Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy.
References
[1]
Al-Sarawi, S., Anbar, M., Alieyan, K. and Alzubaidi, M. (2017) Internet of Things (IoT) Communication Protocols: Review. 2017 8th International Conference on Information Technology (ICIT), Amman, 17-18 May 2017, 685-690. https://doi.org/10.1109/icitech.2017.8079928
[2]
Strohmeier, M., Lenders, V. and Martinovic, I. (2017) On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Communications Surveys & Tutorials, 19, 2556-2580.
[3]
Wu, Y.D., Wu, Z.Q., Dai, Y.X. and Zhang, K. (2020) Machine Learning for Cybersecurity of Internet of Things: A Comprehensive Review. IEEE Internet of Things Journal, 8, 6483-6506.
[4]
Zhao, J.Z., Zhang, Z.X., Li, G.J., Li, Y. and Yao, H. (2019) Security and Privacy Issues for Cyber-Physical Systems in Smart Homes. IEEE Internet of Things Journal, 6, 8076-8094.
[5]
Hell, P.M. and Varga, P.J. (2019) Drone Systems for Factory Security and Surveillance. InterdisciplinaryDescriptionofComplexSystems, 17, 458-467. https://doi.org/10.7906/indecs.17.3.4
[6]
Tosato, P., Facinelli, D., Prada, M., Gemma, L., Rossi, M. and Brunelli, D. (2019) An Autonomous Swarm of Drones for Industrial Gas Sensing Applications. 2019 IEEE 20th International Symposium on “A World of Wireless, Mobile and Multimedia Networks” (WoWMoM), Washington DC, 10-12 June 2019, 1-6. https://doi.org/10.1109/wowmom.2019.8793043
[7]
Koslowski, R. and Schulzke, M. (2018) Drones along Borders: Border Security Uavs in the United States and the European Union. InternationalStudiesPerspectives, 19, 305-324. https://doi.org/10.1093/isp/eky002
[8]
Alsamhi, S.H., Ma, O., Ansari, M.S. and Almalki, F.A. (2019) Survey on Collaborative Smart Drones and Internet of Things for Improving Smartness of Smart Cities. IEEEAccess, 7, 128125-128152. https://doi.org/10.1109/access.2019.2934998
[9]
Nouacer, R., Espinoza Ortiz, H., Ouhammou, Y. and Castineira Gonzalez, R. (2019) Framework of Key Enabling Technologies for Safe and Autonomous Drones’ Applications. 2019 22nd Euromicro Conference on Digital System Design (DSD), Kallithea, 28-30 August 2019, 420-427. https://doi.org/10.1109/dsd.2019.00067
[10]
Saha, H.N., Roy, R., Chakraborty, M. and Sarkar, C. (2021) IoT-Enabled Agricultural System Application, Challenges and Security Issues. In: Choudhury, A., Biswas, A., Prateek, M. and Chakrabarti, A., Eds., Agricultural Informatics: Automation Using the IoT and Machine Learning, Wiley, 223-247. https://doi.org/10.1002/9781119769231.ch11
[11]
Ferrag, M.A., Shu, L., Yang, X., Derhab, A. and Maglaras, L. (2020) Security and Privacy for Green IoT-Based Agriculture: Review, Blockchain Solutions, and Challenges. IEEEAccess, 8, 32031-32053. https://doi.org/10.1109/access.2020.2973178
[12]
Lin, C., He, D., Kumar, N., Choo, K.R., Vinel, A. and Huang, X. (2018) Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEECommunicationsMagazine, 56, 64-69. https://doi.org/10.1109/mcom.2017.1700390
[13]
Rogers, J. (2018) Small States and Armed Drones. In: Brady, A.M. and Thorhallsson, B., Eds., SmallStatesandtheNewSecurityEnvironment, Wiley. https://portal.findresearcher.sdu.dk/en/publications/small-states-and-armed-drones
[14]
Robakowska, M., Ślęzak, D., Tyrańska-Fobke, A., Nowak, J., Robakowski, P., Żuratyński, P., etal. (2018) Operational and Financial Considerations of Using Drones for Medical Support of Mass Events in Poland. DisasterMedicineandPublicHealthPreparedness, 13, 527-532. https://doi.org/10.1017/dmp.2018.106
[15]
Nassi, B., Bitton, R., Masuoka, R., Shabtai, A. and Elovici, Y. (2021) Sok: Security and Privacy in the Age of Commercial Drones. 2021 IEEESymposiumonSecurityandPrivacy (SP), San Francisco, 24-27 May 2021, 1434-1451. https://doi.org/10.1109/sp40001.2021.00005
[16]
Fujimoto, K. (2020) Droneworks Teams up with Microsoft to Build a Safety Flight Platform for Industrial Drones by Using Azure IoT Hub. https://www.microsoft.com/en-us/research/project/aerial-informatics-robotics-platform/
[17]
Pasha, J., Elmi, Z., Purkayastha, S., Fathollahi-Fard, A.M., Ge, Y.E., Lau, Y.Y. and Dulebenets, M.A. (2024) The Drone Scheduling Problem: A Systematic State-of-the-Art Review. IEEETransactionsonIntelligentTransportationSystems, 25, 347-361.
