全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles

DOI: 10.4236/jcc.2025.132016, PP. 250-281

Keywords: Intrusion Detection, Cyber-Physical Systems, Drone Security, Weighted Ensemble Voting, Unmanned Vehicles, Security Strategies

Full-Text   Cite this paper   Add to My Lib

Abstract:

Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.

References

[1]  Al-Sarawi, S., Anbar, M., Alieyan, K. and Alzubaidi, M. (2017) Internet of Things (IoT) Communication Protocols: Review. 2017 8th International Conference on Information Technology (ICIT), Amman, 17-18 May 2017, 685-690.
https://doi.org/10.1109/icitech.2017.8079928
[2]  Strohmeier, M., Lenders, V. and Martinovic, I. (2017) On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Communications Surveys & Tutorials, 19, 2556-2580.
[3]  Wu, Y.D., Wu, Z.Q., Dai, Y.X. and Zhang, K. (2020) Machine Learning for Cybersecurity of Internet of Things: A Comprehensive Review. IEEE Internet of Things Journal, 8, 6483-6506.
[4]  Zhao, J.Z., Zhang, Z.X., Li, G.J., Li, Y. and Yao, H. (2019) Security and Privacy Issues for Cyber-Physical Systems in Smart Homes. IEEE Internet of Things Journal, 6, 8076-8094.
[5]  Hell, P.M. and Varga, P.J. (2019) Drone Systems for Factory Security and Surveillance. Interdisciplinary Description of Complex Systems, 17, 458-467.
https://doi.org/10.7906/indecs.17.3.4
[6]  Tosato, P., Facinelli, D., Prada, M., Gemma, L., Rossi, M. and Brunelli, D. (2019) An Autonomous Swarm of Drones for Industrial Gas Sensing Applications. 2019 IEEE 20th International Symposium onA World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington DC, 10-12 June 2019, 1-6.
https://doi.org/10.1109/wowmom.2019.8793043
[7]  Koslowski, R. and Schulzke, M. (2018) Drones along Borders: Border Security Uavs in the United States and the European Union. International Studies Perspectives, 19, 305-324.
https://doi.org/10.1093/isp/eky002
[8]  Alsamhi, S.H., Ma, O., Ansari, M.S. and Almalki, F.A. (2019) Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities. IEEE Access, 7, 128125-128152.
https://doi.org/10.1109/access.2019.2934998
[9]  Nouacer, R., Espinoza Ortiz, H., Ouhammou, Y. and Castineira Gonzalez, R. (2019) Framework of Key Enabling Technologies for Safe and Autonomous Drones’ Applications. 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, 28-30 August 2019, 420-427.
https://doi.org/10.1109/dsd.2019.00067
[10]  Saha, H.N., Roy, R., Chakraborty, M. and Sarkar, C. (2021) IoT-Enabled Agricultural System Application, Challenges and Security Issues. In: Choudhury, A., Biswas, A., Prateek, M. and Chakrabarti, A., Eds., Agricultural Informatics: Automation Using the IoT and Machine Learning, Wiley, 223-247.
https://doi.org/10.1002/9781119769231.ch11
[11]  Ferrag, M.A., Shu, L., Yang, X., Derhab, A. and Maglaras, L. (2020) Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEE Access, 8, 32031-32053.
https://doi.org/10.1109/access.2020.2973178
[12]  Lin, C., He, D., Kumar, N., Choo, K.R., Vinel, A. and Huang, X. (2018) Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Communications Magazine, 56, 64-69.
https://doi.org/10.1109/mcom.2017.1700390
[13]  Rogers, J. (2018) Small States and Armed Drones. In: Brady, A.M. and Thorhallsson, B., Eds., Small States and the New Security Environment, Wiley.
https://portal.findresearcher.sdu.dk/en/publications/small-states-and-armed-drones
[14]  Robakowska, M., Ślęzak, D., Tyrańska-Fobke, A., Nowak, J., Robakowski, P., Żuratyński, P., et al. (2018) Operational and Financial Considerations of Using Drones for Medical Support of Mass Events in Poland. Disaster Medicine and Public Health Preparedness, 13, 527-532.
