IoT empowered smart cybersecurity framework for intrusion detection in internet of drones

被引:8
作者
Ashraf, Syeda Nazia [1 ]
Manickam, Selvakumar [2 ]
Zia, Syed Saood [3 ]
Abro, Abdul Ahad [4 ]
Obaidat, Muath [5 ]
Uddin, Mueen [6 ]
Abdelhaq, Maha [7 ]
Alsaqour, Raed [8 ]
机构
[1] Sindh Madressutal Islam Univ, Dept Comp Sci, Karachi, Pakistan
[2] Univ Sains Malaysia, Natl Adv IPv6 Ctr NAv6, Gelugor 11800, Penang, Malaysia
[3] Sir Syed Univ Engn & Technol, Software Engn Dept, Karachi, Pakistan
[4] Iqra Univ, Fac Engn Sci & Technol, Dept Comp Sci, Karachi, Pakistan
[5] City Univ New York, Dept Comp Sci, New York, NY 10036 USA
[6] Univ Doha Sci & Technol, Coll Comp & Informat Technol, Doha 24449, Qatar
[7] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Informat Technol, POB 84428, Riyadh 11671, Saudi Arabia
[8] Saudi Elect Univ, Coll Comp & Informat, Dept Informat Technol, Riyadh 93499, Saudi Arabia
关键词
NETWORKS; UAVS;
D O I
10.1038/s41598-023-45065-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a significant increase in the utilization of IoT-enabled drone data management technology. Industries ranging from industrial applications to agricultural advancements, as well as the implementation of smart cities for intelligent and efficient monitoring. However, these latest trends and drone-enabled IoT technology developments have also opened doors to malicious exploitation of existing IoT infrastructures. This raises concerns regarding the vulnerability of drone networks and security risks due to inherent design flaws and the lack of cybersecurity solutions and standards. The main objective of this study is to examine the latest privacy and security challenges impacting the network of drones (NoD). The research underscores the significance of establishing a secure and fortified drone network to mitigate interception and intrusion risks. The proposed system effectively detects cyber-attacks in drone networks by leveraging deep learning and machine learning techniques. Furthermore, the model's performance was evaluated using well-known drones' CICIDS2017, and KDDCup 99 datasets. We have tested the multiple hyperparameter parameters for optimal performance and classify data instances and maximum efficacy in the NoD framework. The model achieved exceptional efficiency and robustness in NoD, specifically while applying B-LSTM and LSTM. The system attains precision values of 89.10% and 90.16%, accuracy rates up to 91.00-91.36%, recall values of 81.13% and 90.11%, and F-measure values of 88.11% and 90.19% for the respective evaluation metrics.
引用
收藏
页数:20
相关论文
共 83 条
  • [31] A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures
    Kafi, Mohamed Amine
    Challal, Yacine
    Djenouri, Djamel
    Doudou, Messaoud
    Bouabdallah, Abdelmadjid
    Badache, Nadjib
    [J]. 4TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2013), THE 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2013), 2013, 19 : 617 - 626
  • [32] Building synergetic consensus for dynamic gas-plume tracking applications using UAV platforms
    Kapoutsis, Athanasios Ch
    Michailidis, Iakovos T.
    Boutalis, Yiannis
    Kosmatopoulos, Elias B.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2021, 91
  • [33] Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain
    Khan, Abdullah Ayub
    Laghari, Asif Ali
    Shafiq, Muhammad
    Awan, Shafique Ahmed
    Gu, Zhaoquan
    [J]. DRONES, 2022, 6 (12)
  • [34] Healthcare Ledger Management: A Blockchain and Machine Learning-Enabled Novel and Secure Architecture for Medical Industry
    Khan, Abdullah Ayub
    Laghari, Asif Ali
    Shafiq, Muhammad
    Cheikhrouhou, Omar
    Alhakami, Wajdi
    Hamam, Habib
    Shaikh, Zaffar Ahmed
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2022, 12
  • [35] A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment
    Khan, Abdullah Ayub
    Laghari, Asif Ali
    Gadekallu, Thippa Reddy
    Shaikh, Zaffar Ahmed
    Javed, Abdul Rehman
    Rashid, Mamoon
    V. Estrela, Vania
    Mikhaylov, Alexey
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [36] BIoMT: A State-of-the-Art Consortium Serverless Network Architecture for Healthcare System Using Blockchain Smart Contracts
    Khan, Abdullah Ayub
    Wagan, Asif Ali
    Laghari, Asif Ali
    Gilal, Abdul Rehman
    Aziz, Izzatdin Abdul
    Talpur, Bandeh Ali
    [J]. IEEE ACCESS, 2022, 10 : 78887 - 78898
  • [37] IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm
    Khan, Abdullah Ayub
    Shaikh, Aftab Ahmed
    Shaikh, Zaffar Ahmed
    Laghari, Asif Ali
    Karim, Shahid
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (17) : 23533 - 23549
  • [38] Khan Abdullah Ayub, 2022, IEEE Access
  • [39] RETRACTED: An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones (Retracted Article)
    Khan, Muhammad Asghar
    Ullah, Insaf
    Alsharif, Mohammed H.
    Alghtani, Abdulaziz H.
    Aly, Ayman A.
    Chen, Chien-Ming
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [40] A Provable and Privacy-Preserving Authentication Scheme for UAV-Enabled Intelligent Transportation Systems
    Khan, Muhammad Asghar
    Ullah, Insaf
    Alkhalifah, Ali
    Rehman, Sajjad Ur
    Shah, Jawad Ali
    Uddin, Irfan
    Alsharif, Mohammed H.
    Algarni, Fahad
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) : 3416 - 3425