2020
DOI: 10.1109/lwc.2019.2945022
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(36 citation statements)
references
References 12 publications
0
36
0
Order By: Relevance
“…Then, the potential of using unsupervised learning for the detection of active eavesdropping in UAV-aided relay-based networks was investigated in Reference [55], where the uplink was responsible for the authentication procedure. More importantly, one-class SVM and K-means clustering were exploited for the detection of possible attacks during the authentication.…”
Section: Security and Safety Issuesmentioning
confidence: 99%
“…Then, the potential of using unsupervised learning for the detection of active eavesdropping in UAV-aided relay-based networks was investigated in Reference [55], where the uplink was responsible for the authentication procedure. More importantly, one-class SVM and K-means clustering were exploited for the detection of possible attacks during the authentication.…”
Section: Security and Safety Issuesmentioning
confidence: 99%
“…In [65], an attack detection technique was proposed in which two different machine learning algorithms such as Support Vector Machine (SVM) and K-mean clustering are used. These algorithms learn from the data and make decisions for the upcoming samples.…”
Section: Learning-based Intrusion Detectionmentioning
confidence: 99%
“…We have analyzed some statistical results of machine learning based techniques for UAVs which either incorporate rule-based or learning-based techniques [65], [69]- [74]. The results analyzed are displayed in Table 4.…”
Section: Rules-based Intrusion Detectionmentioning
confidence: 99%
“… Eavesdropping: Eavesdropping is a real-time attack in which an attacker intercepts private communications such as calls, texts, faxes, and video conferences. The main purpose here is to steal information sent over the network (Hoang et al, 2019).  Fake Node and Malicious: This type of attack is an attack where the attacker enters fake data through a node added to the system.…”
Section: Perception Layermentioning
confidence: 99%