A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on systems, man, and cybernetics. Systems Vol. 48; no. 9; pp. 1594 - 1606
Main Authors: Sedjelmaci, Hichem, Senouci, Sidi Mohammed, Ansari, Nirwan
Format: Journal Article
Language:English
Published: New York IEEE 01.09.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Subjects:
ISSN:2168-2216, 2168-2232
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the most lethal cyber-attacks that can target an UAV network, namely, false information dissemination, GPS spoofing, jamming, and black hole and gray hole attacks. Extensive simulations confirm that the proposed scheme performs well in terms of attack detection even with a large number of UAVs and attackers since it exhibits a high detection rate, a low number of false positives, and prompt detection with a low communication overhead.
AbstractList Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the most lethal cyber-attacks that can target an UAV network, namely, false information dissemination, GPS spoofing, jamming, and black hole and gray hole attacks. Extensive simulations confirm that the proposed scheme performs well in terms of attack detection even with a large number of UAVs and attackers since it exhibits a high detection rate, a low number of false positives, and prompt detection with a low communication overhead.
Author Sedjelmaci, Hichem
Senouci, Sidi Mohammed
Ansari, Nirwan
Author_xml – sequence: 1
  givenname: Hichem
  surname: Sedjelmaci
  fullname: Sedjelmaci, Hichem
  email: sid-ahmed-hichem.sedjelmaci@u-bourgogne.fr
  organization: DRIVE Lab., Univ. of Burgundy, Nevers, France
– sequence: 2
  givenname: Sidi Mohammed
  surname: Senouci
  fullname: Senouci, Sidi Mohammed
  organization: DRIVE Lab., Univ. of Burgundy, Nevers, France
– sequence: 3
  givenname: Nirwan
  surname: Ansari
  fullname: Ansari, Nirwan
  email: nirwan.ansari@njit.edu
  organization: New Jersey Inst. of Technol., Newark, NJ, USA
BackLink https://ube.hal.science/hal-01557953$$DView record in HAL
BookMark eNp9UU1PGzEQtSoqlVJ-AOrFEqceNvhj1x_HVUoJUigSX1fL6500hsQOtlOUf8-ugnLooacZjd5782beV3QUYgCEziiZUEr0xcP9zXTCCJUTJhQVWn1Cx4wKVTHG2dGhp-ILOs35mRBCmRKciGO0bvHMQ7LJLb2zK_wTCrjiY8A29PgO8iaGDPh-lwuscYn4MixtcMME3Db5ssPtH-tDLngOZTkITHcdpKotxbqXjH3Aj-0T_g3lLaaX_A19XthVhtOPeoIef10-TGfV_PbqetrOK1dzUaoaFsQyCbrjtpadkoKrTrpF0ytJet53sta80aS2ktSq1kKpXvc96WknatF0_AT92OsOjswm-bVNOxOtN7N2bsYZoU0jdcP_0gF7vsduUnzdQi7mOW5TGOwZRqmknGrJBhTdo1yKOSdYHGQpMWMIZgzBjCGYjxAGjvyH43yx43NLsn71X-b3PdMDwGGTVMPJQvJ35RaUmA
CODEN ITSMFE
CitedBy_id crossref_primary_10_1109_TSMC_2019_2911548
crossref_primary_10_1007_s11227_023_05811_1
crossref_primary_10_1016_j_ast_2021_107212
crossref_primary_10_1016_j_comcom_2020_07_042
crossref_primary_10_1049_itr2_12579
crossref_primary_10_1016_j_seta_2022_102686
crossref_primary_10_1007_s10586_025_05461_3
crossref_primary_10_1016_j_adhoc_2019_101970
