Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contra...
Saved in:
Main Authors: | , , |
---|---|
Format: | Bài trích |
Language: | English |
Published: |
IEEE Transactions on Magnetics
2022
|
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9724185/keywords#keywords https://dlib.phenikaa-uni.edu.vn/handle/PNK/5889 https://doi.org/10.1109/tifs.2022.3155970 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves |
---|