DP-Authentication: A novel deep learning based drone pilot authentication scheme

被引:9
作者
Han, Liyao [1 ]
Xun, Yijie [1 ]
Liu, Jiajia [1 ]
Benslimane, Abderrahim [2 ]
Zhang, Yanning [1 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Natl Engn Lab Integrated Aerosp Ground Ocean Big D, Xian 710072, Shaanxi, Peoples R China
[2] Univ Avignon, Sch Comp Sci & Engn, Avignon, France
关键词
Unmanned Aerial Vehicle; Deep learning; Pilot authentication; UAV; CLASSIFIER;
D O I
10.1016/j.adhoc.2023.103180
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs), also known as drones, have recently been proposed as flying base stations for providing reliable service to IoT devices. However, due to the lack of effective authentication schemes, UAVs are often hijacked by adversaries, which raises a high potential for sensitive information leakage. Therefore, designing a real-time authentication scheme is essential to enhance UAV safety. Up to the present, several works exist about pilot authentication by classifying radio-control signals. As propagating through the open environment, radio-control signals can be sniffed, analyzed, and simulated, posing significant threats to UAV security. For this reason, we propose a novel deep learning-based drone pilot authentication scheme, DP-Authentication, to protect UAVs from malicious radio-manipulated attacks. Specifically, we collect UAV flight data from the onboard PX4 flight stack and feed them into the authentication scheme to validate pilot legal status dynamically. As verified by comprehensive experiments, the proposed authentication scheme can authenticate pilots with an accuracy of 95.24% and detect malicious hijacking with an accuracy of 96.82%. Thanks to the low system overhead, it holds great promise for deployment on the UAV side to monitor pilot legal status in real-time.
引用
收藏
页数:13
相关论文
共 37 条
[1]  
Al-Turjman Fadi, 2020, DRONE IOT 6G WIRELES, P153, DOI DOI 10.1007/978-3-030-38712-9_9$
[2]   Identifying Drone Operator by Deep Learning and Ensemble Learning of IMU and Control Data [J].
Alkadi, Ruba ;
Al-Ameri, Sultan ;
Shoufan, Abdulhadi ;
Damiani, Ernesto .
IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2021, 51 (05) :451-462
[3]   Driver authentication by quantifying driving style using GPS only [J].
Banerjee, Tanushree ;
Chowdhury, Arijit ;
Chakravarty, Tapas ;
Ghose, Avik .
2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
[4]   Random forest in remote sensing: A review of applications and future directions [J].
Belgiu, Mariana ;
Dragut, Lucian .
ISPRS JOURNAL OF PHOTOGRAMMETRY AND REMOTE SENSING, 2016, 114 :24-31
[5]   Unmanned Aerial Vehicles' Remote Identification: A Tutorial and Survey [J].
Belwafi, Kais ;
Alkadi, Ruba ;
Alameri, Sultan A. ;
Al Hamadi, Hussam ;
Shoufan, Abdulhadi .
IEEE ACCESS, 2022, 10 :87577-87601
[6]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[7]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140
[8]  
Burton A, 2016, INT CONF NETW SER, P388, DOI 10.1109/CNSM.2016.7818453
[9]   Feature selection in machine learning: A new perspective [J].
Cai, Jie ;
Luo, Jiawei ;
Wang, Shulin ;
Yang, Sheng .
NEUROCOMPUTING, 2018, 300 :70-79
[10]  
Cao Y, 2019, IEEE ICC