IoT empowered smart cybersecurity framework for intrusion detection in internet of drones

被引:8
作者
Ashraf, Syeda Nazia [1 ]
Manickam, Selvakumar [2 ]
Zia, Syed Saood [3 ]
Abro, Abdul Ahad [4 ]
Obaidat, Muath [5 ]
Uddin, Mueen [6 ]
Abdelhaq, Maha [7 ]
Alsaqour, Raed [8 ]
机构
[1] Sindh Madressutal Islam Univ, Dept Comp Sci, Karachi, Pakistan
[2] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, Gelugor 11800, Penang, Malaysia
[3] Sir Syed Univ Engn & Technol, Software Engn Dept, Karachi, Pakistan
[4] Iqra Univ, Fac Engn Sci & Technol, Dept Comp Sci, Karachi, Pakistan
[5] City Univ New York, Dept Comp Sci, New York, NY 10036 USA
[6] Univ Doha Sci & Technol, Coll Comp & Informat Technol, Doha 24449, Qatar
[7] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[8] Saudi Elect Univ, Coll Comp & Informat, Dept Informat Technol, Riyadh 93499, Saudi Arabia
关键词
NETWORKS; UAVS;
D O I
10.1038/s41598-023-45065-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. Industries ranging from industrial applications to agricultural advancements, as well as the implementation of smart cities for intelligent and efficient monitoring. However, these latest trends and drone-enabled IoT technology developments have also opened doors to malicious exploitation of existing IoT infrastructures. This raises concerns regarding the vulnerability of drone networks and security risks due to inherent design flaws and the lack of cybersecurity solutions and standards. The main objective of this study is to examine the latest privacy and security challenges impacting the network of drones (NoD). The research underscores the significance of establishing a secure and fortified drone network to mitigate interception and intrusion risks. The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. Furthermore, the model's performance was evaluated using well-known drones' CICIDS2017, and KDDCup 99 datasets. We have tested the multiple hyperparameter parameters for optimal performance and classify data instances and maximum efficacy in the NoD framework. The model achieved exceptional efficiency and robustness in NoD, specifically while applying B-LSTM and LSTM. The system attains precision values of 89.10% and 90.16%, accuracy rates up to 91.00-91.36%, recall values of 81.13% and 90.11%, and F-measure values of 88.11% and 90.19% for the respective evaluation metrics.
引用
收藏
页数:20
相关论文
共 83 条
  • [1] Abdani S.R., 2020, P 2020 IEEE S IND EL, P1
  • [2] URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models
    Afzal, Sara
    Asim, Muhammad
    Javed, Abdul Rehman
    Beg, Mirza Omer
    Baker, Thar
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (03)
  • [3] Al-Habashna Alaa, 2021, Building Height Estimation using Street-View Images, Deep-Learning, Contour Processing, and Geospatial Data
  • [4] Smart Cybersecurity Framework for IoT-Empowered Drones: Machine Learning Perspective
    Aldaej, Abdulaziz
    Ahanger, Tariq Ahamed
    Atiquzzaman, Mohammed
    Ullah, Imdad
    Yousufudin, Muhammad
    [J]. SENSORS, 2022, 22 (07)
  • [5] Attacks to Automatous Vehicles: A Deep Learning Algorithm for Cybersecurity
    Aldhyani, Theyazn H. H.
    Alkahtani, Hasan
    [J]. SENSORS, 2022, 22 (01)
  • [6] On the Role of Futuristic Technologies in Securing UAV-Supported Autonomous Vehicles
    Aloqaily, Moayad
    Hussain, Rasheed
    Khalaf, Deena
    Slehat, Dana
    Oracevic, Alma
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 93 - 105
  • [7] Design Guidelines for Blockchain-Assisted 5G-UAV Networks
    Aloqaily, Moayad
    Bouachir, Ouns
    Boukerche, Azzedine
    Al Ridhawi, Ismaeel
    [J]. IEEE NETWORK, 2021, 35 (01): : 64 - 71
  • [8] Multi-Channel Deep Feature Learning for Intrusion Detection
    Andresini, Giuseppina
    Appice, Annalisa
    Di Mauro, Nicola
    Loglisci, Corrado
    Malerba, Donato
    [J]. IEEE ACCESS, 2020, 8 : 53346 - 53359
  • [9] Group Authentication for Drone Swarms
    Aydin, Yucel
    Kurt, Gunes Karabulut
    Ozdemir, Enver
    Yanikomeroglu, Halim
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON WIRELESS FOR SPACE AND EXTREME ENVIRONMENTS (WISEE), 2021,
  • [10] Barletta VS., 2019, Open J. Appl. Sci, V9, P819