2017
DOI: 10.1109/tits.2016.2600370
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

Abstract: International audienceAdvances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
99
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 137 publications
(99 citation statements)
references
References 31 publications
0
99
0
Order By: Relevance
“…Sedjelmaci et al [17] Hierarchical IDS Threat classification & behavior monitoring Mitchell and Chen [11] Behavior rule-based evaluations Minimizing false positives & false negatives Kwon et al [8] Safety analysis under stealthy cyber attacks Real-time safety assessment Lauf and Robinson [9] Distributed resource system Intrusion-tolerance strategy Shen et al [24] Game theoretic approach Based on the three levels: object, situation and threat. Sedjelmaci et al [15] Security game framework Optimal setting identification based on intrusion detection rate with minimum overhead using Bayesian game Trafton and Pizzi [25] Network service suite Framework for information assurance of UAVs • Instant acknowledgement: In this acknowledgment, an IDS monitoring is performed at real-time and decisions or alarms are generated in the form of instant acknowledgments. • Periodic acknowledgement: In this acknowledgement, an IDS continuously gathers the data but the decisions are based on the periodical analysis of received data.…”
Section: Ids Acknowledgmentmentioning
confidence: 99%
See 1 more Smart Citation
“…Sedjelmaci et al [17] Hierarchical IDS Threat classification & behavior monitoring Mitchell and Chen [11] Behavior rule-based evaluations Minimizing false positives & false negatives Kwon et al [8] Safety analysis under stealthy cyber attacks Real-time safety assessment Lauf and Robinson [9] Distributed resource system Intrusion-tolerance strategy Shen et al [24] Game theoretic approach Based on the three levels: object, situation and threat. Sedjelmaci et al [15] Security game framework Optimal setting identification based on intrusion detection rate with minimum overhead using Bayesian game Trafton and Pizzi [25] Network service suite Framework for information assurance of UAVs • Instant acknowledgement: In this acknowledgment, an IDS monitoring is performed at real-time and decisions or alarms are generated in the form of instant acknowledgments. • Periodic acknowledgement: In this acknowledgement, an IDS continuously gathers the data but the decisions are based on the periodical analysis of received data.…”
Section: Ids Acknowledgmentmentioning
confidence: 99%
“…In addition, this work incorporated specific detection policies to maintain data integrity and network availability. Sedjelmaci et al [15] took one step further to propose a robust UAV assisted network against lethal attackers, namely a Security Game Framework (SGF), which is formulated based on Bayesian game among the suspected nodes. This approach formulates two attack-defense problems between IDS and the attacker, and between intrusion ejection system and the suspected nodes.…”
Section: Survey Of Existing Uav-ids Approachesmentioning
confidence: 99%
“…He (2017) has developed an application-oriented cyber threat assessment framework in order to address the risk posed by multistage cyber-attacks in smart grids. Intelligent transportation systems (ITS) have also developed game-theory models to secure against the fatal cyber-attacks (Alpcan and Buchegger 2010;Bahamou et al 2016;Mejri et al 2016;Sanjab et al 2017;Sedjelmaci et al 2016). In addition to this, a combined simulation of interconnected railway network, ICT network and energy grid using OpenTrack, SINCAL, and NS3 respectively has been achieved in European Union Project (Ciprnet 2013).…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, their usage has significantly increased and they have expanded in different fields of applications where they have proved to be quite useful not only in military applications but also in civilian applications such as research and rescue missions (earthquake), target detection, remote sensing and performing surveillance, and agricultural tasks. In these applications, drones sometimes carry out exploration missions in remote places to replace human presence and/or deliver data to and from areas with no infrastructure …”
Section: Introductionmentioning
confidence: 99%