| Literature DB >> 35408244 |
Abdulaziz Aldaej1, Tariq Ahamed Ahanger1, Mohammed Atiquzzaman2, Imdad Ullah1, Muhammad Yousufudin1.
Abstract
Drone advancements have ushered in new trends and possibilities in a variety of sectors, particularly for small-sized drones. Drones provide navigational interlocation services, which are made possible by the Internet of Things (IoT). Drone networks, on the other hand, are subject to privacy and security risks due to design flaws. To achieve the desired performance, it is necessary to create a protected network. The goal of the current study is to look at recent privacy and security concerns influencing the network of drones (NoD). The current research emphasizes the importance of a security-empowered drone network to prevent interception and intrusion. A hybrid ML technique of logistic regression and random forest is used for the purpose of classification of data instances for maximal efficacy. By incorporating sophisticated artificial-intelligence-inspired techniques into the framework of a NoD, the proposed technique mitigates cybersecurity vulnerabilities while making the NoD protected and secure. For validation purposes, the suggested technique is tested against a challenging dataset, registering enhanced performance results in terms of temporal efficacy (34.56 s), statistical measures (precision (97.68%), accuracy (98.58%), recall (98.59%), F-measure (99.01%), reliability (94.69%), and stability (0.73).Entities:
Keywords: Internet of Things; drones; machine learning; security
Mesh:
Year: 2022 PMID: 35408244 PMCID: PMC9002915 DOI: 10.3390/s22072630
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1UAV architectural modules.
UAV security comparative analysis.
| Attack | Attributes | Reference |
|---|---|---|
| Protocol-based attacks | Security of communication link | [ |
| Protocol-based attacks | Data confidentiality | [ |
| Protocol-based attacks | Replay attack | [ |
| Protocol-based attacks | Privacy leakage | [ |
| Sensors-based attacks | GPS spoofing/jamming attack | [ |
| Sensors-based attacks | Motion sensors spoofing | [ |
| Sensors-based attacks | UAV spoofing/jamming attack | [ |
| Compromised component | IoT security threats | [ |
| Compromised component | Control/data interception | [ |
| Jammers | Denial of service | [ |
| Jammers | Stop packet delivery | [ |
Drone cyberattacks (1: available; 0: not available).
| Attack | Privacy | Conf | Int | Ave | Auth | Security Measures |
|---|---|---|---|---|---|---|
| Malware | 1 | 1 | 1 | 1 | 1 | Hybrid lightweight IDS |
| Social engineering | 1 | 1 | 0 | 0 | 1 | Raising awareness, training operators |
| Backdoor access | 1 | 1 | 1 | 1 | 1 | Hybrid lightweight IDS |
| Baiting | 1 | 1 | 1 | 0 | 1 | Raising awareness |
| Fabrication | 1 | 0 | 1 | 0 | 1 | Assigning privilege |
| Eavesdropping | 1 | 1 | 0 | 0 | 0 | N/A |
| Man-in-the-middle | 1 | 1 | 1 | 0 | 0 | Lightweight hybrid IDS |
| Wi-Fi aircrack | 0 | 0 | 0 | 0 | 1 | Lightweight IDS |
| Wi-Fi jamming | 0 | 0 | 0 | 0 | 1 | Frequency hopping, frequency range variation |
| Replay | 0 | 0 | 0 | 0 | 1 | Frequency hopping, time stamps |
| Ping-of-death | 0 | 0 | 0 | 0 | 1 | Frequency range variation |
| GPS spoofing | 0 | 0 | 0 | 0 | 1 | Return-to-base |
Data security for intelligent drones.
| Attacks | Security Technique | Machine Learning Solution | Reference |
|---|---|---|---|
| Jamming | Secure offloading | Q-learning, DQN | [ |
| Denial of service | Secure offloading | Neural network, multivariate correlation analysis | [ |
| Intrusion | Access control | Naive Bayes | [ |
| Malware | Access control | Random forest | [ |
| Spoofing | Authentication | SVM | [ |
| Traffic blockage | Authentication | Q-learning | [ |
Comparative assessment (YY: available, NA: not available).
