Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders

We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contra...

Full description

Saved in:
Bibliographic Details
Main Authors: Tiep M. Hoang, Trinh, van Chien, Thien van, Luong
Format: Bài trích
Language:English
Published: IEEE Transactions on Magnetics 2022
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9724185/keywords#keywords
https://dlib.phenikaa-uni.edu.vn/handle/PNK/5889
https://doi.org/10.1109/tifs.2022.3155970
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves