Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders
Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm . Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm . Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected.
AANET, Antenna arrays, Authentication, PHY authentication, Receiving antennas, Security, Testing, Training, Wireless communication, autoencoder, deep learning, spoofing detection
1010 - 1023
Hoang, Tiep M.
79ed4c0b-02ee-420a-a4cf-eeb0c2715d76
van Chien, Trinh
ccd89164-d0ee-4805-9ee6-d18fe996b2d3
van Luong, Thien
e95afcc7-65ce-46b2-a002-d36e24c90b97
Chatzinotas, Symeon
e349eceb-5716-490e-900b-563e347746f7
Ottersten, Björn
166b00b5-0970-4549-9f9b-6eeeb1ecd65a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
2022
Hoang, Tiep M.
79ed4c0b-02ee-420a-a4cf-eeb0c2715d76
van Chien, Trinh
ccd89164-d0ee-4805-9ee6-d18fe996b2d3
van Luong, Thien
e95afcc7-65ce-46b2-a002-d36e24c90b97
Chatzinotas, Symeon
e349eceb-5716-490e-900b-563e347746f7
Ottersten, Björn
166b00b5-0970-4549-9f9b-6eeeb1ecd65a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Hoang, Tiep M., van Chien, Trinh, van Luong, Thien, Chatzinotas, Symeon, Ottersten, Björn and Hanzo, Lajos
(2022)
Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders.
IEEE Transactions on Information Forensics and Security, 17, .
(doi:10.1109/TIFS.2022.3155970).
Abstract
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm . Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm . Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected.
Text
AE_v14_CAMERA_READY
- Accepted Manuscript
Restricted to Repository staff only
Request a copy
More information
Accepted/In Press date: 23 February 2022
e-pub ahead of print date: 2 March 2022
Published date: 2022
Keywords:
AANET, Antenna arrays, Authentication, PHY authentication, Receiving antennas, Security, Testing, Training, Wireless communication, autoencoder, deep learning, spoofing detection
Identifiers
Local EPrints ID: 455353
URI: http://eprints.soton.ac.uk/id/eprint/455353
ISSN: 1556-6013
PURE UUID: 4f3e6e99-4b67-49b9-85c8-fab7a1a75bf9
Catalogue record
Date deposited: 17 Mar 2022 17:38
Last modified: 18 Mar 2024 02:36
Export record
Altmetrics
Contributors
Author:
Tiep M. Hoang
Author:
Trinh van Chien
Author:
Thien van Luong
Author:
Symeon Chatzinotas
Author:
Björn Ottersten
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics