论文标题
基于卷积注意的深度网络解决方案,用于无人机网络攻击识别褪色渠道和干扰
A Convolutional Attention Based Deep Network Solution for UAV Network Attack Recognition over Fading Channels and Interference
论文作者
论文摘要
当用户与无人驾驶汽车交换数据时 - (无人机)在空对地面(A2G)无线通信网络上时,他们会暴露于可能增加数据包损失并可能中断连接性的攻击的链接。例如,在紧急交付中,丢失控制信息(即与无人机控制通信有关的数据)可能导致事故,从而造成无人机破坏和城市中建筑物或其他元素的损害。为了防止这些问题,这些问题必须在5G和6G方案中解决。这项研究提供了一种深度学习(DL)方法,用于检测在高度复杂的场景中,在群集延迟线(CDL)通道上配备了正交频施加多路复用(OFDM)接收器的攻击方法,涉及认证的地面用户以及未知位置的攻击者。我们使用5G无人机连接中可观察到的两个可观察的参数:接收的信号强度指示器(RSSI)和信号到干扰加噪声比(SINR)。预期算法在攻击识别方面是可以推广的,这在训练过程中不会发生。此外,它可以与20个地面用户一起识别环境中的所有攻击者。对识别攻击的时机要求进行了更深入的调查表明,训练后,攻击开始后所需的最小时间为100 ms,最小攻击功率为2 dbm,这与身份验证的无人机使用的功率相同。我们的算法还从500 m的距离中检测到移动攻击者。
When users exchange data with Unmanned Aerial vehicles - (UAVs) over air-to-ground (A2G) wireless communication networks, they expose the link to attacks that could increase packet loss and might disrupt connectivity. For example, in emergency deliveries, losing control information (i.e data related to the UAV control communication) might result in accidents that cause UAV destruction and damage to buildings or other elements in a city. To prevent these problems, these issues must be addressed in 5G and 6G scenarios. This research offers a deep learning (DL) approach for detecting attacks in UAVs equipped with orthogonal frequency division multiplexing (OFDM) receivers on Clustered Delay Line (CDL) channels in highly complex scenarios involving authenticated terrestrial users, as well as attackers in unknown locations. We use the two observable parameters available in 5G UAV connections: the Received Signal Strength Indicator (RSSI) and the Signal to Interference plus Noise Ratio (SINR). The prospective algorithm is generalizable regarding attack identification, which does not occur during training. Further, it can identify all the attackers in the environment with 20 terrestrial users. A deeper investigation into the timing requirements for recognizing attacks show that after training, the minimum time necessary after the attack begins is 100 ms, and the minimum attack power is 2 dBm, which is the same power that the authenticated UAV uses. Our algorithm also detects moving attackers from a distance of 500 m.