Unmanned aerial vehicle intrusion detection: Deep-meta-heuristic system

IF 5.8 2区 计算机科学 Q1 TELECOMMUNICATIONS Vehicular Communications Pub Date : 2024-01-23 DOI:10.1016/j.vehcom.2024.100726
Shangting Miao , Quan Pan , Dongxiao Zheng , Dr. Ghulam Mohi-ud-din
{"title":"Unmanned aerial vehicle intrusion detection: Deep-meta-heuristic system","authors":"Shangting Miao ,&nbsp;Quan Pan ,&nbsp;Dongxiao Zheng ,&nbsp;Dr. Ghulam Mohi-ud-din","doi":"10.1016/j.vehcom.2024.100726","DOIUrl":null,"url":null,"abstract":"<div><p><span><span>The UAV (Unmanned Aerial Vehicles) is an automatic aircraft, widely used several applications like emergency management, wildlife conservation, forestry, aerial photography<span><span>, etc. The communication among the UAV is susceptible to security threats with several diverse attacks. The data sharing among the UAV and other vehicles is vulnerable to jamming and suspicious activities that disturbs the communication. To tackle the issue, IDS (Intrusion Detection System) is the significant system that monitors and identifies the suspicious activities in the communication network. To attain this, several conventional researchers attempted to accomplish better intrusion detection<span>. However, classical models are limited by accuracy, noise and computation. To overcome the limitation, proposed method employs particular set of procedures for the intrusion detection in UAV with Intrusion UAV dataset. The dataset comprise of features like drone speed, height, width, velocity etc. Initially, in the respective approach, GG (Greedy based Genetic) algorithm for feature selection, which maintains the exact balance between the greediness and diversified population. Greedy approach enhances </span></span>Genetic algorithm<span><span> in combinatorial optimisation problems. Further, the study proposes Modified Deep CNN-BiLSTM (Deep Convolutional </span>Neural Network and Bi-Long Short Term Memory) with </span></span></span>attention mechanism for classification of intrusion in UAV. The deep CNN is utilized for the ability of handling larger datasets and accuracy. Conversely, it is limited by computation and speed. To tackle the problem, Bi-LSTM is used for the capability of enhancing the computation and speed. Moreover, attention mechanism is used for handle the complexity and to permit the presented system to focus on the significant and relevant data. Correspondingly, proposed approach performance is calculated using performance metrics such as accuracy, specificity, sensitivity, </span><span><math><msup><mrow><mi>R</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> (R-Squared), execution time, RMSE and precision. Furthermore, comparative analysis of the proposed method and classical model exposes the efficacy of the respective system.</p></div>","PeriodicalId":54346,"journal":{"name":"Vehicular Communications","volume":"46 ","pages":"Article 100726"},"PeriodicalIF":5.8000,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vehicular Communications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214209624000019","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

The UAV (Unmanned Aerial Vehicles) is an automatic aircraft, widely used several applications like emergency management, wildlife conservation, forestry, aerial photography, etc. The communication among the UAV is susceptible to security threats with several diverse attacks. The data sharing among the UAV and other vehicles is vulnerable to jamming and suspicious activities that disturbs the communication. To tackle the issue, IDS (Intrusion Detection System) is the significant system that monitors and identifies the suspicious activities in the communication network. To attain this, several conventional researchers attempted to accomplish better intrusion detection. However, classical models are limited by accuracy, noise and computation. To overcome the limitation, proposed method employs particular set of procedures for the intrusion detection in UAV with Intrusion UAV dataset. The dataset comprise of features like drone