[en] We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm . Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm . Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected.
Disciplines :
Sciences informatiques
Auteur, co-auteur :
Hoang, Tiep M.
Van Chien, Trinh
Van Luong, Thien
CHATZINOTAS, Symeon ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
OTTERSTEN, Björn ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders
Date de publication/diffusion :
2022
Titre du périodique :
IEEE Transactions on Information Forensics and Security
Y. Zou, J. Zhu, X. Wang, and L. Hanzo, "A survey on wireless security: Technical challenges, recent advances, and future trends," Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
N. Xie, Z. Li, and H. Tan, "A survey of physical-layer authentication in wireless communications," IEEE Commun. Surveys Tuts., vol. 23, no. 1, pp. 282-310, 1st Quart., 2021.
H. Forssell, R. Thobaben, H. Al-Zubaidy, and J. Gross, "Physical layer authentication in mission-critical MTC networks: A security and delay performance analysis," IEEE J. Sel. Areas Commun., vol. 37, no. 4, pp. 795-808, Apr. 2019.
P. L. Yu and B. M. Sadler, "MIMO authentication via deliberate fingerprinting at the physical layer," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 606-615, Sep. 2011.
K. M. Borle, B. Chen, and W. K. Du, "Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation," IEEE Trans. Inf. Forensics Security, vol. 10, no. 10, pp. 2225-2235, Oct. 2015.
Z. Gu, H. Chen, P. Xu, Y. Li, and B. Vucetic, "Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications," IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3722-3733, 2020.
T. M. Hoang, N. M. Nguyen, and T. Q. Duong, "Detection of eavesdropping attack in UAV-aided wireless systems: Unsupervised learning with one-class SVM and K-means clustering," IEEE Wireless Commun. Lett., vol. 9, no. 2, pp. 139-142, Feb. 2020.
C. Jiang, H. Zhang, Y. Ren, Z. Han, K.-C. Chen, and L. Hanzo, "Machine learning paradigms for next-generation wireless networks," IEEE Wireless Commun., vol. 24, no. 2, pp. 98-105, Apr. 2017.
H. Fang, X. Wang, and S. Tomasin, "Machine learning for intelligent authentication in 5G and beyond wireless networks," IEEE Wireless Commun., vol. 26, no. 5, pp. 55-61, Oct. 2019.
J. Zhang et al., "Aeronautical ad hoc networking for the internet-abovethe-clouds," Proc. IEEE, vol. 107, no. 5, pp. 868-911, May 2019.
Q. Luo and J. Wang, "Multiple QoS parameters-based routing for civil aeronautical ad hoc networks," IEEE Internet Things J., vol. 4, no. 3, pp. 804-814, Jun. 2017.
M. Al-Qatf, Y. Lasheng, M. Al-Habib, and K. Al-Sabahi, "Deep learning approach combining sparse autoencoder with SVM for network intrusion detection," IEEE Access, vol. 6, pp. 52843-52856, 2018.
K.-L. Besser, P.-H. Lin, C. R. Janda, and E. A. Jorswieck, "Wiretap code design by neural network autoencoders," IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3374-3386, 2020.
I. Ko, D. Chambers, and E. Barrett, "Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigation," J. Inf. Secur. Appl., vol. 55, Dec. 2020, Art. no. 102647.
C. Yin, S. Zhang, J. Wang, and N. N. Xiong, "Anomaly detection based on convolutional recurrent autoencoder for IoT time series," IEEE Trans. Syst., Man, Cybern., Syst., vol. 52, no. 1, pp. 112-122, Jan. 2020.
A. Nooraiepour, W. U. Bajwa, and N. B. Mandayam, "Learning-aided physical layer attacks against multicarrier communications in IoT," IEEE Trans. Cognit. Commun. Netw., vol. 7, no. 1, pp. 239-254, Mar. 2021.
J. Liu and X. Wang, "Physical layer authentication enhancement using two-dimensional channel quantization," IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4171-4182, Jun. 2016.