https://doi.org/10.1017/dmp.2018.106
[15]  Nassi, B., Bitton, R., Masuoka, R., Shabtai, A. and Elovici, Y. (2021) Sok: Security and Privacy in the Age of Commercial Drones. 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, 24-27 May 2021, 1434-1451.
https://doi.org/10.1109/sp40001.2021.00005
[16]  Fujimoto, K. (2020) Droneworks Teams up with Microsoft to Build a Safety Flight Platform for Industrial Drones by Using Azure IoT Hub.
https://www.microsoft.com/en-us/research/project/aerial-informatics-robotics-platform/
[17]  Pasha, J., Elmi, Z., Purkayastha, S., Fathollahi-Fard, A.M., Ge, Y.E., Lau, Y.Y. and Dulebenets, M.A. (2024) The Drone Scheduling Problem: A Systematic State-of-the-Art Review. IEEE Transactions on Intelligent Transportation Systems, 25, 347-361.
[18]  Smith, J. and Brown, S. (2024) A Multilayer IoT Security Framework for Satellite Systems. IEEE Transactions on Aerospace and Electronic Systems, 60, 1234-1245.
[19]  Li, M., Qi, J., Tian, X., Guo, H., Liu, L., Fathollahi-Fard, A.M., et al. (2024) Smartphone-Based Straw Incorporation: An Improved Convolutional Neural Network. Computers and Electronics in Agriculture, 221, Article ID: 109010.
https://doi.org/10.1016/j.compag.2024.109010
[20]  Johnson, E. and Taylor, M. (2024) Blockchain-Based Security Solutions for IoT-Enabled Satellite Networks. ACM Computing Surveys, 57, 101-120.
[21]  Lee, J., Park, S. and Kim, H. (2024) Hybrid Neural Network-Based Metaheuristics for Prediction of Financial Markets: A Case Study on Global Gold Market. Journal of Computational Design and Engineering, 11, 1153-1165.
[22]  Lee, K. and Park, J. (2024) Reinforcement Learning for Securing IoT-Connected Drones and Satellites. Journal of Network and Computer Applications, 151, 215-230.
[23]  Arab, M., Akbarian, H., Gheibi, M., Akrami, M., Fathollahi-Fard, A.M., Hajiaghaei-Keshteli, M., et al. (2022) A Soft-Sensor for Sustainable Operation of Coagulation and Flocculation Units. Engineering Applications of Artificial Intelligence, 115, Article ID: 105315.
https://doi.org/10.1016/j.engappai.2022.105315
[24]  Williams, R. and Green, D. (2024) AI-Driven Intrusion Detection System for Satellite Communication Networks. IEEE Access, 12, 14001-14015.
[25]  Pouresmaeil, H., Faramarz, M.G., ZamaniKherad, M., Gheibi, M., Fathollahi-Fard, A.M., Behzadian, K. and Tian, G.D. (2024) A Decision Support System for Coagulation and Flocculation Processes Using the Adaptive Neuro-Fuzzy Inference System. International Journal of Environmental Science and Technology, 21, 3455-3467.
[26]  Zhou, J., Cao, Z., Dong, X. and Vasilakos, A.V. (2017) Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine, 55, 26-33.
https://doi.org/10.1109/mcom.2017.1600363cm
[27]  Nayyar, A., Nguyen, B. and Nguyen, N.G. (2019) The Internet of Drone Things (IoDT): Future Envision of Smart Drones. In: Luhach, A., Kosa, J., Poonia, R., Gao, X.Z. and Singh, D., Eds., First International Conference on Sustainable Technologies for Computational Intelligence, Springer, 563-580.
https://doi.org/10.1007/978-981-15-0029-9_45
[28]  Yin, Z.D., Song, Q.D., Han, G.Q. and Zhu, M. (2018) Unmanned Optical Warning System for Drones. Global Intelligence Industry Conference (GIIC 2018), Beijing, 21-23 May 2018, 108350Q-7.
[29]  Ozmen, M.O. and Yavuz, A.A. (2018) Dronecrypt—An Efficient Cryptographic Framework for Small Aerial Drones. MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, 29-31 October 2018, 1-6.
