2020
DOI: 10.1016/j.comnet.2019.107044
|View full text |Cite
|
Sign up to set email alerts
|

PiNcH: An effective, efficient, and robust solution to drone detection via network traffic analysis

Abstract: We propose Picking a Needle in a Haystack (PiNcH ), a methodology to detect the presence of a drone, its current status, and its movements by leveraging just the communication traffic exchanged between the drone and its Remote Controller (RC). PiNcH is built applying standard classification algorithms to the eavesdropped traffic, analyzing features such as packets inter-arrival time and size. PiNcH is fully passive and it requires just cheap and general-purpose hardware. To evaluate the effectiveness of our so… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(22 citation statements)
references
References 33 publications
1
16
0
Order By: Relevance
“…Therefore, an efficient and intelligent NIDS is required which can detect the intruders within UAV‐enabled networks. Furthermore, the use of AI within the NIDS for UAV‐enabled networks can be an interesting research direction, which requires more exploration and investigation 141,142 …”
Section: Observations Challenges and Future Trendsmentioning
confidence: 99%
“…Therefore, an efficient and intelligent NIDS is required which can detect the intruders within UAV‐enabled networks. Furthermore, the use of AI within the NIDS for UAV‐enabled networks can be an interesting research direction, which requires more exploration and investigation 141,142 …”
Section: Observations Challenges and Future Trendsmentioning
confidence: 99%
“…Several illuminators explored for passive bistatic radar (only one example of a published paper is cited for each technology) such as the global navigation satellite system (GNSS) [11], Long-Term Evolution (LTE) signal [12], WIFI [13], WIFI (DVB-T) [14], Digital Audio Broadcast (DAB) [15], FM broadcast [16], drone RF signal [17], video surveillance [18]. These illuminators became a boosting tool for passive radar, thereby becoming an important technology for both military and civil applications.…”
Section: Methodsmentioning
confidence: 99%
“…The malicious party takes advantage of the unsecured communication channel to intercepts the communicated navigational messages between the targeted drone and its navigation controller. Later, the attacker manipulates and resend it to the drone without its knowledge [99].…”
Section: ) Eavesdropping Attack On Navigational Data Of Dronesmentioning
confidence: 99%