crossref_primary_10_1002_dac_4926
crossref_primary_10_1002_int_22392
crossref_primary_10_1109_JIOT_2024_3426511
crossref_primary_10_1109_TSMC_2021_3130748
crossref_primary_10_1016_j_adhoc_2024_103407
crossref_primary_10_1016_j_comcom_2020_08_016
crossref_primary_10_1109_ACCESS_2023_3253481
crossref_primary_10_32604_cmc_2022_020774
crossref_primary_10_3390_s21062208
crossref_primary_10_1016_j_comcom_2020_01_023
crossref_primary_10_1016_j_sysarc_2024_103282
crossref_primary_10_1109_ACCESS_2024_3419800
crossref_primary_10_1109_JMASS_2024_3490762
crossref_primary_10_3390_math13132130
crossref_primary_10_1002_ett_3520
crossref_primary_10_1016_j_procs_2021_04_014
crossref_primary_10_1016_j_cose_2024_103878
crossref_primary_10_1109_TITS_2020_3019246
crossref_primary_10_1109_OJCOMS_2025_3528220
crossref_primary_10_1109_COMST_2021_3097916
crossref_primary_10_1109_TSMC_2019_2952539
crossref_primary_10_1109_JBHI_2022_3187037
crossref_primary_10_1109_JSYST_2022_3163139
crossref_primary_10_1088_1742_6596_2637_1_012001
crossref_primary_10_32604_cmc_2023_037257
crossref_primary_10_1109_COMST_2019_2933899
crossref_primary_10_1016_j_comnet_2020_107592
crossref_primary_10_1109_COMST_2018_2873088
crossref_primary_10_1016_j_iot_2023_100883
crossref_primary_10_3390_electronics9010062
crossref_primary_10_1007_s11042_025_20867_2
crossref_primary_10_1109_TETC_2018_2890476
crossref_primary_10_1109_MNET_008_2100472
crossref_primary_10_1002_dac_5237
crossref_primary_10_1109_JIOT_2023_3299554
crossref_primary_10_1109_JIOT_2024_3426054
crossref_primary_10_1145_3448254
crossref_primary_10_1049_iet_com_2020_0073
crossref_primary_10_1016_j_adhoc_2022_102894
crossref_primary_10_1016_j_jii_2021_100239
crossref_primary_10_1145_3673225
crossref_primary_10_1109_TMC_2024_3367124
crossref_primary_10_1038_s41598_024_57480_6
crossref_primary_10_1109_JIOT_2023_3333870
crossref_primary_10_1002_ett_4133
crossref_primary_10_1002_cpe_8206
crossref_primary_10_1016_j_jnca_2020_102706
crossref_primary_10_1016_j_cosrev_2023_100551
crossref_primary_10_1109_ACCESS_2019_2931539
crossref_primary_10_1016_j_comcom_2020_05_025
crossref_primary_10_1145_3701233
crossref_primary_10_3390_designs9030061
crossref_primary_10_1016_j_jisa_2021_102940
crossref_primary_10_1109_ACCESS_2021_3066778
crossref_primary_10_1371_journal_pone_0282567
crossref_primary_10_1002_rnc_7052
crossref_primary_10_1109_JIOT_2024_3360231
crossref_primary_10_1016_j_vehcom_2022_100552
crossref_primary_10_1007_s12652_022_04362_2
crossref_primary_10_1109_JIOT_2025_3545389
crossref_primary_10_1109_TAI_2024_3351095
crossref_primary_10_1016_j_procs_2024_08_068
crossref_primary_10_1109_ACCESS_2021_3124996
crossref_primary_10_1109_JIOT_2020_3020819
crossref_primary_10_1109_ACCESS_2021_3072030
crossref_primary_10_3390_electronics12061299
crossref_primary_10_1016_j_egyr_2022_07_115
crossref_primary_10_1016_j_jnca_2023_103607
crossref_primary_10_3390_drones6110340
