Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contra...
Lưu vào:
Tác giả chính: | , , |
---|---|
Định dạng: | Bài trích |
Ngôn ngữ: | English |
Nhà xuất bản: |
IEEE Transactions on Magnetics
2022
|
Chủ đề: | |
Truy cập trực tuyến: | https://ieeexplore.ieee.org/document/9724185/keywords#keywords https://dlib.phenikaa-uni.edu.vn/handle/PNK/5889 https://doi.org/10.1109/tifs.2022.3155970 |
Từ khóa: |
Thêm từ khóa
Không có từ khóa, Hãy là người đầu tiên đánh dấu biểu ghi này!
|
Tóm tắt: | We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves |
---|