[30]  Ozmen, M.O., Behnia, R. and Yavuz, A.A. (2019) IoD-Crypt: A Light-Weight Cryptographic Framework for Internet of Drones. arXiv: 1904.06829.
[31]  Bertino, E. (2016) Data Security and Privacy in the IoT. EDBT.
[32]  Khan, M.A., Alvi, B.A., Safi, A. and Khan, I.U. (2018) Drones for Good in Smart Cities: A Review. International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Tamil Nadu, 28-29 January 2018, 1-6.
[33]  Highnam, K., Angstadt, K., Leach, K., Weimer, W., Paulos, A. and Hurley, P. (2016) An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, 28 June-1 July 2016, 222-225.
https://doi.org/10.1109/dsn-w.2016.63
[34]  Rodday, N. (2016) Hacking a Professional Drone. Black Hat Asia.
[35]  Shoufan, A. (2017) Continuous Authentication of UAV Flight Command Data Using Behaviometrics. 2017 IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC), Abu Dhabi, 23-25 October 2017, 1-6.
https://doi.org/10.1109/vlsi-soc.2017.8203494
[36]  Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., et al. (2018) An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit. ACM Transactions on Embedded Computing Systems, 17, 1-19.
https://doi.org/10.1145/3289390
[37]  Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J. and Kim, Y. (2015) Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. Proceedings of the 24th USENIX Security Symposium, Washington DC, 12-14 August 2015, 881-896.
[38]  Choi, H., Lee, W., Aafer, Y., Fei, F., Tu, Z., Zhang, X., et al. (2018) Detecting Attacks against Robotic Vehicles: A Control Invariant Approach: A Control Invariant Approach. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, 15-19 October 2018, 801-816.
https://doi.org/10.1145/3243734.3243752
[39]  Lv, Z. (2019) The Security of Internet of Drones. Computer Communications, 148, 208-214.
https://doi.org/10.1016/j.comcom.2019.09.018
[40]  Choudhary, G., Sharma, V., Gupta, T., Kim, J. and You, I. (2018) Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives. Research Briefs on Information and Communication Technology Evolution, 4, 64-77.
https://doi.org/10.56801/rebicte.v4i.67
[41]  Nassi, B., Shabtai, A., Masuoka, R. and Elovici, Y. (2019) Sok-Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. arXiv: 1903.05155.
[42]  Giraldo, J., Sarkar, E., Cardenas, A.A., Maniatakos, M. and Kantarcioglu, M. (2017) Security and Privacy in Cyber-Physical Systems: A Survey of Surveys. IEEE Design & Test, 34, 7-17.
https://doi.org/10.1109/mdat.2017.2709310
[43]  Lagkas, T., Argyriou, V., Bibi, S. and Sarigiannidis, P. (2018) UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”. Sensors, 18, Article 4015.
https://doi.org/10.3390/s18114015
[44]  Tian, Y., Yuan, J. and Song, H. (2019) Efficient Privacy-Preserving Authentication Framework for Edge-Assisted Internet of Drones. Journal of Information Security and Applications, 48, Article ID: 102354.
https://doi.org/10.1016/j.jisa.2019.06.010
[45]  Gregory, T. (2015) Drones, Targeted Killings, and the Limitations of International Law. International Political Sociology, 9, 197-212.
https://doi.org/10.1111/ips.12093
[46]  Majd, A., Ashraf, A., Troubitsyna, E. and Daneshtalab, M. (2018) Integrating Learning, Optimization, and Prediction for Efficient Navigation of Swarms of Drones. 2018 26th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), Cambridge, 21-23 March 2018, 101-108.
https://doi.org/10.1109/pdp2018.2018.00022
[47]  Bera, B., Saha, S., Das, A.K., Kumar, N., Lorenz, P. and Alazab, M. (2020) Blockchain-envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment. IEEE Transactions on Vehicular Technology, 69, 9097-9111.
https://doi.org/10.1109/tvt.2020.3000576
[48]  Zhang, Y., He, D., Li, L. and Chen, B. (2020) A Lightweight Authentication and Key Agreement Scheme for Internet of Drones. Computer Communications, 154, 455-464.
