Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach

被引:7
作者
Chen, Yu-Jia [1 ]
Chen, Xiao-Chun [1 ]
Pan, Miao [2 ]
机构
[1] Natl Cent Univ, Chungli 32001, Taiwan
[2] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77204 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2022年 / 9卷 / 04期
关键词
Autonomous aerial vehicles; Trajectory; Wireless communication; Perturbation methods; Task analysis; Network coding; Encryption; Unmanned aerial vehicles (UAVs); eavesdropping attacks; deep learning; location privacy; network coding; LOCATION PRIVACY; SECURITY; INTERNET; DRONES; TRANSMISSION; SCHEME;
D O I
10.1109/TNSE.2022.3165971
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Thanks to the agility and mobility features, unmanned aerial vehicles (UAVs) have been applied for a wide range of civil and military missions. To remotely control and monitor UAVs, mission-related data such as location and trajectory information are transmitted over wireless channels. However, UAV networks are vulnerable to eavesdropping attacks due to: 1) the broadcasting nature of wireless channels; 2) the broad coverage in aerial environments. In this paper, we investigate the potential security threats in UAV networks with passive attackers who aim to eavesdrop and decode encrypted locations by using machine learning techniques. We show that a neural network of two hidden layers is able to decode the encrypted locations if using the existing location protection methods. To defend against such machine learning based attacks, we suggest a location protection approach based on the random linear network coding with encryption keys being randomly permuted. We prove that our proposed approach allows for a low attacker's success probability and provides untraceability property. Our simulation results indicate that our approach significantly outperforms the existing location protection methods in terms of attacker's bit error rate, even with a small number of UAVs.
引用
收藏
页码:2562 / 2578
页数:17
相关论文
共 60 条
[1]  
3GPP, 2018, Tech. Rep.
[2]  
3GPP, 2019, 22125 3GPP
[3]   Security for 5G and Beyond [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Kumar, Tanesh ;
Okwuibe, Jude ;
Gurtov, Andrei ;
Ylianttila, Mika .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) :3682-3722
[4]  
Alsaafin A, 2018, INT CONF ELECTRO INF, P12, DOI 10.1109/EIT.2018.8500313
[5]  
Bergstra J, 2012, J MACH LEARN RES, V13, P281
[6]   Encryption Protocol for Resource-Constrained Devices in Fog-Based IoT Using One-Time Pads [J].
Boakye-Boateng, Kwasi ;
Kuada, Eric ;
Antwi-Boasiako, Emmanuel ;
Djaba, Emmanuel .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :3925-3933
[7]   A Survey on Pseudonym Changing Strategies for Vehicular Ad-Hoc Networks [J].
Boualouache, Abdelwahab ;
Senouci, Sidi-Mohammed ;
Moussaoui, Samira .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (01) :770-790
[8]  
Butun I, 2019, IEEE CONF COMM NETW
[9]  
Chatzigeorgiou I, 2018, 2018 IEEE INT C ENV, P1
[10]  
Chatzigeorgiou I., 2020, P IEEE 31 ANN INT S, P1