[18]
Smith, J. and Brown, S. (2024) A Multilayer IoT Security Framework for Satellite Systems. IEEETransactionsonAerospaceandElectronicSystems, 60, 1234-1245.
Johnson, E. and Taylor, M. (2024) Blockchain-Based Security Solutions for IoT-Enabled Satellite Networks. ACMComputingSurveys, 57, 101-120.
[21]
Lee, J., Park, S. and Kim, H. (2024) Hybrid Neural Network-Based Metaheuristics for Prediction of Financial Markets: A Case Study on Global Gold Market. JournalofComputationalDesignandEngineering, 11, 1153-1165.
[22]
Lee, K. and Park, J. (2024) Reinforcement Learning for Securing IoT-Connected Drones and Satellites. JournalofNetworkandComputerApplications, 151, 215-230.
[23]
Arab, M., Akbarian, H., Gheibi, M., Akrami, M., Fathollahi-Fard, A.M., Hajiaghaei-Keshteli, M., etal. (2022) A Soft-Sensor for Sustainable Operation of Coagulation and Flocculation Units. EngineeringApplicationsofArtificialIntelligence, 115, Article ID: 105315. https://doi.org/10.1016/j.engappai.2022.105315
[24]
Williams, R. and Green, D. (2024) AI-Driven Intrusion Detection System for Satellite Communication Networks. IEEEAccess, 12, 14001-14015.
[25]
Pouresmaeil, H., Faramarz, M.G., ZamaniKherad, M., Gheibi, M., Fathollahi-Fard, A.M., Behzadian, K. and Tian, G.D. (2024) A Decision Support System for Coagulation and Flocculation Processes Using the Adaptive Neuro-Fuzzy Inference System. InternationalJournalofEnvironmentalScienceandTechnology, 21, 3455-3467.
[26]
Zhou, J., Cao, Z., Dong, X. and Vasilakos, A.V. (2017) Security and Privacy for Cloud-Based IoT: Challenges. IEEECommunicationsMagazine, 55, 26-33. https://doi.org/10.1109/mcom.2017.1600363cm
[27]
Nayyar, A., Nguyen, B. and Nguyen, N.G. (2019) The Internet of Drone Things (IoDT): Future Envision of Smart Drones. In: Luhach, A., Kosa, J., Poonia, R., Gao, X.Z. and Singh, D., Eds., First International Conference on Sustainable Technologies for Computational Intelligence, Springer, 563-580. https://doi.org/10.1007/978-981-15-0029-9_45
[28]
Yin, Z.D., Song, Q.D., Han, G.Q. and Zhu, M. (2018) Unmanned Optical Warning System for Drones. GlobalIntelligenceIndustryConference (GIIC 2018), Beijing, 21-23 May 2018, 108350Q-7.
[29]
Ozmen, M.O. and Yavuz, A.A. (2018) Dronecrypt—An Efficient Cryptographic Framework for Small Aerial Drones. MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, 29-31 October 2018, 1-6.
[30]
Ozmen, M.O., Behnia, R. and Yavuz, A.A. (2019) IoD-Crypt: A Light-Weight Cryptographic Framework for Internet of Drones. arXiv: 1904.06829.
[31]
Bertino, E. (2016) Data Security and Privacy in the IoT. EDBT.
[32]
Khan, M.A., Alvi, B.A., Safi, A. and Khan, I.U. (2018) Drones for Good in Smart Cities: A Review. International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Tamil Nadu, 28-29 January 2018, 1-6.
