author_facet Viana, J.
Farkhari, H.
Campos, L. M.
Sebastião, P.
Koutlia, K.
Lagén, S.
Bernardo, L.
Dinis, R.
author_role author
author2 Farkhari, H.
Campos, L. M.
Sebastião, P.
Koutlia, K.
Lagén, S.
Bernardo, L.
Dinis, R.
author2_role author
author
author
author
author
author
author
dc.contributor.author.fl_str_mv Viana, J.
Farkhari, H.
Campos, L. M.
Sebastião, P.
Koutlia, K.
Lagén, S.
Bernardo, L.
Dinis, R.
dc.subject.por.fl_str_mv Cybersecurity
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
Unmanned Aerial Vehicles
5G
topic Cybersecurity
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
Unmanned Aerial Vehicles
5G
description When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m.
publishDate 2022
dc.date.none.fl_str_mv 2022-01-01T00:00:00Z
2022
2023-06-30T09:26:16Z
2023-06-30T10:23:35Z
dc.type.driver.fl_str_mv conference object
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10071/28843
url http://hdl.handle.net/10071/28843
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 978-1-6654-5468-1
1090-3038
10.1109/VTC2022-Fall57202.2022.10012726
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv IEEE
publisher.none.fl_str_mv IEEE
dc.source.none.fl_str_mv reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron:RCAAP
instname_str FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron_str RCAAP
institution RCAAP
reponame_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
collection Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository.name.fl_str_mv Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
repository.mail.fl_str_mv info@rcaap.pt
_version_ 1833597289155788800