Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation

被引:67
作者
Condomines, Jean-Philippe [1 ]
Zhang, Ruohao [1 ]
Larrieu, Nicolas [1 ]
机构
[1] Univ Toulouse, ENAC, BP 59005, F-31055 Toulouse 4, France
关键词
UAV; FANET; Intrusion detection system; Spectral analysis; Robust estimator; Drone ad hoc network;
D O I
10.1016/j.adhoc.2018.09.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of a swarm of low-cost, mission-specific drones to form a Flying Ad-hoc Network (FANET) has literally become a 'hotspot' in the drone community. A number of studies have been conducted on how to achieve a FANET, but few have considered the security perspectives of this subject. FANET's unique features have made it difficult to strengthen its defense against ever-changing security threats. Today, more and more FANET applications are implemented into civil airspace, but the development of FANET security has remained unsatisfactory. In this paper, we try to address this issue by proposing a new Intrusion Detection System (IDS), an hybrid method based on both spectral traffic analysis and a robust controller / observer for anomaly estimation inside UAV networks. The proposed hybrid method considers, as a preliminary step, a statistical signature of the traffic exchanged in the network. By examining the resulted signatures, the differences are used to select the accurate model for accurate estimation of that abnormal traffic. The proposed IDS design has been successfully applied to some relevant practical problems such as ad hoc networks for aerial vehicles, and the effectiveness is illustrated by using real traffic traces including Distributed Denial of Service (DDoS) attacks. Our first results show promising perspectives for Intrusion Detection System (IDS) in UAV communication networks. Indeed, different types of anomaly have been considered and they are all accurately detected by the intrusion detection process we propose in this paper. Finally, both simulation-based validation and real-time real-world based implementation of our IDS are described in this article. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页数:14
相关论文
共 46 条
[1]  
Abry P., J TIME SERIES ANAL, V19, P253
[2]  
Akram R. N., 2016 IEEE TRUSTCOM B, P23
[3]   Security, privacy, and safety aspects of civilian drones: A survey [J].
Altawy R. ;
Youssef A.M. .
ACM Transactions on Cyber-Physical Systems, 2017, 1 (02)
[4]  
[Anonymous], 2006, LECT NOTES CONTROL I
[5]   Traffic monitoring in transmission control protocol/active queue management networks through a time-delay observer [J].
Ariba, Y. ;
Gouaisbaut, F. ;
Rahme, S. ;
Labit, Y. .
IET CONTROL THEORY AND APPLICATIONS, 2012, 6 (04) :506-517
[6]  
Ariba Y., 2009, INT J ADV INTERNET T
[7]  
Ariba Y., 2008, INT C COMM THEOR REL
[8]  
Athuraliya S., 2000, IEEE INFOCOM
[9]  
Bekmezci I., 2016, J AERONAUTICS SPACE, V9
[10]   Flying Ad-Hoc Networks (FANETs): A survey [J].
Bekmezci, Ilker ;
Sahingoz, Ozgur Koray ;
Temel, Samil .
AD HOC NETWORKS, 2013, 11 (03) :1254-1270