当前位置: X-MOL 学术IEEE Trans. Cognit. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
On understanding the impact of RTT in the mobile network for detecting the rogue UAVs
IEEE Transactions on Cognitive Communications and Networking ( IF 8.6 ) Pub Date : 2020-12-01 , DOI: 10.1109/tccn.2020.3004583
Nilesh Chakraborty , Yao Chao , Chengwen Luo , Jianqiang Li , Pan Ziying , Jie Chen , Yi Pan

In recent times, Unmanned-aerial-vehicles (UAVs) have grasped significant attentions for performing various operations without a constant intervention of the human users. Due to the power and computing constraints, however, it is difficult for an UAV to perform all the tasks independently. Hence, to achieve its goals, a UAV may share various sensitive data with the nearest edge servers through some access points (APs). Prior to sending any sensitive information through an AP, it is very important for an UAV to determine the authenticity of the selected AP. In this paper, we have applied a timing-based algorithm for spotting rogue APs by the UAVs − while selecting an edge server. The timing-based algorithm does not require any additional hardware or any change in the network protocol for detection purpose. This fact, in turn, reduces the effort from UAV’s side for detecting a breach. An extensive experimental study shows that with a little manipulation in speed, an UAV can detect the presence of any rogue AP almost every time with only 6% false-positive rate.

中文翻译:

了解 RTT 在移动网络中对流氓无人机检测的影响

近年来,无人驾驶飞行器(UAV)在无需人类用户不断干预的情况下执行各种操作而受到了极大的关注。然而,由于功率和计算的限制,无人机很难独立完成所有任务。因此,为了实现其目标,无人机可能会通过一些接入点 (AP) 与最近的边缘服务器共享各种敏感数据。在通过 AP 发送任何敏感信息之前,无人机确定所选 AP 的真实性非常重要。在本文中,我们应用了一种基于时间的算法来通过 UAV 发现恶意 AP——同时选择边缘服务器。基于时间的算法不需要任何额外的硬件或网络协议中的任何更改来进行检测。这个事实反过来,减少了无人机方面检测漏洞的工作量。一项广泛的实验研究表明,只要稍微调整速度,无人机几乎每次都可以检测到任何流氓 AP 的存在,误报率仅为 6%。
更新日期:2020-12-01
down
wechat
bug