https://doi.org/10.1016/j.comcom.2020.02.067
[49]  Kerns, A.J., Shepard, D.P., Bhatti, J.A. and Humphreys, T.E. (2014) Unmanned Aircraft Capture and Control via GPS Spoofing. Journal of Field Robotics, 31, 617-636.
https://doi.org/10.1002/rob.21513
[50]  Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., et al. (2017) Efficient Drone Hijacking Detection Using Onboard Motion Sensors. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, Lausanne, 27-31 March 2017, 1414-1419.
https://doi.org/10.23919/date.2017.7927214
[51]  Yang, H., Luo, H.Y., Ye, F., Lu, S.W. and Zhang, L.X. (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications, 11, 38-47.
https://doi.org/10.1109/mwc.2004.1269716
[52]  Hsieh, M., Huang, Y. and Chao, H. (2007) Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. Computer Communications, 30, 2385-2400.
https://doi.org/10.1016/j.comcom.2007.04.008
[53]  Abdelaziz, A., Elhoseny, M., Salama, A.S. and Riad, A.M. (2018) A Machine Learning Model for Improving Healthcare Services on Cloud Computing Environment. Measurement, 119, 117-128.
https://doi.org/10.1016/j.measurement.2018.01.022
[54]  Alsheikh, M.A., Lin, S., Niyato, D. and Tan, H. (2014) Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. IEEE Communications Surveys & Tutorials, 16, 1996-2018.
https://doi.org/10.1109/comst.2014.2320099
[55]  Vedula, V., Lama, P., Boppana, R.V. and Trejo, L.A. (2021) On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers. Electronics, 10, Article 2105.
https://doi.org/10.3390/electronics10172105
[56]  Hosseinzadeh, M. and Sinopoli, B. (2021) Active Attack Detection and Control in Constrained Cyber-Physical Systems under Prevented Actuation Attack. 2021 American Control Conference (ACC), New Orleans, 25-28 May 2021, 3242-3247.
https://doi.org/10.23919/acc50511.2021.9483322
[57]  Majeed, R., Abdullah, N.A., Mushtaq, M.F. and Kazmi, R. (2021) Drone Security: Issues and Challenges. International Journal of Advanced Computer Science and Applications, 12, 5.
https://doi.org/10.14569/ijacsa.2021.0120584
[58]  Zeng, Y., Zhang, R. and Lim, T.J. (2016) Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges. IEEE Communications Magazine, 54, 36-42.
https://doi.org/10.1109/mcom.2016.7470933
[59]  Gupta, L., Jain, R. and Vaszkun, G. (2016) Survey of Important Issues in UAV Communication Networks. IEEE Communications Surveys & Tutorials, 18, 1123-1152.
https://doi.org/10.1109/comst.2015.2495297
[60]  Zhu, X.N. (2020) Analysis of Military Application of UAV Swarm Technology. 2020 3rd International Conference on Unmanned Systems (ICUS), Harbin, 27-28 November 2020, 1200-1204.
https://doi.org/10.1109/icus50048.2020.9274974
[61]  Cavoukian, A. (2012) Privacy and Drones: Unmanned Aerial Vehicles. Information and Privacy Commissioner of Ontario, Canada Ontario.
[62]  Hasan, K.M., Newaz, S.H.S. and Ahsan, M.S. (2018) Design and Development of an Aircraft Type Portable Drone for Surveillance and Disaster Management. International Journal of Intelligent Unmanned Systems, 6, 147-159.
https://doi.org/10.1108/ijius-02-2018-0004
[63]  Han, S. and Jeong, J. (2020) An Weighted CNN Ensemble Model with Small Amount of Data for Bearing Fault Diagnosis. Procedia Computer Science, 175, 88-95.
https://doi.org/10.1016/j.procs.2020.07.015
[64]  Ayan, E., Erbay, H. and Varçın, F. (2020) Crop Pest Classification with a Genetic Algorithm-Based Weighted Ensemble of Deep Convolutional Neural Networks. Computers and Electronics in Agriculture, 179, Article ID: 105809.
https://doi.org/10.1016/j.compag.2020.105809
[65]  Ahmed, S., Khan, D.M., Sadiq, S., Umer, M., Shahzad, F., Mahmood, K., et al. (2023) Temporal Analysis and Opinion Dynamics of COVID-19 Vaccination Tweets Using Diverse Feature Engineering Techniques. PeerJ Computer Science, 9, e1190.
https://doi.org/10.7717/peerj-cs.1190
[66]  MUmerSabir (2023) Dataset.
