Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders

We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contra...

Mô tả chi tiết

Lưu vào:
Hiển thị chi tiết
Tác giả chính: Tiep M. Hoang, Trinh, van Chien, Thien van, Luong
Định dạng: Bài trích
Ngôn ngữ:English
Nhà xuất bản: IEEE Transactions on Magnetics 2022
Chủ đề:
Truy cập trực tuyến:https://ieeexplore.ieee.org/document/9724185/keywords#keywords
https://dlib.phenikaa-uni.edu.vn/handle/PNK/5889
https://doi.org/10.1109/tifs.2022.3155970
Từ khóa: Thêm từ khóa
Không có từ khóa, Hãy là người đầu tiên đánh dấu biểu ghi này!
Mô tả
Tóm tắt:We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves