ETD: An Efficient Time Delay Attack Detection Framework for UAV Networks

被引:5
|
作者
Zhai, Wenbin [1 ]
Liu, Liang [1 ]
Ding, Youwei [2 ]
Sun, Shanshan [1 ]
Gu, Ying [3 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[2] Nanjing Univ Chinese Med, Sch Artificial Intelligence & Informat Technol, Nanjing 210023, Peoples R China
[3] Columbia Univ, Sch Engn & Appl Sci, New York, NY 10032 USA
基金
中国国家自然科学基金;
关键词
Delay effects; Delays; Autonomous aerial vehicles; Behavioral sciences; Routing; Trajectory; Wireless sensor networks; Time delay attack; UAV networks; lightweight; one-class classification; trajectory information; K-means clustering; ROUTE; NODES; TRUST;
D O I
10.1109/TIFS.2023.3272862
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Unmanned Aerial Vehicle (UAV) networks are widely used in both military and civilian scenarios. However, due to the distributed nature, they are also vulnerable to threats from adversaries. Time delay attack is a type of internal attack which maliciously delays the transmission of data packets and further causes great damage to UAV networks. Furthermore, it is easy to implement and difficult to detect due to the avoidance of packet modification and the unique characteristics of UAV networks. However, to the best of our knowledge, there is no research on time delay attack detection in UAV networks. In this paper, we propose an Efficient Time Delay Attack Detection Framework (ETD). First, we collect and select delay-related features from four different dimensions, namely delay, node, message and connection. Meanwhile, we utilize the pre-planned trajectory information to accurately calculate the real forwarding delay of nodes. Then, one-class classification is used to train the detection model, and the forwarding behaviors of all nodes can be evaluated, based on which their trust values can be obtained. Finally, the K-Means clustering method is used to distinguish malicious nodes from benign ones according to their trust values. Through extensive simulation, we demonstrate that ETD can achieve higher than 80% detection accuracy with less than 2.5% extra overhead in various settings of UAV networks and different routing protocols.
引用
收藏
页码:2913 / 2928
页数:16
相关论文
共 50 条
  • [41] An efficient intrusion detection and prevention framework for ad hoc networks
    Korba, Abdelaziz Amara
    Nafaa, Mehdi
    Ghanemi, Salim
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 298 - 325
  • [42] Defending Flooding Attack in Delay Tolerant Networks
    Nagrath, Preeti
    Aneja, Sandhya
    Purohit, G. N.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 40 - 45
  • [43] Real-Time Attack and Failure Detection for Next Generation Networks
    Mansour, Christopher
    Chasaki, Danai
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2016, : 189 - 193
  • [44] An Objects Detection Framework in UAV Videos
    Lu, Jianjiang
    Fang, Penglfei
    Tian, Yulong
    ADVANCES IN COMPUTER SCIENCE AND EDUCATION APPLICATIONS, PT II, 2011, 202 : 113 - 119
  • [46] Memory-Efficient Deep Learning for Botnet Attack Detection in IoT Networks
    Popoola, Segun I.
    Adebisi, Bamidele
    Ande, Ruth
    Hammoudeh, Mohammad
    Atayero, Aderemi A.
    ELECTRONICS, 2021, 10 (09)
  • [47] Secure Routing Framework for Mitigating Time-Delay Trojan Attack in System-on-Chip
    Rajan, Manju
    Choksey, Mayank
    Jose, John
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 144
  • [48] Attack detection in large networks
    May, J
    Peterson, J
    Bauman, J
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 15 - 21
  • [49] A Fuzzy Routing Method in UAV Delay Tolerant Networks
    Li, Xuanya
    Ci, Linlin
    Jin, Wenbing
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2012, E95B (09) : 2769 - 2773
  • [50] Framework and Models for Multistep Attack Detection
    Marchetti, Mirco
    Colajanni, Michele
    Manganiello, Fabio
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (04): : 73 - +