Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation
Autor(a) principal: | |
---|---|
Data de Publicação: | 2023 |
Outros Autores: | , , , , , , |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10071/29306 |
Resumo: | Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1). |
id |
RCAP_76b663b0916edc5d5834e863f3be1d7f |
---|---|
oai_identifier_str |
oai:repositorio.iscte-iul.pt:10071/29306 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluationSecurityConvolutional neural networksDeep learningJamming detectionJamming identificationUAVUnmanned Aerial Vehicles4G5GDespite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1).IEEE2023-09-11T13:23:02Z2024-01-01T00:00:00Z20242024-02-16T20:46:45Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10071/29306eng0018-954510.1109/TVT.2023.3302814Viana, J.Farkhari, H.Sebastião, P.Campos, L. M.Koutlia, K.Bojovic, B.Lagén S.Dinis, R.info:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-02-18T01:16:54Zoai:repositorio.iscte-iul.pt:10071/29306Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-19T22:33:33.858624Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
title |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
spellingShingle |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation Viana, J. Security Convolutional neural networks Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
title_short |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
title_full |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
title_fullStr |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
title_full_unstemmed |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
title_sort |
Deep attention recognition for attack identification in 5G UAV scenarios: Novel architecture and end-to-end evaluation |
author |
Viana, J. |
author_facet |
Viana, J. Farkhari, H. Sebastião, P. Campos, L. M. Koutlia, K. Bojovic, B. Lagén S. Dinis, R. |
author_role |
author |
author2 |
Farkhari, H. Sebastião, P. Campos, L. M. Koutlia, K. Bojovic, B. Lagén S. Dinis, R. |
author2_role |
author author author author author author author |
dc.contributor.author.fl_str_mv |
Viana, J. Farkhari, H. Sebastião, P. Campos, L. M. Koutlia, K. Bojovic, B. Lagén S. Dinis, R. |
dc.subject.por.fl_str_mv |
Security Convolutional neural networks Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
topic |
Security Convolutional neural networks Deep learning Jamming detection Jamming identification UAV Unmanned Aerial Vehicles 4G 5G |
description |
Despite the robust security features inherent in the 5G framework, attackers will still discover ways to disrupt 5G unmanned aerial vehicle (UAV) operations and decrease UAV control communication performance in Air-to-Ground (A2G) links. Operating under the assumption that the 5G UAV communications infrastructure will never be entirely secure, we propose Deep Attention Recognition (DAtR) as a solution to identify attacks based on a small deep network embedded in authenticated UAVs. Our proposed solution uses two observable parameters: the Signal to Interference plus Noise Ratio (SINR) and the Received Signal Strength Indicator (RSSI) to recognize attacks under Line-of-Sight (LoS), Non-Line-of-Sight (NLoS), and a probabilistic combination of the two conditions. Several attackers are located in random positions in the tested scenarios, while their power varies between simulations. Moreover, terrestrial users are included in the network to impose additional complexity on attack detection. Additionally to the application and deep network architecture, our work innovates by mixing both observable parameters inside DAtR and adding two new pre-processing and post-processing techniques embedded in the deep network results to improve accuracy. We compare several performance parameters in our proposed Deep Network. For example, the impact of Long Short-Term-Memory (LSTM) and Attention layers in terms of their overall accuracy, the window size effect, and test the accuracy when only partial data is available in the training process. Finally, we benchmark our deep network with six widely used classifiers regarding classification accuracy. The eXtreme Gradient Boosting (XGB) outperforms all other algorithms in the deep network, for instance, the three top scoring algorithms: Random Forest (RF), CatBoost (CAT), and XGB obtain mean accuracy of 83.24 \%, 85.60 \%, and 86.33\% in LoS conditions, respectively. When compared to XGB, our algorithm improves accuracy by more than 4\% in the LoS condition (90.80\% with Method 2) and by around 3\% in the short-distance NLoS condition (83.07\% with Method 1). |
publishDate |
2023 |
dc.date.none.fl_str_mv |
2023-09-11T13:23:02Z 2024-01-01T00:00:00Z 2024 2024-02-16T20:46:45Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10071/29306 |
url |
http://hdl.handle.net/10071/29306 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
0018-9545 10.1109/TVT.2023.3302814 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
IEEE |
publisher.none.fl_str_mv |
IEEE |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799134897280909312 |