Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation

Bibliographic Details
Main Author: Viana, J.
Publication Date: 2023
Other Authors: Farkhari, H., Sebastião, P., Campos, L. M., Koutlia, K., Bojovic, B., Lagén S., Dinis, R.
Format: Article
Language: eng
Source: Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
Download full: http://hdl.handle.net/10071/29306
Summary: Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).
id RCAP_76b663b0916edc5d5834e863f3be1d7f
oai_identifier_str oai:repositorio.iscte-iul.pt:10071/29306
network_acronym_str RCAP
network_name_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository_id_str https://opendoar.ac.uk/repository/7160
spelling Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluationSecurityConvolutional neural networksDeep learningJamming detectionJamming identificationUAVUnmanned Aerial Vehicles4G5GDespite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).IEEE2023-09-11T13:23:02Z2024-01-01T00:00:00Z20242024-02-16T20:46:45Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10071/29306eng0018-954510.1109/TVT.2023.3302814Viana, J.Farkhari, H.Sebastião, P.Campos, L. M.Koutlia, K.Bojovic, B.Lagén S.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-07-07T03:58:01Zoai:repositorio.iscte-iul.pt:10071/29306Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T18:35:31.665635Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse
dc.title.none.fl_str_mv Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
spellingShingle Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
Viana, J.
Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
title_short Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_full Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_fullStr Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_full_unstemmed Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_sort Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
author Viana, J.
author_facet Viana, J.
Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
author_role author
author2 Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
author2_role author
author
author
author
author
author
author
dc.contributor.author.fl_str_mv Viana, J.
Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
dc.subject.por.fl_str_mv Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
topic Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
description Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).
publishDate 2023
dc.date.none.fl_str_mv 2023-09-11T13:23:02Z
2024-01-01T00:00:00Z
2024
2024-02-16T20:46:45Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10071/29306
url http://hdl.handle.net/10071/29306
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 0018-9545
10.1109/TVT.2023.3302814
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv IEEE
publisher.none.fl_str_mv IEEE
dc.source.none.fl_str_mv reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron:RCAAP
instname_str FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron_str RCAAP
institution RCAAP
reponame_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
collection Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository.name.fl_str_mv Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
repository.mail.fl_str_mv info@rcaap.pt
_version_ 1833597530835779584