ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks

被引:5
|
作者
Zhai, Wenbin [1 ]
Liu, Liang [1 ]
Ding, Youwei [2 ]
Sun, Shanshan [1 ]
Gu, Ying [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Univ Chinese Med, Sch Artificial Intelligence & Informat Technol, Nanjing 210023, Peoples R China
[3] Columbia Univ, Sch Engn & Appl Sci, New York, NY 10032 USA
基金
中国国家自然科学基金;
关键词
Delay effects; Delays; Autonomous aerial vehicles; Behavioral sciences; Routing; Trajectory; Wireless sensor networks; Time delay attack; UAV networks; lightweight; one-class classification; trajectory information; K-means clustering; ROUTE; NODES; TRUST;
D O I
10.1109/TIFS.2023.3272862
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Unmanned Aerial Vehicle (UAV) networks are widely used in both military and civilian scenarios. However, due to the distributed nature, they are also vulnerable to threats from adversaries. Time delay attack is a type of internal attack which maliciously delays the transmission of data packets and further causes great damage to UAV networks. Furthermore, it is easy to implement and difficult to detect due to the avoidance of packet modification and the unique characteristics of UAV networks. However, to the best of our knowledge, there is no research on time delay attack detection in UAV networks. In this paper, we propose an Efficient Time Delay Attack Detection Framework (ETD). First, we collect and select delay-related features from four different dimensions, namely delay, node, message and connection. Meanwhile, we utilize the pre-planned trajectory information to accurately calculate the real forwarding delay of nodes. Then, one-class classification is used to train the detection model, and the forwarding behaviors of all nodes can be evaluated, based on which their trust values can be obtained. Finally, the K-Means clustering method is used to distinguish malicious nodes from benign ones according to their trust values. Through extensive simulation, we demonstrate that ETD can achieve higher than 80% detection accuracy with less than 2.5% extra overhead in various settings of UAV networks and different routing protocols.
引用
收藏
页码:2913 / 2928
页数:16
相关论文
共 50 条
  • [31] Efficient keyword spotting using time delay neural networks
    Myer, Samuel
    Tomar, Vikrant Singh
    19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, : 1264 - 1268
  • [32] Runtime Detection of Time-Delay Security Attack in System-on-Chip
    Rajan, Manju
    Choksey, Mayank
    Jose, John
    2022 15TH IEEE/ACM INTERNATIONAL WORKSHOP ON NETWORK ON CHIP ARCHITECTURES (NOCARC 2022), 2022, : 15 - 20
  • [33] A framework for real-time worm attack detection and backbone monitoring
    Dübendorfer, T
    Wagner, A
    Plattner, B
    IWCIP 2005: First IEEE International Workshop on Critical Infrastructure Protection, Proceedings, 2005, : 3 - 12
  • [34] Runtime Detection of Time-Delay Security Attack in System-An-Chip
    Rajan, Manju
    Choksey, Mayank
    Jose, John
    2022 15th International Workshop on Network on Chip Architectures, NoCArc 2022 - In conjunction with the 55th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2022, 2022,
  • [35] Real⁃time small target detection networks for UAV remote sensing
    Liu, Yanfang
    She, Jiayu
    Yuan, Qiufan
    Zhou, Rui
    Qi, Naiming
    Hangkong Xuebao/Acta Aeronautica et Astronautica Sinica, 2024, 45 (14):
  • [36] A Machine Learning Based Attack in UAV Communication Networks
    Chen, Xiao-Chun
    Chen, Yu-Jia
    2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL), 2019,
  • [37] Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks
    Sharma, Deepak Kumar
    Dhankhar, Tarun
    Agrawal, Gaurav
    Singh, Satish Kumar
    Gupta, Deepak
    Nebhen, Jamel
    Razzak, Imran
    AD HOC NETWORKS, 2021, 121
  • [38] Analytical Framework for Contact Time Evaluation in Delay-Tolerant Networks
    Mabrouki, Issam
    Hayel, Yezekael
    El-Azouzi, Rachid
    BIOINSPIRED MODELS OF NETWORK, INFORMATION, AND COMPUTING SYSTEMS, 2010, 39 : 177 - 184
  • [39] Seizure Detection Using Time Delay Neural Networks and LSTMs
    Thyagachandran, A.
    Kumar, M.
    Sur, M.
    Aghoram, R.
    Murthy, H.
    2020 IEEE SIGNAL PROCESSING IN MEDICINE AND BIOLOGY SYMPOSIUM, 2020,
  • [40] An Efficient Stabbing Based Intrusion Detection Framework for Sensor Networks
    Arivazhagi, A.
    Kumar, S. Raja
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (01): : 141 - 157