X. Qiu, T. Jiang, S. Wu, and M. Hayes, "Physical layer authentication enhancement using a Gaussian mixture model," IEEE Access, vol. 6, pp. 53583-53592, 2018.
J. Tao, J. Chen, J. Xing, S. Fu, and J. Xie, "Autoencoder neural network based intelligent hybrid beamforming design for mmWave massive MIMO systems," IEEE Trans. Cognit. Commun. Netw., vol. 6, no. 3, pp. 1019-1030, Sep. 2020.
L. Xiao, X. Wan, and Z. Han, "PHY-layer authentication with multiple landmarks with reduced overhead," IEEE Trans. Wireless Commun., vol. 17, no. 3, pp. 1676-1687, Mar. 2017.
H. Liu, T. Taniguchi, Y. Tanaka, K. Takenaka, and T. Bando, "Visualization of driving behavior based on hidden feature extraction by using deep learning," IEEE Trans. Intell. Transp. Syst., vol. 18, no. 9, pp. 2477-2489, Sep. 2017.
Z. E. Khatab, A. Hajihoseini, and S. A. Ghorashi, "A fingerprint method for indoor localization using autoencoder based deep extreme learning machine," IEEE Sensors Lett., vol. 2, no. 1, pp. 1-4, Mar. 2018.
C. Antón-Haro and X. Mestre, "Learning and data-driven beam selection for mmWave communications: An angle of arrival-based approach," IEEE Access, vol. 7, pp. 20404-20415, 2019.
J. D. Parsons, The Mobile Radio Propagation Channel, 2nd ed. Hoboken, NJ, USA: Wiley, 2000.
D. Astély and B. Ottersten, "The effects of local scattering on direction of arrival estimation with MUSIC," IEEE Trans. Sig. Process., vol. 47, no. 12, pp. 3220-3234, Dec. 1999.
C. Xu, T. Bai, J. Zhang, R. Rajashekar, R. G. Maunder, Z. Wang, and L. Hanzo, "Adaptive coherent/non-coherent spatial modulation aided unmanned aircraft systems," IEEE Wireless Commun., vol. 26, no. 4, pp. 170-177, May 2019.
M. Wang, F. Gao, S. Jin, and H. Lin, "An overview of enhanced massive MIMO with array signal processing techniques," IEEE J. Sel. Topics Signal Process., vol. 13, no. 5, pp. 886-901, Sep. 2019.
F. G. Yan, M. Jin, S. Liu, and X. L. Qiao, "Real-valued MUSIC for efficient direction estimation with arbitrary array geometries," IEEE Trans. Signal Process., vol. 62, no. 6, pp. 1548-1560, Mar. 2014.
A. Ferreol, P. Larzabal, and M. Viberg, "Performance prediction of maximum-likelihood direction-of-arrival estimation in the presence of modeling errors," IEEE Trans. Signal Process., vol. 56, no. 10, pp. 4785-4793, Oct. 2008.
B. Ottersten, M. Viberg, P. Stoica, and A. Nehorai, "Exact and large sample ML techniques for parameter estimation and detection in array processing," in Radar Array Processing, S. Haykin, J. Litva, and T. J. Shepherd, Eds. Berlin, Germany: Springer, 1993, ch. 4.
M. Bengtsson and B. Ottersten, "Rooting techniques for estimation of angular spread with an antenna array," in Proc. IEEE 47th Veh. Technol. Conf., vol. 2, May 1997, pp. 1158-1162.
M. C. Erturk et al., "Doppler mitigation in OFDM-based aeronautical communications," IEEE Trans. Aerosp. Electron. Syst., vol. 50, no. 1, pp. 120-129, Jan. 2014.
D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," 2014, arXiv:1412.6980.
P. Ramachandran, B. Zoph, and Q. V. Le, "Searching for activation functions," 2017, arXiv:1710.05941.