speed, height, width, velocity etc. Initially, in the respective approach, GG (Greedy based Genetic) algorithm for feature selection, which maintains the exact balance between the greediness and diversified population. Greedy approach enhances Genetic algorithm in combinatorial optimisation problems. Further, the study proposes Modified Deep CNN-BiLSTM (Deep Convolutional Neural Network and Bi-Long Short Term Memory) with attention mechanism for classification of intrusion in UAV. The deep CNN is utilized for the ability of handling larger datasets and accuracy. Conversely, it is limited by computation and speed. To tackle the problem, Bi-LSTM is used for the capability of enhancing the computation and speed. Moreover, attention mechanism is used for handle the complexity and to permit the presented system to focus on the significant and relevant data. Correspondingly, proposed approach performance is calculated using performance metrics such as accuracy, specificity, sensitivity, R2 (R-Squared), execution time, RMSE and precision. Furthermore, comparative analysis of the proposed method and classical model exposes the efficacy of the respective system.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无人驾驶飞行器入侵检测:深度-元亨利系统
无人机(UAV)是一种自动飞行器,广泛应用于应急管理、野生动物保护、林业、航空摄影等多个领域。无人飞行器之间的通信容易受到多种攻击的安全威胁。无人机和其他飞行器之间的数据共享容易受到干扰和可疑活动的影响。为解决这一问题,IDS(入侵检测系统)是监控和识别通信网络中可疑活动的重要系统。为了实现这一目标,一些传统研究人员试图实现更好的入侵检测。然而,经典模型在准确性、噪声和计算方面都存在局限性。为了克服这些限制,所提出的方法采用了一套特殊的程序,利用入侵无人机数据集对无人机进行入侵检测。该数据集包括无人机速度、高度、宽度、速度等特征。最初,在各自的方法中,GG(基于贪婪的遗传)算法用于特征选择,它在贪婪性和多样化种群之间保持了精确的平衡。贪婪方法增强了遗传算法在组合优化问题中的作用。此外,该研究还提出了具有注意力机制的改进型深度 CNN-BiLSTM(深度卷积神经网络和双长短期记忆),用于无人机入侵分类。使用深度 CNN 是因为它能处理更大的数据集,而且准确性高。相反,它的计算能力和速度却受到限制。为了解决这个问题,使用了 Bi-LSTM 来提高计算能力和速度。此外,还使用了注意力机制来处理复杂性,并允许所提出的系统专注于重要的相关数据。相应地,使用准确度、特异性、灵敏度、R2(R 平方)、执行时间、RMSE 和精确度等性能指标来计算所提出方法的性能。此外,对所提方法和经典模型的对比分析也揭示了各自系统的功效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Vehicular Communications
Vehicular Communications Engineering-Electrical and Electronic Engineering
CiteScore
12.70
自引率
10.40%
发文量
88
审稿时长
62 days
期刊介绍: Vehicular communications is a growing area of communications between vehicles and including roadside communication infrastructure. Advances in wireless communications are making possible sharing of information through real time communications between vehicles and infrastructure. This has led to applications to increase safety of vehicles and communication between passengers and the Internet. Standardization efforts on vehicular communication are also underway to make vehicular transportation safer, greener and easier. The aim of the journal is to publish high quality peer–reviewed papers in the area of vehicular communications. The scope encompasses all types of communications involving vehicles, including vehicle–to–vehicle and vehicle–to–infrastructure. The scope includes (but not limited to) the following topics related to vehicular communications: Vehicle to vehicle and vehicle to infrastructure communications Channel modelling, modulating and coding Congestion Control and scalability issues Protocol design, testing and verification Routing in vehicular networks Security issues and countermeasures Deployment and field testing Reducing energy consumption and enhancing safety of vehicles Wireless in–car networks Data collection and dissemination methods Mobility and handover issues Safety and driver assistance applications UAV Underwater communications Autonomous cooperative driving Social networks Internet of vehicles Standardization of protocols.
期刊最新文献
Decentralized multi-hop data processing in UAV networks using MARL Prediction-based data collection of UAV-assisted Maritime Internet of Things Hybrid mutual authentication for vehicle-to-infrastructure communication without the coverage of roadside units Hierarchical federated deep reinforcement learning based joint communication and computation for UAV situation awareness Volunteer vehicle assisted dependent task offloading based on ant colony optimization algorithm in vehicular edge computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1