Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

WITHDRAWN: Self-adaptive Intrusion Detection System for UAV-to-UAV Communications in UAV Networks

View through CrossRef
Abstract Unmanned aerial vehicles (UAVs) have recently attracted many researchers' attention because of their extensive applications. Security issues, in particular, are a serious concern in such networks since the top-secret information exchanged between UAVs is susceptible to various attacks such as Sybil, blackhole, and Flooding attacks. To identify such malicious UAVs that threaten the connections between normal UAVs, we introduce an impermeability method called SID-UAV that works at the level of UAV-to-UAV. The SID-UAV method, by employing a self-adaptive system, discovers the most reliable route from origin to destination. This approach deals with finding the malicious UAV and selecting the most reliable routes in several phases, including the route discovery phase, the decision-making phase, the attacker counter phase, and the knowledge database phase by using multi-module methods and applying Human Immune System (HIS). In the SID-UAV method, three main modules are intended: route analysis module, decision module, and defense module. Each of these modules has sub-modules and is distributed in different parts in UAV networks. Each module and its sub-modules have tasks, and all of these modules are connected to the knowledge base to record information in it and use the stored information quickly. The NS-3 simulator tool is exploited to simulate the proposed method. The results gained from simulation indicated that the SID-UAV method in criteria of Average Detection Ratio (ADR), Average Packet Delivery Ratio (APDR), Average Packet Lost Ratio (APLR), Average False Positive (AFP), Average False Negative (AFN) have acceptable performance relative to BRUIDS, SFA, and SUAS-HIS methods.
Springer Science and Business Media LLC
Title: WITHDRAWN: Self-adaptive Intrusion Detection System for UAV-to-UAV Communications in UAV Networks
Description:
Abstract Unmanned aerial vehicles (UAVs) have recently attracted many researchers' attention because of their extensive applications.
Security issues, in particular, are a serious concern in such networks since the top-secret information exchanged between UAVs is susceptible to various attacks such as Sybil, blackhole, and Flooding attacks.
To identify such malicious UAVs that threaten the connections between normal UAVs, we introduce an impermeability method called SID-UAV that works at the level of UAV-to-UAV.
The SID-UAV method, by employing a self-adaptive system, discovers the most reliable route from origin to destination.
This approach deals with finding the malicious UAV and selecting the most reliable routes in several phases, including the route discovery phase, the decision-making phase, the attacker counter phase, and the knowledge database phase by using multi-module methods and applying Human Immune System (HIS).
In the SID-UAV method, three main modules are intended: route analysis module, decision module, and defense module.
Each of these modules has sub-modules and is distributed in different parts in UAV networks.
Each module and its sub-modules have tasks, and all of these modules are connected to the knowledge base to record information in it and use the stored information quickly.
The NS-3 simulator tool is exploited to simulate the proposed method.
The results gained from simulation indicated that the SID-UAV method in criteria of Average Detection Ratio (ADR), Average Packet Delivery Ratio (APDR), Average Packet Lost Ratio (APLR), Average False Positive (AFP), Average False Negative (AFN) have acceptable performance relative to BRUIDS, SFA, and SUAS-HIS methods.

Related Results

Development and application of biological intelligence technology in computer
Development and application of biological intelligence technology in computer
To study the development and application of biological intelligence technology in computers and realize high-precision network anomaly detection, a distributed intrusion detection ...
Is a Fitbit a Diary? Self-Tracking and Autobiography
Is a Fitbit a Diary? Self-Tracking and Autobiography
Data becomes something of a mirror in which people see themselves reflected. (Sorapure 270)In a 2014 essay for The New Yorker, the humourist David Sedaris recounts an obsession spu...
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Analysis of a Fuzzy Based Intrusion Detection System in Wireless Ad Hoc Networks
Technology and its growth is considerably enormous. This massive growth allows the opening of new fields of application in the domain of wireless networking and mobile ad-hoc netwo...
Network Resource Management in UAV-Assisted Wireless Networks with RF Energy Harvesting
Network Resource Management in UAV-Assisted Wireless Networks with RF Energy Harvesting
<p dir="ltr">Future sixth-generation (6G) wireless networks are expected to reliably connect billions of devices with diverse requirements. Unmanned aerial vehicles (UAVs) ca...
Tethered UAV-active defense against intelligent cluster
Tethered UAV-active defense against intelligent cluster
Purpose With the development of wireless networks and artificial intelligence technology, unmanned aerial vehicle (UAV) clusters are widely used in various fields...
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
A Survey Non-Terrestrial Networks in 6G/ 7G Smart Network for 2035+ and Beyond
3GPP TR 38.821, “Solutions for NR to support non-terrestrial networks (NTN),” Release 16, Jan. 2020. [Online]. Available: https://www.3gpp.org/. P. K. Chowdhury, M. Atiquzzaman, W....
Energy-Aware Hierarchical Kolmogorov–Arnold Networks for TinyML-Based UAV Intrusion Detection on Microcontrollers
Energy-Aware Hierarchical Kolmogorov–Arnold Networks for TinyML-Based UAV Intrusion Detection on Microcontrollers
The increasing use of Unmanned Aerial Vehicle (UAV) networks in mission-critical applications requires intrusion detection systems (IDS) that maintain reliable security functionali...
ACM SIGCOMM computer communication review
ACM SIGCOMM computer communication review
At some point in the future, how far out we do not exactly know, wireless access to the Internet will outstrip all other forms of access bringing the freedom of mobility to the way...

Back to Top