SVM-SFL based malicious UAV detection in wireless sensor networks

被引:0
作者
Prasad, Siyyadula Venkata Rama Vara [1 ,2 ]
Khilar, Pabitra Mohan [1 ]
机构
[1] Natl Inst Technol, Comp Sci & Engn, Rourkela, Odisha, India
[2] Natl Inst Technol, Comp Sci & Engn, Rourkela 769008, Odisha, India
关键词
decryption; encryption; feedback packet generation; malicious UAV detection; proxy re-encryption; SVM-SFL; WSN; DATA-COLLECTION; DRONES; FRAMEWORK; SECURITY; INTERNET; SCHEME;
D O I
10.1002/cpe.8049
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the modern era, unmanned aerial vehicle (UAV) based wireless sensor networks (WSN) are rising technologies in wireless communication. Through UAV, the sensed data can be forwarded to the base station. However, the increase in network users leads to several malicious attacks on UAVs. Hence, it affects the performance of a WSN platform while transmitting private information through UAVs. Therefore, the proposed study intends to develop an effective malicious UAV detection approach using a machine-learning algorithm. Initially, the deployed sensor nodes in WSN are utilized to collect the environmental data. These sensor nodes transmit the collected data to the UAV. During data transmission, the sensor nodes generate a feed packet (authentication parameter) and forward it to the UAV along with the sensed information. The feedback packet is encrypted through a proxy re-encryption scheme to secure the input data. These encrypted packets with the sensed input data are then transmitted to the base station. Finally, the feedback packet is decrypted and attains the actual input information. From the received data, the classification is performed using a proposed support vector machine with a shuffled frog leap (SVM-SFL) approach. The proposed approach is implemented with the NS3 Python tool, and the results are analyzed by evaluating several performance matrices. Compared with other existing methods, the proposed study obtained improved results in terms of accuracy (98.61%), precision (98.5%), sensitivity (98.63%), and F-measure (98.62%).
引用
收藏
页数:17
相关论文
共 29 条
  • [1] A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network
    Abualsauod, Emad H.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 99
  • [2] Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment
    Bera, Basudeb
    Das, Ashok Kumar
    Sutrala, Anil Kumar
    [J]. COMPUTER COMMUNICATIONS, 2021, 166 : 91 - 109
  • [3] Measurement and security trust in WSNs: a proximity deviation based approach
    Boudriga, Noureddine
    Marimuthu, Paulvanna N.
    Habib, Sami J.
    [J]. ANNALS OF TELECOMMUNICATIONS, 2019, 74 (5-6) : 257 - 272
  • [4] CoMAD: Context-Aware Mutual Authentication Protocol for Drone Networks
    Cabuk, Umut Can
    Dalkilic, Gokhan
    Dagdeviren, Orhan
    [J]. IEEE ACCESS, 2021, 9 : 78400 - 78414
  • [5] MACHINE LEARNING FOR WIRELESS CONNECTIVITY AND SECURITY OF CELLULAR-CONNECTED UAVS
    Challita, Ursula
    Ferdowsi, Aidin
    Chen, Mingzhe
    Saad, Walid
    [J]. IEEE WIRELESS COMMUNICATIONS, 2019, 26 (01) : 28 - 35
  • [6] Detection and Blind Channel Estimation for UAV-Aided Wireless Sensor Networks in Smart Cities Under Mobile Jamming Attack
    Darsena, Donatella
    Gelli, Giacinto
    Iudice, Ivan
    Verde, Francesco
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 11932 - 11950
  • [7] Dewal Prachi, 2018, Cyber Security. Proceedings of CSI 2015. Advances in Intelligent Systems and Computing (AISC 729), P47, DOI 10.1007/978-981-10-8536-9_6
  • [8] UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks
    Emygdio de Melo, Carlos Felipe
    Silva, Tulio Dapper E.
    Boeira, Felipe
    Stocchero, Jorgito Matiuzzi
    Vinel, Alexey
    Asplund, Mikael
    de Freitas, Edison Pignaton
    [J]. IEEE ACCESS, 2021, 9 : 82930 - 82946
  • [9] A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications
    Ever, Yoney Kirsal
    [J]. COMPUTER COMMUNICATIONS, 2020, 155 : 143 - 149
  • [10] Feyzioglu A., 2023, INT J PRINT TECHNOL, V7, P277, DOI DOI 10.46519/IJ3DPTDI.1268605