Real Time Malicious Drone Detection Using Deep Learning on FANETs

被引:0
作者
Yapicioglu, Cengizhan [1 ,2 ]
Demirci, Mehmet [1 ]
Akcayol, M. Ali [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkiye
[2] ASELSAN INC, Ankara, Turkiye
来源
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024 | 2024年
关键词
Computer Vision; Object Detection; Deep learning; CNN; image processing; FANET; Drone Networks; ATTACKS;
D O I
10.1109/BLACKSEACOM61746.2024.10646316
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Unmanned aerial vehicles, especially drones, are increasingly used for transportation, communication and military purposes. Using only one drone to accomplish a mission leads to a solution that is costly and has low error tolerance. For this reason, a network structure called Flying Ad-Hoc Networks (FANET) organize drones with a task sharing mechanism to lower cost. However, these networks remain vulnerable to various attacks due to vulnerabilities such as the use of civilian drones, use of unencrypted GPS signals, physical attacks using malicious drones, etc. Solutions to these attacks should consider the limited memory and calculation capabilities of drones. In this study, drone detection and subsequent classification of malicious drones, which are potential sources of man-in-the-middle or physical attacks, were implemented based on real images that can be captured by the drone camera. You Only Look Once (YOLO) detection algorithm was used in the drone detection phase and a Convolutional Neural Network model was used in the classification phase. In the study, a dataset consisting of 4 classes (Yuneec Typhon, DJI Tello, DJI Phantom 4 and Other) was created using internet resources and YouTube videos, and the classification success was measured as 88.78%.
引用
收藏
页码:242 / 247
页数:6
相关论文
共 25 条
  • [1] Applications, Deployments, and Integration of Internet of Drones (IoD): A Review
    Abualigah, Laith
    Diabat, Ali
    Sumari, Putra
    Gandomi, Amir H.
    [J]. IEEE SENSORS JOURNAL, 2021, 21 (22) : 25532 - 25546
  • [2] Al-Emadi Sara, 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), P29, DOI 10.1109/ICIoT48696.2020.9089489
  • [3] Performance Evaluation of Ad Hoc Routing Protocols in (FANETs)
    AlKhatieb, Anas
    Felemban, Emad
    Naseer, Atif
    [J]. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2020,
  • [4] GPS Spoofing Attacks in FANETs: A Systematic Literature Review
    Altaweel, Ala
    Mukkath, Hena
    Kamel, Ibrahim
    [J]. IEEE ACCESS, 2023, 11 : 55233 - 55280
  • [5] Drone Navigation Using Region and Edge Exploitation-Based Deep CNN
    Arshad, Muhammad Arif
    Khan, Saddam Hussain
    Qamar, Suleman
    Khan, Muhammad Waleed
    Murtza, Iqbal
    Gwak, Jeonghwan
    Khan, Asifullah
    [J]. IEEE ACCESS, 2022, 10 : 95441 - 95450
  • [6] CNN Based Image Classification of Malicious UAVs
    Brown, Jason
    Gharineiat, Zahra
    Raj, Nawin
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [7] Dasu Tamraparni, 2018, Geofences in the sky: Herding drones with blockchains and 5g. 11
  • [8] DJI Tello Quadrotor as a Platform for Research and Education in Mobile Robotics and Control Engineering
    Giernacki, Wojciech
    Rao, Jinjun
    Sladic, Sasa
    Bondyra, Adam
    Retinger, Marek
    Espinoza-Fraire, Tadeo
    [J]. 2022 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS (ICUAS), 2022, : 735 - 744
  • [9] Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey
    Hassija, Vikas
    Chamola, Vinay
    Agrawal, Adhar
    Goyal, Adit
    Nguyen Cong Luong
    Niyato, Dusit
    Yu, Fei Richard
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2802 - 2832
  • [10] UAV aerial image target detection based on BLUR-YOLO
    Huang, Tongyuan
    Zhu, Jinjiang
    Liu, Yao
    Tan, Yu
    [J]. REMOTE SENSING LETTERS, 2023, 14 (02) : 186 - 196