Two methods for Jamming Identification in UAVs Networks using New Synthetic Dataset

03/21/2022
by   Joseanne Viana, et al.
0

Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices for their benefits during UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on time series approaches for anomaly detection where the signal available in resource blocks are decomposed statistically to find trend, seasonality, and residues, while the second is based on newly designed deep networks. The joined technique is suitable for UAVs because the statistical model does not require heavy computation processing but is limited in generalizing possible attack's identification. On the other hand, the deep network can classify attacks accurately but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38 UAV. Furthermore, the Deep network's accuracy was approximately 99.99 jamming powers greater than two and jammer distances less than 200 meters.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/05/2022

A Synthetic Dataset for 5G UAV Attacks Based on Observable Network Parameters

Synthetic datasets are beneficial for machine learning researchers due t...
research
12/21/2021

Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach

The unmanned aerial vehicle (UAV) is one of the technological breakthrou...
research
07/17/2021

Throughput Maximization of UAV Networks

In this paper we study the deployment of multiple unmanned aerial vehicl...
research
07/16/2022

A Convolutional Attention Based Deep Network Solution for UAV Network Attack Recognition over Fading Channels and Interference

When users exchange data with Unmanned Aerial vehicles - (UAVs) over air...
research
03/03/2023

Deep Attention Recognition for Attack Identification in 5G UAV scenarios: Novel Architecture and End-to-End Evaluation

Despite the robust security features inherent in the 5G framework, attac...
research
08/09/2020

Consumer UAV Cybersecurity Vulnerability Assessment Using Fuzzing Tests

Unmanned Aerial Vehicles (UAVs) are remote-controlled vehicles capable o...
research
06/03/2020

An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks

UAVNs (unmanned aerial vehicle networks) may become vulnerable to threat...

Please sign up or login with your details

Forgot password? Click here to reset