4.5 Article

Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles

Journal

COMPUTERS & ELECTRICAL ENGINEERING
Volume 99, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.compeleceng.2022.107784

Keywords

Unmanned aerial vehicles; Intrusion detection; Machine learning; Novelty detection; Cyber-physical systems

Ask authors/readers for more resources

Unmanned Aerial Vehicles (UAVs) are being used more frequently in critical operations, but they face increasing threats. Attacks against UAVs, such as spoofing and jamming, are becoming commonplace due to their simplicity and low cost. Securing UAVs is challenging due to vulnerabilities in underlying technologies. However, the development of an intelligent intrusion detection system (IDS) using principal component analysis (PCA) and one-class classifiers shows promise in detecting and mitigating these attacks.
Unmanned Aerial Vehicles (UAVs) are seeing increased use in critical operations for law enforcement, military, industrial control surveillance and more. These hostile operating environments combined with the UAVs reliance on wireless protocols produces an increased threat level. Many attacks against the UAV are becoming commonplace as they are simple to conduct with inexpensive hardware, such as spoofing and jamming. Unfortunately, as many of these vulnerabilities exist within underlying technologies, securing the UAV becomes a difficult task. A promising approach to identifying and mitigating these attacks is the development of an intelligent intrusion detection system (IDS). The proposed approach uses principal component analysis (PCA) and one-class classifiers to detect attacks. This allows for the use of flight logs for training data, providing a versatile and ubiquitous approach. The proposed detection method is integrated into a fully developed IDS called MAVIDS. This IDS operates onboard the UAV within a resource-constrained agent device, allowing it to detect and potentially mitigate attacks even when communication to the ground control station is lost from jamming. The approach shows to be effective against GPS spoofing and jamming with macro averaged F1 scores of 90.57% and 94.3% respectively.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available