Real Time Malicious Drone Detection Using Deep Learning on FANETs

被引:0
作者
Yapicioglu, Cengizhan [1 ,2 ]
Demirci, Mehmet [1 ]
Akcayol, M. Ali [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkiye
[2] ASELSAN INC, Ankara, Turkiye
来源
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024 | 2024年
关键词
Computer Vision; Object Detection; Deep learning; CNN; image processing; FANET; Drone Networks; ATTACKS;
D O I
10.1109/BLACKSEACOM61746.2024.10646316
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Unmanned aerial vehicles, especially drones, are increasingly used for transportation, communication and military purposes. Using only one drone to accomplish a mission leads to a solution that is costly and has low error tolerance. For this reason, a network structure called Flying Ad-Hoc Networks (FANET) organize drones with a task sharing mechanism to lower cost. However, these networks remain vulnerable to various attacks due to vulnerabilities such as the use of civilian drones, use of unencrypted GPS signals, physical attacks using malicious drones, etc. Solutions to these attacks should consider the limited memory and calculation capabilities of drones. In this study, drone detection and subsequent classification of malicious drones, which are potential sources of man-in-the-middle or physical attacks, were implemented based on real images that can be captured by the drone camera. You Only Look Once (YOLO) detection algorithm was used in the drone detection phase and a Convolutional Neural Network model was used in the classification phase. In the study, a dataset consisting of 4 classes (Yuneec Typhon, DJI Tello, DJI Phantom 4 and Other) was created using internet resources and YouTube videos, and the classification success was measured as 88.78%.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 25 条
[1]   Applications, Deployments, and Integration of Internet of Drones (IoD): A Review [J].
Abualigah, Laith ;
Diabat, Ali ;
Sumari, Putra ;
Gandomi, Amir H. .
IEEE SENSORS JOURNAL, 2021, 21 (22) :25532-25546
[2]  
Al-Emadi Sara, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P29, DOI 10.1109/ICIoT48696.2020.9089489
[3]   Performance Evaluation of Ad Hoc Routing Protocols in (FANETs) [J].
AlKhatieb, Anas ;
Felemban, Emad ;
Naseer, Atif .
2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2020,
[4]   GPS Spoofing Attacks in FANETs: A Systematic Literature Review [J].
Altaweel, Ala ;
Mukkath, Hena ;
Kamel, Ibrahim .
IEEE ACCESS, 2023, 11 :55233-55280
[5]   Drone Navigation Using Region and Edge Exploitation-Based Deep CNN [J].
Arshad, Muhammad Arif ;
Khan, Saddam Hussain ;
Qamar, Suleman ;
Khan, Muhammad Waleed ;
Murtza, Iqbal ;
Gwak, Jeonghwan ;
Khan, Asifullah .
IEEE ACCESS, 2022, 10 :95441-95450
[6]   CNN Based Image Classification of Malicious UAVs [J].
Brown, Jason ;
Gharineiat, Zahra ;
Raj, Nawin .
APPLIED SCIENCES-BASEL, 2023, 13 (01)
[7]  
Dasu Tamraparni, 2018, Geofences in the sky: Herding drones with blockchains and 5g. 11
[8]   DJI Tello Quadrotor as a Platform for Research and Education in Mobile Robotics and Control Engineering [J].
Giernacki, Wojciech ;
Rao, Jinjun ;
Sladic, Sasa ;
Bondyra, Adam ;
Retinger, Marek ;
Espinoza-Fraire, Tadeo .
2022 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2022, :735-744
[9]   Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey [J].
Hassija, Vikas ;
Chamola, Vinay ;
Agrawal, Adhar ;
Goyal, Adit ;
Nguyen Cong Luong ;
Niyato, Dusit ;
Yu, Fei Richard ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04) :2802-2832
[10]   UAV aerial image target detection based on BLUR-YOLO [J].
Huang, Tongyuan ;
Zhu, Jinjiang ;
Liu, Yao ;
Tan, Yu .
REMOTE SENSING LETTERS, 2023, 14 (02) :186-196