Javascript must be enabled to continue!
Tethered UAV-active defense against intelligent cluster
View through CrossRef
Purpose
With the development of wireless networks and artificial intelligence technology, unmanned aerial vehicle (UAV) clusters are widely used in various fields and cluster intelligence attacks are more harmful. However, most methods defending against UAV clusters produce consumption of non-reusable resources. To address this problem, a tethered UAV is adopted to perform active defense against adversary UAV clusters in this article, which can reduce the consumption of nonreusable resources.
Design/methodology/approach
Using tethered UAV to enter the opponent’s UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node. The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node, after which the packets are selectively tampered with and discarded to cripple the opposing UAV cluster.
Findings
Comparing packet loss rate and delay with a normal network and the network that suffered from grayhole attack, it can be seen that the proposed scheme makes the tethered UAV close to the normal nodes in the UAV cluster and difficult to be detected. In addition, the tethered UAV is able to capture more packets compared to the other two networks, and the average deviation of the tethered UAV in capturing packets is around 5% in repeated experiments.
Originality/value
This article proposes an active defense method assisted by tethered UAV, which can minimize the consumption of nonreusable resources. The tethered UAV is converged to ordinary nodes of the opponent’s cluster, in which it is not easily detected. It provides a new direction for point-air defense technology.
Title: Tethered UAV-active defense against intelligent cluster
Description:
Purpose
With the development of wireless networks and artificial intelligence technology, unmanned aerial vehicle (UAV) clusters are widely used in various fields and cluster intelligence attacks are more harmful.
However, most methods defending against UAV clusters produce consumption of non-reusable resources.
To address this problem, a tethered UAV is adopted to perform active defense against adversary UAV clusters in this article, which can reduce the consumption of nonreusable resources.
Design/methodology/approach
Using tethered UAV to enter the opponent’s UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node.
The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node, after which the packets are selectively tampered with and discarded to cripple the opposing UAV cluster.
Findings
Comparing packet loss rate and delay with a normal network and the network that suffered from grayhole attack, it can be seen that the proposed scheme makes the tethered UAV close to the normal nodes in the UAV cluster and difficult to be detected.
In addition, the tethered UAV is able to capture more packets compared to the other two networks, and the average deviation of the tethered UAV in capturing packets is around 5% in repeated experiments.
Originality/value
This article proposes an active defense method assisted by tethered UAV, which can minimize the consumption of nonreusable resources.
The tethered UAV is converged to ordinary nodes of the opponent’s cluster, in which it is not easily detected.
It provides a new direction for point-air defense technology.
Related Results
Swarm-based Counter UAV Defense System
Swarm-based Counter UAV Defense System
Abstract
Unmanned Aerial Vehicles (UAVs) have quickly become one of the promising Internet-of-Things (IoT) devices for smart cities thanks to their mobility, agility, and o...
Mixed-reality for unmanned aerial vehicle operations in near earth environments
Mixed-reality for unmanned aerial vehicle operations in near earth environments
Future applications will bring unmanned aerial vehicles (UAVs) to near Earth environments such as urban areas, causing a change in the way UAVs are currently operated. Of concern i...
Constructing a VANET based on cluster chains
Constructing a VANET based on cluster chains
SUMMARYThe paper proposes a scheme on constructing a vehicular ad‐hoc network based on cluster chains. In the cluster construction algorithm, the distance from a potential cluster ...
Ciudad de Museos: clústeres de museos en la ciudad contemporánea
Ciudad de Museos: clústeres de museos en la ciudad contemporánea
En nuestra cultura el museo ocupa un lugar privilegiado simbólicamente, pero también físicamente, en la ciudad. Y no tan sólo lo ocupa, sino lo crea, lo define, lo cambia y le da s...
Research on Autonomous Behavior Decision of UAV Cluster with Limited Communication Bandwidth
Research on Autonomous Behavior Decision of UAV Cluster with Limited Communication Bandwidth
Abstract
Communication is the basis of UAV(Unmanned Aerial Vehicle,UAV) cluster cooperative decision control. In the battlefield environment with scarce communication resou...
Treatment of Urea Waste Water over Coconut Shell Activated Carbon Tethered Urease
Treatment of Urea Waste Water over Coconut Shell Activated Carbon Tethered Urease
Urease was successfully tethered onto coconut shell activated carbon (AC) granules. Degradation of urea was carried out in packed bed over the tethered urease. For 75% of retained ...
Evaluation of genetic divergence in Barley (Hordeum vulgare L.) germplasms
Evaluation of genetic divergence in Barley (Hordeum vulgare L.) germplasms
Thirty genotypes of wheat were evaluated for assessing genetic divergence among eleven different characters across one environment for exploitation in a breeding programme for impr...
Quantifying corn emergence using UAV imagery and machine learning
Quantifying corn emergence using UAV imagery and machine learning
Corn (Zea mays L.) is one of the important crops in the United States for animal feed, ethanol production, and human consumption. To maximize the final corn yield, one of the criti...

