The University of Southampton
University of Southampton Institutional Repository

Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders

Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders
Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm . Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm . Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected.
AANET, Antenna arrays, Authentication, PHY authentication, Receiving antennas, Security, Testing, Training, Wireless communication, autoencoder, deep learning, spoofing detection
1556-6013
1010 - 1023
Hoang, Tiep M.
79ed4c0b-02ee-420a-a4cf-eeb0c2715d76
van Chien, Trinh
ccd89164-d0ee-4805-9ee6-d18fe996b2d3
van Luong, Thien
e95afcc7-65ce-46b2-a002-d36e24c90b97
Chatzinotas, Symeon
e349eceb-5716-490e-900b-563e347746f7
Ottersten, Björn
166b00b5-0970-4549-9f9b-6eeeb1ecd65a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Hoang, Tiep M.
79ed4c0b-02ee-420a-a4cf-eeb0c2715d76
van Chien, Trinh
ccd89164-d0ee-4805-9ee6-d18fe996b2d3
van Luong, Thien
e95afcc7-65ce-46b2-a002-d36e24c90b97
Chatzinotas, Symeon
e349eceb-5716-490e-900b-563e347746f7
Ottersten, Björn
166b00b5-0970-4549-9f9b-6eeeb1ecd65a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1

Hoang, Tiep M., van Chien, Trinh, van Luong, Thien, Chatzinotas, Symeon, Ottersten, Björn and Hanzo, Lajos (2022) Detection of spoofing attacks in aeronautical ad-hoc networks using deep autoencoders. IEEE Transactions on Information Forensics and Security, 17, 1010 - 1023. (doi:10.1109/TIFS.2022.3155970).

Record type: Article

Abstract

We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm . Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm . Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected.

Text
AE_v14_CAMERA_READY - Accepted Manuscript
Restricted to Repository staff only
Request a copy

More information

Accepted/In Press date: 23 February 2022
e-pub ahead of print date: 2 March 2022
Published date: 2022
Keywords: AANET, Antenna arrays, Authentication, PHY authentication, Receiving antennas, Security, Testing, Training, Wireless communication, autoencoder, deep learning, spoofing detection

Identifiers

Local EPrints ID: 455353
URI: http://eprints.soton.ac.uk/id/eprint/455353
ISSN: 1556-6013
PURE UUID: 4f3e6e99-4b67-49b9-85c8-fab7a1a75bf9
ORCID for Lajos Hanzo: ORCID iD orcid.org/0000-0002-2636-5214

Catalogue record

Date deposited: 17 Mar 2022 17:38
Last modified: 18 Mar 2024 02:36

Export record

Altmetrics

Contributors

Author: Tiep M. Hoang
Author: Trinh van Chien
Author: Thien van Luong
Author: Symeon Chatzinotas
Author: Björn Ottersten
Author: Lajos Hanzo ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×