IoMT-Net: Blockchain-Integrated Unauthorized UAV Localization Using Lightweight Convolution Neural Network for Internet of Military Things

被引:30
作者
Akter, Rubina [1 ]
Golam, Mohtasin [1 ]
Doan, Van-Sang [2 ]
Lee, Jae-Min [1 ]
Kim, Dong-Seong [1 ]
机构
[1] Kumoh Natl Inst Technol, Dept IT Convergence Engn, Networked Syst Lab, Gumi 39177, South Korea
[2] Vietnam Naval Acad, Fac Commun & Radar, Dept Commun & Radar, Nha Trang 650000, Vietnam
基金
新加坡国家研究基金会;
关键词
Direction-of-arrival estimation; Estimation; Blockchains; Arrays; Multiple signal classification; Autonomous aerial vehicles; Security; Convolution neural network (CNN); Internet of Military Things (IoMT); peer-to-peer (P2P) authentication; unmanned aerial vehicle (UAV) localization; OF-ARRIVAL ESTIMATION; DOA ESTIMATION; SMART ANTENNA; SIGNAL; MATRIX; SCHEME;
D O I
10.1109/JIOT.2022.3176310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicle (UAV) contributes substantial strategic benefits on the Internet of Military Things (IoMT). However, the untrusted party's misuse of the UAV may violate the security and even demolish the critical operation in the IoMT system. In addition, data manipulation and falsification using unauthorized access are the significant challenges of the IoMT system. In response to this problem, this study proposes a blockchain-integrated convolution neural network (CNN)-based intelligent framework named IoMT-Net for identification and tracking illegal UAV in the IoMT system. Blockchain technology prevents illicit access, data manipulation, and illegal intrusions, as well as stored data on the central control server (CCS). Concurrently, the proposed CNN analyzed the radio-frequency (RF) signal sent by the antenna array element to determine the Direction of Arrival (DoA) for the localization of the illegal UAV. Therefore, a signal model is designed to process the received signal array through IoMT-Net. Moreover, the proposed CNN model is designed with two different functional modules, such as the resource accuracy tradeoff (RAT) module and the unique feature extraction and accuracy boosting (UAB) module, by adopting depthwise and grouped convolution layers. These sparsely connected convolution layers offer high DoA estimation accuracy while maintaining the network more lightweight. In addition, the skip connection is also leveraged into the subunits of RAT and UAB modules for sharing features and handling the vanishing gradients problem. Based on the simulation results, the proposed network achieves superior DoA estimation accuracy (approximately 97.63% accuracy at 10-dB SNR) and outperforms other state-of-the-art models.
引用
收藏
页码:6634 / 6651
页数:18
相关论文
共 51 条
  • [1] Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems
    Abuzainab, Nof
    Saad, Walid
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 378 - 390
  • [2] Blockchain for aerospace and defense: Opportunities and open research challenges
    Ahmad, Raja Wasim
    Hasan, Haya
    Yaqoob, Ibrar
    Salah, Khaled
    Jayaraman, Raja
    Omar, Mohammed
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 2021, 151
  • [3] Akter R, 2020, I C INF COMM TECH CO, P555, DOI 10.1109/ICTC49870.2020.9289281
  • [4] Highly Secured C3I Communication Network Based on Blockchain Technology for Military System
    Akter, Rubina
    Bhardwaj, Sanjay
    Lee, Jae Min
    Kim, Dong-Seong
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 780 - 783
  • [5] DoA Estimation Using Neural Network-Based Covariance Matrix Reconstruction
    Barthelme, Andreas
    Utschick, Wolfgang
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2021, 28 : 783 - 787
  • [6] Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
    Bera, Basudeb
    Chattaraj, Durbadal
    Das, Ashok Kumar
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 229 - 249
  • [7] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [8] Multi-Speaker DOA Estimation Using Deep Convolutional Networks Trained With Noise Signals
    Chakrabarty, Soumitro
    Habets, Emanuel A. P.
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2019, 13 (01) : 8 - 21
  • [9] Chakrabarty S, 2017, IEEE WORK APPL SIG, P136, DOI 10.1109/WASPAA.2017.8170010
  • [10] Chakraborty S., 2016, J. Wirel. Mob. Netw. Ubiq. Comput. Depend. Appl., V7, P1