Two methods for Jamming Identification in UAVs Networks using New
Synthetic Dataset
- URL: http://arxiv.org/abs/2203.11373v1
- Date: Mon, 21 Mar 2022 22:32:37 GMT
- Title: Two methods for Jamming Identification in UAVs Networks using New
Synthetic Dataset
- Authors: Joseanne Viana, Hamed Farkhari, Luis Miguel Campos, Pedro Sebastiao,
Francisco Cercas, Luis Bernardo, Rui Dinis
- Abstract summary: This paper presents two strategies to identify Jammers in UAV networks.
The first strategy is based on time series approaches for anomaly detection.
The second is based on newly designed deep networks.
- Score: 3.473643536900493
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from
self-interested users who utilize radio devices for their benefits during UAV
transmissions. The vulnerability occurs due to the open nature of air-to-ground
(A2G) wireless communication networks, which may enable network-wide attacks.
This paper presents two strategies to identify Jammers in UAV networks. The
first strategy is based on time series approaches for anomaly detection where
the signal available in resource blocks are decomposed statistically to find
trend, seasonality, and residues, while the second is based on newly designed
deep networks. The joined technique is suitable for UAVs because the
statistical model does not require heavy computation processing but is limited
in generalizing possible attack's identification. On the other hand, the deep
network can classify attacks accurately but requires more resources. The
simulation considers the location and power of the jamming attacks and the UAV
position related to the base station. The statistical method technique made it
feasible to identify 84.38 % of attacks when the attacker was at 30 m from the
UAV. Furthermore, the Deep network's accuracy was approximately 99.99 % for
jamming powers greater than two and jammer distances less than 200 meters.
Related papers
- Anti-Jamming Path Planning Using GCN for Multi-UAV [0.0]
The effectiveness of UAV swarms can be severely compromised by jamming technology.
A novel approach, where UAV swarms leverage collective intelligence to predict jamming areas, is proposed.
A multi-agent control algorithm is then employed to disperse the UAV swarm, avoid jamming, and regroup upon reaching the target.
arXiv Detail & Related papers (2024-03-13T07:28:05Z) - FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning
Attacks in Federated Learning [98.43475653490219]
Federated learning (FL) is susceptible to poisoning attacks.
FreqFed is a novel aggregation mechanism that transforms the model updates into the frequency domain.
We demonstrate that FreqFed can mitigate poisoning attacks effectively with a negligible impact on the utility of the aggregated model.
arXiv Detail & Related papers (2023-12-07T16:56:24Z) - UAV Swarm-enabled Collaborative Secure Relay Communications with
Time-domain Colluding Eavesdropper [115.56455278813756]
Unmanned aerial vehicles (UAV) as aerial relays are practically appealing for assisting Internet Things (IoT) network.
In this work, we aim to utilize the UAV to assist secure communication between the UAV base station and terminal terminal devices.
arXiv Detail & Related papers (2023-10-03T11:47:01Z) - Routing Recovery for UAV Networks with Deliberate Attacks: A
Reinforcement Learning based Approach [23.317947964385613]
This paper focuses on the routing plan and recovery for UAV networks with attacks.
A deliberate attack model based on the importance of nodes is designed to represent enemy attacks.
An intelligent algorithm based on reinforcement learning is proposed to recover the routing path when UAVs are attacked.
arXiv Detail & Related papers (2023-08-14T07:11:55Z) - Deep Attention Recognition for Attack Identification in 5G UAV
scenarios: Novel Architecture and End-to-End Evaluation [3.3253720226707992]
Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations.
We propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs.
arXiv Detail & Related papers (2023-03-03T17:10:35Z) - A Convolutional Attention Based Deep Network Solution for UAV Network
Attack Recognition over Fading Channels and Interference [3.1230069539161405]
This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels.
The prospective algorithm is generalizable regarding attack identification, which does not occur during training.
A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms.
arXiv Detail & Related papers (2022-07-16T22:08:12Z) - Robust Adversarial Attacks Detection based on Explainable Deep
Reinforcement Learning For UAV Guidance and Planning [4.640835690336653]
Adversarial attacks on Uncrewed Aerial Vehicle (UAV) agents operating in public are increasing.
Deep Learning (DL) approaches to control and guide these UAVs can be beneficial in terms of performance but can add concerns regarding the safety of those techniques and their vulnerability against adversarial attacks.
This paper proposes an innovative approach based on the explainability of DL methods to build an efficient detector that will protect these DL schemes and the UAVs adopting them from attacks.
arXiv Detail & Related papers (2022-06-06T15:16:10Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Attention-based Reinforcement Learning for Real-Time UAV Semantic
Communication [53.46235596543596]
We study the problem of air-to-ground ultra-reliable and low-latency communication (URLLC) for a moving ground user.
We propose a novel multi-agent deep reinforcement learning framework, coined a graph attention exchange network (GAXNet)
GAXNet achieves 6.5x lower latency with the target 0.0000001 error rate, compared to a state-of-the-art baseline framework.
arXiv Detail & Related papers (2021-05-22T12:43:25Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - Federated Learning in the Sky: Joint Power Allocation and Scheduling
with UAV Swarms [98.78553146823829]
Unmanned aerial vehicle (UAV) swarms must exploit machine learning (ML) in order to execute various tasks.
In this paper, a novel framework is proposed to implement distributed learning (FL) algorithms within a UAV swarm.
arXiv Detail & Related papers (2020-02-19T14:04:01Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.