论文标题
使用新的合成数据集,在无人机网络中识别标识的两种方法
Two methods for Jamming Identification in UAVs Networks using New Synthetic Dataset
论文作者
论文摘要
无人驾驶飞机(UAV)系统容易受到自我利用用户的扰动,这些用户在无人机传输过程中利用无线电设备的利益。漏洞是由于空对地面(A2G)无线通信网络的开放性质而发生的,这可能会引起整个网络的攻击。本文提出了两种策略来识别无人机网络中的干扰物。第一个策略是基于用于异常检测的时间序列方法,其中资源块中可用的信号在统计上分解以找到趋势,季节性和残基,而第二个基于新设计的深网。连接的技术适用于无人机,因为统计模型不需要大量的计算处理,而是在推广可能的攻击识别方面受到限制。另一方面,深网可以准确地对攻击进行分类,但需要更多的资源。该模拟考虑了干扰攻击的位置和功能以及与基站相关的无人机位置。统计方法技术使攻击者距离无人机30 m时,可以识别84.38%的攻击。此外,Deep Network的精度约为99.99%,大于两个,干扰器距离小于200米。
Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from self-interested users who utilize radio devices for their benefits during UAV transmissions. The vulnerability occurs due to the open nature of air-to-ground (A2G) wireless communication networks, which may enable network-wide attacks. This paper presents two strategies to identify Jammers in UAV networks. The first strategy is based on time series approaches for anomaly detection where the signal available in resource blocks are decomposed statistically to find trend, seasonality, and residues, while the second is based on newly designed deep networks. The joined technique is suitable for UAVs because the statistical model does not require heavy computation processing but is limited in generalizing possible attack's identification. On the other hand, the deep network can classify attacks accurately but requires more resources. The simulation considers the location and power of the jamming attacks and the UAV position related to the base station. The statistical method technique made it feasible to identify 84.38 % of attacks when the attacker was at 30 m from the UAV. Furthermore, the Deep network's accuracy was approximately 99.99 % for jamming powers greater than two and jammer distances less than 200 meters.