[33]
Highnam, K., Angstadt, K., Leach, K., Weimer, W., Paulos, A. and Hurley, P. (2016) An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. 2016 46thAnnualIEEE/IFIPInternationalConferenceonDependableSystemsandNetworksWorkshop (DSN-W), Toulouse, 28 June-1 July 2016, 222-225. https://doi.org/10.1109/dsn-w.2016.63
[34]
Rodday, N. (2016) Hacking a Professional Drone. Black Hat Asia.
[35]
Shoufan, A. (2017) Continuous Authentication of UAV Flight Command Data Using Behaviometrics. 2017 IFIP/IEEEInternationalConferenceonVeryLargeScaleIntegration (VLSI-SoC), Abu Dhabi, 23-25 October 2017, 1-6. https://doi.org/10.1109/vlsi-soc.2017.8203494
[36]
Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., etal. (2018) An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measurement Unit. ACMTransactionsonEmbeddedComputingSystems, 17, 1-19. https://doi.org/10.1145/3289390
[37]
Son, Y., Shin, H., Kim, D., Park, Y., Noh, J., Choi, K., Choi, J. and Kim, Y. (2015) Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. Proceedings of the 24th USENIX Security Symposium, Washington DC, 12-14 August 2015, 881-896.
[38]
Choi, H., Lee, W., Aafer, Y., Fei, F., Tu, Z., Zhang, X., etal. (2018) Detecting Attacks against Robotic Vehicles: A Control Invariant Approach: A Control Invariant Approach. Proceedingsofthe 2018 ACMSIGSACConferenceonComputerandCommunicationsSecurity, Toronto, 15-19 October 2018, 801-816. https://doi.org/10.1145/3243734.3243752
[39]
Lv, Z. (2019) The Security of Internet of Drones. ComputerCommunications, 148, 208-214. https://doi.org/10.1016/j.comcom.2019.09.018
[40]
Choudhary, G., Sharma, V., Gupta, T., Kim, J. and You, I. (2018) Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives. ResearchBriefsonInformationandCommunicationTechnologyEvolution, 4, 64-77. https://doi.org/10.56801/rebicte.v4i.67
[41]
Nassi, B., Shabtai, A., Masuoka, R. and Elovici, Y. (2019) Sok-Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. arXiv: 1903.05155.
[42]
Giraldo, J., Sarkar, E., Cardenas, A.A., Maniatakos, M. and Kantarcioglu, M. (2017) Security and Privacy in Cyber-Physical Systems: A Survey of Surveys. IEEEDesign&Test, 34, 7-17. https://doi.org/10.1109/mdat.2017.2709310
[43]
Lagkas, T., Argyriou, V., Bibi, S. and Sarigiannidis, P. (2018) UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”. Sensors, 18, Article 4015. https://doi.org/10.3390/s18114015
[44]
Tian, Y., Yuan, J. and Song, H. (2019) Efficient Privacy-Preserving Authentication Framework for Edge-Assisted Internet of Drones. JournalofInformationSecurityandApplications, 48, Article ID: 102354. https://doi.org/10.1016/j.jisa.2019.06.010
[45]
Gregory, T. (2015) Drones, Targeted Killings, and the Limitations of International Law. InternationalPoliticalSociology, 9, 197-212. https://doi.org/10.1111/ips.12093
[46]
Majd, A., Ashraf, A., Troubitsyna, E. and Daneshtalab, M. (2018) Integrating Learning, Optimization, and Prediction for Efficient Navigation of Swarms of Drones. 2018 26th Euromicro International Conference on Parallel, Distributed and Network-BasedProcessing (PDP), Cambridge, 21-23 March 2018, 101-108. https://doi.org/10.1109/pdp2018.2018.00022
[47]
Bera, B., Saha, S., Das, A.K., Kumar, N., Lorenz, P. and Alazab, M. (2020) Blockchain-envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment. IEEETransactionsonVehicularTechnology, 69, 9097-9111. https://doi.org/10.1109/tvt.2020.3000576
[48]
Zhang, Y., He, D., Li, L. and Chen, B. (2020) A Lightweight Authentication and Key Agreement Scheme for Internet of Drones. ComputerCommunications, 154, 455-464. https://doi.org/10.1016/j.comcom.2020.02.067
[49]
