Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation

Detalhes bibliográficos
Autor(a) principal: Viana, J.
Data de Publicação: 2023
Outros Autores: Farkhari, H., Sebastião, P., Campos, L. M., Koutlia, K., Bojovic, B., Lagén S., Dinis, R.
Tipo de documento: Artigo
Idioma: eng
Título da fonte: Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
Texto Completo: http://hdl.handle.net/10071/29306
Resumo: Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).
id RCAP_76b663b0916edc5d5834e863f3be1d7f
oai_identifier_str oai:repositorio.iscte-iul.pt:10071/29306
network_acronym_str RCAP
network_name_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository_id_str 7160
spelling Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluationSecurityConvolutional neural networksDeep learningJamming detectionJamming identificationUAVUnmanned Aerial Vehicles4G5GDespite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).IEEE2023-09-11T13:23:02Z2024-01-01T00:00:00Z20242024-02-16T20:46:45Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10071/29306eng0018-954510.1109/TVT.2023.3302814Viana, J.Farkhari, H.Sebastião, P.Campos, L. M.Koutlia, K.Bojovic, B.Lagén S.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-02-18T01:16:54Zoai:repositorio.iscte-iul.pt:10071/29306Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T22:33:33.858624Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse
dc.title.none.fl_str_mv Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
spellingShingle Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
Viana, J.
Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
title_short Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_full Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_fullStr Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_full_unstemmed Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
title_sort Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
author Viana, J.
author_facet Viana, J.
Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
author_role author
author2 Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
author2_role author
author
author
author
author
author
author
dc.contributor.author.fl_str_mv Viana, J.
Farkhari, H.
Sebastião, P.
Campos, L. M.
Koutlia, K.
Bojovic, B.
Lagén S.
Dinis, R.
dc.subject.por.fl_str_mv Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
topic Security
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
UAV
Unmanned Aerial Vehicles
4G
5G
description Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).
publishDate 2023
dc.date.none.fl_str_mv 2023-09-11T13:23:02Z
2024-01-01T00:00:00Z
2024
2024-02-16T20:46:45Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/article
format article
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://hdl.handle.net/10071/29306
url http://hdl.handle.net/10071/29306
dc.language.iso.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv 0018-9545
10.1109/TVT.2023.3302814
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv IEEE
publisher.none.fl_str_mv IEEE
dc.source.none.fl_str_mv reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron:RCAAP
instname_str Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
instacron_str RCAAP
institution RCAAP
reponame_str Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
collection Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)
repository.name.fl_str_mv Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação
repository.mail.fl_str_mv
_version_ 1799134897280909312