ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks

被引:5
|
作者
Zhai, Wenbin [1 ]
Liu, Liang [1 ]
Ding, Youwei [2 ]
Sun, Shanshan [1 ]
Gu, Ying [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Univ Chinese Med, Sch Artificial Intelligence & Informat Technol, Nanjing 210023, Peoples R China
[3] Columbia Univ, Sch Engn & Appl Sci, New York, NY 10032 USA
基金
中国国家自然科学基金;
关键词
Delay effects; Delays; Autonomous aerial vehicles; Behavioral sciences; Routing; Trajectory; Wireless sensor networks; Time delay attack; UAV networks; lightweight; one-class classification; trajectory information; K-means clustering; ROUTE; NODES; TRUST;
D O I
10.1109/TIFS.2023.3272862
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Unmanned Aerial Vehicle (UAV) networks are widely used in both military and civilian scenarios. However, due to the distributed nature, they are also vulnerable to threats from adversaries. Time delay attack is a type of internal attack which maliciously delays the transmission of data packets and further causes great damage to UAV networks. Furthermore, it is easy to implement and difficult to detect due to the avoidance of packet modification and the unique characteristics of UAV networks. However, to the best of our knowledge, there is no research on time delay attack detection in UAV networks. In this paper, we propose an Efficient Time Delay Attack Detection Framework (ETD). First, we collect and select delay-related features from four different dimensions, namely delay, node, message and connection. Meanwhile, we utilize the pre-planned trajectory information to accurately calculate the real forwarding delay of nodes. Then, one-class classification is used to train the detection model, and the forwarding behaviors of all nodes can be evaluated, based on which their trust values can be obtained. Finally, the K-Means clustering method is used to distinguish malicious nodes from benign ones according to their trust values. Through extensive simulation, we demonstrate that ETD can achieve higher than 80% detection accuracy with less than 2.5% extra overhead in various settings of UAV networks and different routing protocols.
引用
收藏
页码:2913 / 2928
页数:16
相关论文
共 50 条
  • [21] An efficient framework for anomaly detection in attributed social networks
    Khan W.
    Haroon M.
    International Journal of Information Technology, 2022, 14 (6) : 3069 - 3076
  • [22] Energy-Efficient Multi-UAV Coverage Deployment in UAV Networks:A Game-Theoretic Framework
    Lang Ruan
    Jinlong Wang
    Jin Chen
    Yitao Xu
    Yang Yang
    Han Jiang
    Yuli Zhang
    Yuhua Xu
    中国通信, 2018, 15 (10) : 194 - 209
  • [23] Energy-Efficient Multi-UAV Coverage Deployment in UAV Networks: A Game-Theoretic Framework
    Ruan, Lang
    Wang, Jinlong
    Chen, Jin
    Xu, Yitao
    Yang, Yang
    Jiang, Han
    Zhang, Yuli
    Xu, Yuhua
    CHINA COMMUNICATIONS, 2018, 15 (10) : 194 - 209
  • [24] Time Series Analysis for Jamming Attack Detection in Wireless Networks
    Cheng, Maggie
    Ling, Yi
    Wu, Wei Biao
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [25] YOLOFLY: A Consumer-Centric Framework for Efficient Object Detection in UAV Imagery
    Ma, Pengwei
    Fei, Hongmei
    Jia, Dingyi
    Sun, Zheng
    Lian, Nan
    Wei, Jingyi
    Zhou, Jie
    ELECTRONICS, 2025, 14 (03):
  • [26] SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
    Yang, Wenbin
    Gong, Xueluan
    Chen, Yanjiao
    Wang, Qian
    Dong, Jianshuo
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 90 - 100
  • [27] SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
    Wenbin YANG
    Xueluan GONG
    Yanjiao CHEN
    Qian WANG
    Jianshuo DONG
    Chinese Journal of Electronics, 2024, 33 (01) : 90 - 100
  • [28] A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
    Kim, Chano
    Shin, Seungjae
    Park, Chanil
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (07): : 1479 - 1483
  • [29] An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks
    Alajeely, Majeed
    Ahmad, Asma'a
    Doss, Robin
    Mak-Hau, Vicky
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 84 - 100
  • [30] Efficient training of Time Delay Neural Networks for sequential patterns
    Cancelliere, R
    Gemello, R
    NEUROCOMPUTING, 1996, 10 (01) : 33 - 42