Kerns, A.J., Shepard, D.P., Bhatti, J.A. and Humphreys, T.E. (2014) Unmanned Aircraft Capture and Control via GPS Spoofing. JournalofFieldRobotics, 31, 617-636. https://doi.org/10.1002/rob.21513
[50]
Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., etal. (2017) Efficient Drone Hijacking Detection Using Onboard Motion Sensors. Design, Automation&TestinEuropeConference&Exhibition (DATE), 2017, Lausanne, 27-31 March 2017, 1414-1419. https://doi.org/10.23919/date.2017.7927214
[51]
Yang, H., Luo, H.Y., Ye, F., Lu, S.W. and Zhang, L.X. (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEEWirelessCommunications, 11, 38-47. https://doi.org/10.1109/mwc.2004.1269716
[52]
Hsieh, M., Huang, Y. and Chao, H. (2007) Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. ComputerCommunications, 30, 2385-2400. https://doi.org/10.1016/j.comcom.2007.04.008
[53]
Abdelaziz, A., Elhoseny, M., Salama, A.S. and Riad, A.M. (2018) A Machine Learning Model for Improving Healthcare Services on Cloud Computing Environment. Measurement, 119, 117-128. https://doi.org/10.1016/j.measurement.2018.01.022
[54]
Alsheikh, M.A., Lin, S., Niyato, D. and Tan, H. (2014) Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. IEEECommunicationsSurveys&Tutorials, 16, 1996-2018. https://doi.org/10.1109/comst.2014.2320099
[55]
Vedula, V., Lama, P., Boppana, R.V. and Trejo, L.A. (2021) On the Detection of Low-Rate Denial of Service Attacks at Transport and Application Layers. Electronics, 10, Article 2105. https://doi.org/10.3390/electronics10172105
[56]
Hosseinzadeh, M. and Sinopoli, B. (2021) Active Attack Detection and Control in Constrained Cyber-Physical Systems under Prevented Actuation Attack. 2021 AmericanControlConference (ACC), New Orleans, 25-28 May 2021, 3242-3247. https://doi.org/10.23919/acc50511.2021.9483322
[57]
Majeed, R., Abdullah, N.A., Mushtaq, M.F. and Kazmi, R. (2021) Drone Security: Issues and Challenges. InternationalJournalofAdvancedComputerScienceandApplications, 12, 5. https://doi.org/10.14569/ijacsa.2021.0120584
[58]
Zeng, Y., Zhang, R. and Lim, T.J. (2016) Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges. IEEECommunicationsMagazine, 54, 36-42. https://doi.org/10.1109/mcom.2016.7470933
[59]
Gupta, L., Jain, R. and Vaszkun, G. (2016) Survey of Important Issues in UAV Communication Networks. IEEECommunicationsSurveys&Tutorials, 18, 1123-1152. https://doi.org/10.1109/comst.2015.2495297
[60]
Zhu, X.N. (2020) Analysis of Military Application of UAV Swarm Technology. 2020 3rdInternationalConferenceonUnmannedSystems (ICUS), Harbin, 27-28 November 2020, 1200-1204. https://doi.org/10.1109/icus50048.2020.9274974
[61]
Cavoukian, A. (2012) Privacy and Drones: Unmanned Aerial Vehicles. Information and Privacy Commissioner of Ontario, Canada Ontario.
[62]
Hasan, K.M., Newaz, S.H.S. and Ahsan, M.S. (2018) Design and Development of an Aircraft Type Portable Drone for Surveillance and Disaster Management. InternationalJournalofIntelligentUnmannedSystems, 6, 147-159. https://doi.org/10.1108/ijius-02-2018-0004
[63]
Han, S. and Jeong, J. (2020) An Weighted CNN Ensemble Model with Small Amount of Data for Bearing Fault Diagnosis. ProcediaComputerScience, 175, 88-95. https://doi.org/10.1016/j.procs.2020.07.015
[64]
Ayan, E., Erbay, H. and Varçın, F. (2020) Crop Pest Classification with a Genetic Algorithm-Based Weighted Ensemble of Deep Convolutional Neural Networks. ComputersandElectronicsinAgriculture, 179, Article ID: 105809. https://doi.org/10.1016/j.compag.2020.105809
[65]
Ahmed, S., Khan, D.M., Sadiq, S., Umer, M., Shahzad, F., Mahmood, K., etal. (2023) Temporal Analysis and Opinion Dynamics of COVID-19 Vaccination Tweets Using Diverse Feature Engineering Techniques. PeerJComputerScience, 9, e1190. https://doi.org/10.7717/peerj-cs.1190
[66]
MUmerSabir (2023) Dataset.