| Comparative Works | UAV | ML Technique | M2M Communication | Cognitive Decision | Security | Real-Time | Performance Analysis | Numerical Quantification | Packet Evaluation | Statistical Analysis | Temporal Delay |
|---|---|---|---|---|---|---|---|---|---|---|---|
| [ | YY | YY | YY | NA | NA | YY | YY | YY | NA | NA | NA |
| [ | YY | YY | YY | YY | YY | NA | YY | NA | NA | NA | YY |
| [ | YY | YY | NA | NA | YY | NA | YY | NA | YY | NA | NA |
| [ | YY | YY | NA | NA | YY | YY | YY | YY | NA | NA | NA |
| [ | YY | YY | YY | NA | YY | YY | YY | NA | YY | NA | NA |
| [ | YY | YY | NA | YY | NA | NA | NA | YY | NA | NA | NA |
| [ | YY | NA | YY | YY | NA | NA | YY | NA | NA | YY | NA |
| [ | YY | NA | YY | NA | NA | YY | YY | NA | YY | NA | NA |
| [ | YY | YY | YY | NA | YY | NA | NA | NA | NA | NA | NA |
|
| YY | YY | YY | YY | YY | YY | YY | YY | YY | YY | YY |
Figure 2Proposed modular framework: conceptual view.
Figure 36G technology for UAV communication.
Figure 4Edge computational module: generic view.
Figure 5IoT security module: generic view.
Figure 6Proposed technique flow chart.
Figure 7No SQL data structures: generic view.
Figure 8Microsoft Azure computing: generic view.
Figure 9DJI Phantom 4 Pro drone.
Figure 10GY-GPS6MV2 module.
Figure 11ZigBee module.
Figure 12BMP180 pressure sensor.
Attack type and categories.
| Attack Class | Type |
|---|---|
| DOS | land, back, pod, smurf |
| R2L | ftp_write, imap, multihop, phf, spy |
| U2R | buffer-overflow, perl |
| Probe | ipsweep, portsweep |
Figure 13Temporal Delay.
Dataset classes.
| Category | Detail |
|---|---|
| Normal | Connections are generated by simulating user behavior. |
| DoS attacks | Use of resources or services are denied to authorized users. |
| Probe attack | Information about the system is exposed to unauthorized entities. |
| User to remote attacks | Access to account types of administrator is gained by unauthorized entities. |
| Remote to local attacks | Access to hosts is gained by unauthorized entities. |
Figure 14Statistical results.
Performance analysis.
| Models | Accuracy (%) | Precision (%) | Recall (%) | F1-Score (%) |
|---|---|---|---|---|
| Random forest | 92.36 | 92.36 | 93.15 | 94.56 |
| Decision tree | 93.25 | 91.26 | 93.25 | 95.62 |
| Logistic regression | 92.23 | 96.25 | 94.15 | 96.32 |
| Naïve Bayes | 89.65 | 90.47 | 91.25 | 92.25 |
| Support vector machine | 92.36 | 94.26 | 93.25 | 92.25 |
| MLP | 89.65 | 88.14 | 89.25 | 92.15 |
| Proposed | 98.58 | 97.68 | 98.59 | 99.01 |
Figure 15Reliability analysis.
Figure 16Stability analysis.
Figure 17Accuracy analysis.
Comparative analysis.
| Methods | Dataset | Accuracy (in %) |
|---|---|---|
| Proposed | Drone dataset | 98.58 |
| Proposed | NSL-KDD | 98.69 |
| Proposed | KDD CUP 99 | 99.01 |
| PCA + MCA | Drone dataset | 92.25 |
| Deep neural network | KDD CUP 99 | 91.25 |
| DT–RF | NSL-KDD | 89.69 |
| PCA + MCA | Drone dataset | 92.58 |
| Deep neural network | KDD CUP 99 | 93.25 |
| DT–RF | NSL-KDD | 91.25 |