Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/28842
Registo completo
Campo DCValorIdioma
dc.contributor.authorViana, J.-
dc.contributor.authorFarkhari, H.-
dc.contributor.authorCampos, L. M.-
dc.contributor.authorSebastião, P.-
dc.contributor.authorCercas, F.-
dc.contributor.authorBernardo, L.-
dc.contributor.authorDinis, R.-
dc.contributor.editorHämäläinen, J.-
dc.date.accessioned2023-06-30T09:09:40Z-
dc.date.available2023-06-30T09:09:40Z-
dc.date.issued2022-
dc.identifier.citationViana, J., Farkhari, H., Campos, L. M., Sebastião, P., Cercas, F., Bernardo, L., & Dinis, R. (2022). Two methods for jamming identification in UAV networks using new synthetic dataset. In J. Hämäläinen (Ed.), 2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring). IEEE. https://doi.org/10.1109/VTC2022-Spring54318.2022.9860816-
dc.identifier.isbn978-1-6654-8243-1-
dc.identifier.issn1090-3038-
dc.identifier.urihttp://hdl.handle.net/10071/28842-
dc.description.abstractUnmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices to disrupt UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on a time series approach for anomaly detection where the available signal in the resource block is decomposed statistically to find trends, seasonality, and residues. The second is based on newly designed deep networks. The combined techniques are suitable for UAVs because the statistical model does not require heavy computation processing, but is limited to generalizing possible attacks that might occur. On the other hand, the designed deep network can classify attacks accurately, but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38% of attacks when the attacker was at a distance of 30 m from the UAV. Furthermore, the Deep network’s accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.eng
dc.language.isoeng-
dc.publisherIEEE-
dc.relationinfo:eu-repo/grantAgreement/EC/H2020/813391/EU-
dc.relation.ispartof2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring)-
dc.rightsopenAccess-
dc.subjectCybersecurityeng
dc.subjectConvolutional Neural Networks (CNNs)eng
dc.subjectDeep learningeng
dc.subjectJamming detectioneng
dc.subjectJamming identificationeng
dc.subjectUAVeng
dc.subjectUnmanned Aerial Vehicleseng
dc.subject4Geng
dc.subject5Geng
dc.titleTwo methods for jamming identification in UAV networks using new synthetic dataseteng
dc.typeconferenceObject-
dc.event.title95th IEEE Vehicular Technology Conference - Spring, VTC 2022-Spring-
dc.event.typeConferênciapt
dc.event.locationHelsinkieng
dc.event.date2022-
dc.peerreviewedyes-
dc.date.updated2023-06-30T10:44:28Z-
dc.description.versioninfo:eu-repo/semantics/acceptedVersion-
dc.identifier.doi10.1109/VTC2022-Spring54318.2022.9860816-
iscte.identifier.cienciahttps://ciencia.iscte-iul.pt/id/ci-pub-89477-
iscte.alternateIdentifiers.wosWOS:WOS:000861825802058-
iscte.alternateIdentifiers.scopus2-s2.0-85137803729-
Aparece nas coleções:IT-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceobject_89477.pdf1,67 MBAdobe PDFVer/Abrir


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.