[67]
Siddique, K., Akhtar, Z., Aslam Khan, F. and Kim, Y. (2019) KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. Computer, 52, 41-51. https://doi.org/10.1109/mc.2018.2888764
[68]
Tavallaee, M., Bagheri, E., Lu, W. and Ghorbani, A.A. (2009) A Detailed Analysis of the KDD CUP 99 Data Set. 2009 IEEESymposiumonComputationalIntelligenceforSecurityandDefenseApplications, Ottawa, 8-10 July 2009, 1-6. https://doi.org/10.1109/cisda.2009.5356528
[69]
Zolanvari, M., Gupta, L., Khan, K.M. and Jain, R. (2021) WUSTL-IIOT-2O2L Dataset for IIoT Cyber-Security Research. Washington University.
[70]
Al-Hawawreh, M., Sitnikova, E. and Aboutorab, N. (2022) X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things. IEEEInternetofThingsJournal, 9, 3962-3977. https://doi.org/10.1109/jiot.2021.3102056
[71]
Ferrag, M.A. (2022) Edge-IIoTset Cyber Security Dataset of IoT & IIoT. Kaggle.
[72]
Jia, B., Ma, Y., Huang, X., Lin, Z. and Sun, Y. (2016) A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data. MathematicalProblemsinEngineering, 2016, Article ID: 1467051. https://doi.org/10.1155/2016/1467051
[73]
Andresini, G., Appice, A., Mauro, N.D., Loglisci, C. and Malerba, D. (2020) Multi-channel Deep Feature Learning for Intrusion Detection. IEEE Access, 8, 53346-53359. https://doi.org/10.1109/access.2020.2980937
[74]
Lian, W., Nie, G., Jia, B., Shi, D., Fan, Q. and Liang, Y. (2020) An Intrusion Detection Method Based on Decision Tree-Recursive Feature Elimination in Ensemble Learning. MathematicalProblemsinEngineering, 2020, Article ID: 2835023. https://doi.org/10.1155/2020/2835023
[75]
Gupta, S. and Singh, A. (2024) An Ensemble Approach to Intrusion Detection Using KDD Cup 99 Dataset. JournalofCybersecurityandPrivacy, 9, 1-15.
[76]
Hussain, J., Lalmuanawma, S. and Chhakchhuak, L. (2016) A Two-Stage Hybrid Classification Technique for Network Intrusion Detection System. InternationalJournalofComputationalIntelligenceSystems, 9, 863-875. https://doi.org/10.1080/18756891.2016.1237186
[77]
Wang, X. and Zhang, H. (2024) Deep Learning Hybrid Model for Intrusion Detection on the NSL-KDD Dataset. IEEEAccess, 12, 3456-3467.
[78]
Jiang, K., Wang, W., Wang, A. and Wu, H. (2020) Network Intrusion Detection Combined Hybrid Sampling with Deep Hierarchical Network. IEEEAccess, 8, 32464-32476. https://doi.org/10.1109/access.2020.2973730
[79]
Jiang, Q. and Xie, W. (2024) Adaptive CNN-Based Intrusion Detection for IIoT Networks Using Edge IIoT Dataset. IEEE Internet of Things Journal, 11, 2357-2370.
[80]
Liu, J. and Li, Y. (2024) Anomaly Detection in IoT Networks Using Stacked Autoencoders on the X-IoT Dataset. ACMTransactionsonInternetTechnology, 24, 55-70.
[81]
Zhang, T. and Patel, K. (2024) Intrusion Detection for IoT-Based Drone Networks Using CNN: OBD Drone Dataset Analysis. Sensors, 24, 245-261.
[82]
Alqarni, A. and Mohammed, F. (2024) Attention-Based Deep Learning Model for Intrusion Detection in Real-Time Drone Networks. Journal of Aerospace InformationSystems, 21, 123-135.
[83]
Cho, Y. and Kim, M. (2024) Hybrid CNN-RNN Model for UAV Anomaly Detection Using WUSTL Dataset. IEEETransactionsonAerospaceandElectronicSystems, 60, 45-55.