2021
DOI: 10.21203/rs.3.rs-271920/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Securing Against DoS/DDoS Attacks in Internet of Flying Things using  Experience-based Deep Learning Algorithm

Abstract: Due to the limited computational resources of small unmanned aerial vehicles (UAVs), the Internet of flying things (IoFT) is vulnerable to cybersecurity attacks, particularly Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In addition, the transfer of reliable information from source UAV to destination UAV is another big challenge in IoFT networks. Therefore, this article aims to address the security deficiency by proposing an experience-based deep learning algorithm to cater to the D… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Because of this attack, the topological information gets shared within the network and thereby exploiting the vulnerabilities. This may divert the paths and degrades the performance of the throughput and packet delivery ratio [16].…”
Section: Gray Hole Attackmentioning
confidence: 99%
“…Because of this attack, the topological information gets shared within the network and thereby exploiting the vulnerabilities. This may divert the paths and degrades the performance of the throughput and packet delivery ratio [16].…”
Section: Gray Hole Attackmentioning
confidence: 99%
“…In [123], the authors proposed a spectrogramtailored ML method able to detect four types of Jamming attacks, namely barrage, protocol-aware, single-tone, and successive-pulse. To mitigate the effects of a Jamming attack on a network level of the communication link, also referred to as a DoS attack, authors in [124] developed an Intrusion Detection System operated by a deep machine learning algorithm based on previously experienced DoS attacks. To tackle Man-in-the-Middle attacks, the authors in [125] proposed a lightweight digital signature protocol solution to authenticate the communication and, thus, validate each received command by comparing the signatures.…”
Section: Countermeasuresmentioning
confidence: 99%