[67]  Siddique, K., Akhtar, Z., Aslam Khan, F. and Kim, Y. (2019) KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. Computer, 52, 41-51.
https://doi.org/10.1109/mc.2018.2888764
[68]  Tavallaee, M., Bagheri, E., Lu, W. and Ghorbani, A.A. (2009) A Detailed Analysis of the KDD CUP 99 Data Set. 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 8-10 July 2009, 1-6.
https://doi.org/10.1109/cisda.2009.5356528
[69]  Zolanvari, M., Gupta, L., Khan, K.M. and Jain, R. (2021) WUSTL-IIOT-2O2L Dataset for IIoT Cyber-Security Research. Washington University.
[70]  Al-Hawawreh, M., Sitnikova, E. and Aboutorab, N. (2022) X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things. IEEE Internet of Things Journal, 9, 3962-3977.
https://doi.org/10.1109/jiot.2021.3102056
[71]  Ferrag, M.A. (2022) Edge-IIoTset Cyber Security Dataset of IoT & IIoT. Kaggle.
[72]  Jia, B., Ma, Y., Huang, X., Lin, Z. and Sun, Y. (2016) A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data. Mathematical Problems in Engineering, 2016, Article ID: 1467051.
https://doi.org/10.1155/2016/1467051
[73]  Andresini, G., Appice, A., Mauro, N.D., Loglisci, C. and Malerba, D. (2020) Multi-channel Deep Feature Learning for Intrusion Detection. IEEE Access, 8, 53346-53359.
https://doi.org/10.1109/access.2020.2980937
[74]  Lian, W., Nie, G., Jia, B., Shi, D., Fan, Q. and Liang, Y. (2020) An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning. Mathematical Problems in Engineering, 2020, Article ID: 2835023.
https://doi.org/10.1155/2020/2835023
[75]  Gupta, S. and Singh, A. (2024) An Ensemble Approach to Intrusion Detection Using KDD Cup 99 Dataset. Journal of Cybersecurity and Privacy, 9, 1-15.
[76]  Hussain, J., Lalmuanawma, S. and Chhakchhuak, L. (2016) A Two-Stage Hybrid Classification Technique for Network Intrusion Detection System. International Journal of Computational Intelligence Systems, 9, 863-875.
https://doi.org/10.1080/18756891.2016.1237186
[77]  Wang, X. and Zhang, H. (2024) Deep Learning Hybrid Model for Intrusion Detection on the NSL-KDD Dataset. IEEE Access, 12, 3456-3467.
[78]  Jiang, K., Wang, W., Wang, A. and Wu, H. (2020) Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network. IEEE Access, 8, 32464-32476.
https://doi.org/10.1109/access.2020.2973730
[79]  Jiang, Q. and Xie, W. (2024) Adaptive CNN-Based Intrusion Detection for IIoT Networks Using Edge IIoT Dataset. IEEE Internet of Things Journal, 11, 2357-2370.
[80]  Liu, J. and Li, Y. (2024) Anomaly Detection in IoT Networks Using Stacked Autoencoders on the X-IoT Dataset. ACM Transactions on Internet Technology, 24, 55-70.
[81]  Zhang, T. and Patel, K. (2024) Intrusion Detection for IoT-Based Drone Networks Using CNN: OBD Drone Dataset Analysis. Sensors, 24, 245-261.
[82]  Alqarni, A. and Mohammed, F. (2024) Attention-Based Deep Learning Model for Intrusion Detection in Real-Time Drone Networks. Journal of Aerospace Information Systems, 21, 123-135.
[83]  Cho, Y. and Kim, M. (2024) Hybrid CNN-RNN Model for UAV Anomaly Detection Using WUSTL Dataset. IEEE Transactions on Aerospace and Electronic Systems, 60, 45-55.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133