Utilize este identificador para referenciar este registo: http://hdl.handle.net/10071/28843
Autoria: Viana, J.
Farkhari, H.
Campos, L. M.
Sebastião, P.
Koutlia, K.
Lagén, S.
Bernardo, L.
Dinis, R.
Data: 2022
Título próprio: A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference
Título e volume do livro: 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall)
Título do evento: 96th IEEE Vehicular Technology Conference, VTC 2022-Fall 2022
Referência bibliográfica: Viana, J., Farkhari, H., Campos, L. M., Sebastião, P., Koutlia, K., Lagén, S., Bernardo, L., & Dinis, R. (2022).A convolutional attention based deep learning solution for 5G UAV network attack recognition over fading channels and interference. In 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall). IEEE. https://doi.org/10.1109/VTC2022-Fall57202.2022.10012726
ISSN: 1090-3038
ISBN: 978-1-6654-5468-1
DOI (Digital Object Identifier): 10.1109/VTC2022-Fall57202.2022.10012726
Palavras-chave: Cybersecurity
Convolutional neural networks
Deep learning
Jamming detection
Jamming identification
Unmanned Aerial Vehicles
5G
Resumo: When users exchange data with Unmanned Aerial Vehicles - (UAVs) over Air-to-Ground - (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e., data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a Deep Learning (DL) approach for detecting attacks on UAVs equipped with Orthogonal Frequency Division Multiplexing - (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The developed algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks shows that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. The developed algorithm also detects moving attackers from a distance of 500 m.
Arbitragem científica: yes
Acesso: Acesso Aberto
Aparece nas coleções:IT-CRI - Comunicações a conferências internacionais

Ficheiros deste registo:
Ficheiro TamanhoFormato 
conferenceobject_96438.pdf805,3 kBAdobe PDFVer/Abrir


FacebookTwitterDeliciousLinkedInDiggGoogle BookmarksMySpaceOrkut
Formato BibTex mendeley Endnote Logotipo do DeGóis Logotipo do Orcid 

Todos os registos no repositório estão protegidos por leis de copyright, com todos os direitos reservados.