2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops) 2017
DOI: 10.1109/lcn.workshops.2017.71
|View full text |Cite
|
Sign up to set email alerts
|

Defending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms

Abstract: Nowadays, companies such as Amazon, Alibaba, and even pizza chains are pushing forward to use drones, also called UAVs (Unmanned Aerial Vehicles), for service provision, such as package and food delivery. As governments intend to use these immense economic benefits that UAVs have to offer, urban planners are moving forward to incorporate so-called UAV flight zones and UAV highways in their smart city designs. However, the high-speed mobility and behavior dynamics of UAVs need to be monitored to detect and, sub… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 58 publications
(36 citation statements)
references
References 12 publications
0
35
0
1
Order By: Relevance
“…We noticed that there is a small subset of papers where the cruise part could be split into several parts. For example, in [20], defending against malicious UAVs with UAV defense swarms is discussed. The cruise part of the flight consists of the following parts: (1) deployment, (2) clustering, (3) formation, (4) chase, (5) escort.…”
Section: Nomenclaturementioning
confidence: 99%
“…We noticed that there is a small subset of papers where the cruise part could be split into several parts. For example, in [20], defending against malicious UAVs with UAV defense swarms is discussed. The cruise part of the flight consists of the following parts: (1) deployment, (2) clustering, (3) formation, (4) chase, (5) escort.…”
Section: Nomenclaturementioning
confidence: 99%
“…However, they did not consider the situation of air-to-air interference, so their review only focused on interference to ground stations. Brust et al [16] proposed a method for escorting detected malicious UAVs by transforming the formation of the UAV swarm. However, if the malicious UAV suddenly launches a jamming attack, the large number of UAVs near this malicious UAV will suffer disastrous consequences.…”
Section: Cyber Threats Against Uav Networkmentioning
confidence: 99%
“…(1) When the node does not perform intrusion detection but the attacker initiates a malicious behavior, the profits ( ) ij P FPDR (8) In the following we describe the best balance between IDS high detection and low overhead using Bayesian Nash equilibrium game theory.…”
Section: The Design Of Intrusion Detection Systemmentioning
confidence: 99%
“…(1) Classifier-based IDS: Brust et al [8] proposed a UAV defense system based on the self-balancing clustering method. When an intrusion is detected, the rogue UAVs or maliciously-targeted aircraft can be tracked by the UAV group used for defense, which effectively reduce the communication losses.…”
mentioning
confidence: 99%