crossref_primary_10_1016_j_cose_2024_104073
crossref_primary_10_1016_j_phycom_2020_101109
crossref_primary_10_1109_ACCESS_2024_3361945
crossref_primary_10_1007_s10922_023_09781_w
crossref_primary_10_1016_j_ress_2019_106675
crossref_primary_10_1109_ACCESS_2019_2962873
crossref_primary_10_1016_j_cose_2024_104248
crossref_primary_10_1016_j_iot_2020_100218
crossref_primary_10_1109_COMST_2021_3131332
crossref_primary_10_1109_TNSM_2020_3007535
crossref_primary_10_1016_j_compeleceng_2023_108757
crossref_primary_10_1016_j_sigpro_2020_107724
crossref_primary_10_1109_ACCESS_2019_2917135
crossref_primary_10_1109_JIOT_2022_3230786
crossref_primary_10_1109_TVT_2023_3337154
crossref_primary_10_1016_j_ress_2021_108246
crossref_primary_10_7717_peerj_cs_2714
crossref_primary_10_1007_s00521_024_10306_y
crossref_primary_10_1016_j_adhoc_2024_103610
crossref_primary_10_1016_j_sysarc_2019_101694
crossref_primary_10_1016_j_csi_2024_103844
crossref_primary_10_1016_j_adhoc_2022_102805
crossref_primary_10_1109_JIOT_2023_3263360
crossref_primary_10_1016_j_tra_2021_04_022
crossref_primary_10_1109_ACCESS_2021_3089847
crossref_primary_10_1109_TETC_2021_3104555
crossref_primary_10_1016_j_comnet_2023_110140
crossref_primary_10_1016_j_vehcom_2023_100661
crossref_primary_10_3390_electronics8121468
crossref_primary_10_1109_MCOMSTD_0001_2000078
crossref_primary_10_3390_drones6010008
crossref_primary_10_1007_s11227_020_03462_0
crossref_primary_10_1109_TITS_2020_3023189
crossref_primary_10_1002_ett_3987
crossref_primary_10_1109_ACCESS_2019_2924410
crossref_primary_10_1109_ACCESS_2025_3561068
crossref_primary_10_1186_s13638_019_1616_9
crossref_primary_10_3390_drones5020042
crossref_primary_10_1109_MNET_011_2000245
crossref_primary_10_1016_j_amc_2022_127762
crossref_primary_10_1109_TITS_2020_3015862
crossref_primary_10_1109_JIOT_2024_3429111
crossref_primary_10_1109_JIOT_2021_3113321
crossref_primary_10_1109_TNSM_2024_3448312
crossref_primary_10_1145_3485272
crossref_primary_10_1007_s00521_022_07015_9
crossref_primary_10_3390_s19081875
crossref_primary_10_1049_cmu2_12833
crossref_primary_10_1109_TSMC_2022_3220080
crossref_primary_10_1016_j_paerosci_2023_100949
crossref_primary_10_1155_2021_6653883
crossref_primary_10_1007_s11277_024_11503_7
crossref_primary_10_1038_s41597_025_05560_1
crossref_primary_10_1109_TDSC_2021_3127630
crossref_primary_10_1109_TMLCN_2025_3564912
Cites_doi 10.1109/TSMC.2015.2415763
10.1109/MCOM.2005.1453433
10.1109/GSIS.2007.4443446
10.1109/TSMC.2015.2503399
10.1145/1029102.1029115
10.1109/ICUAS.2014.6842277
10.1109/GIIS.2013.6684378
10.1109/TSMC.2013.2265083
10.1109/MILCOM.2012.6415722
10.1109/COMST.2014.2365951
10.1109/JSAC.2007.071005
10.1109/GLOCOM.2014.7036781
10.1109/JIOT.2014.2366120
10.1016/S1570-8705(03)00038-6
10.1109/THS.2013.6699094
10.1002/wcm.1171
10.1109/ICC.2014.6883374
10.1109/SURV.2013.052213.00046
10.1109/TVT.2009.2015953
10.1109/VETECF.2011.6093096
10.1002/sec.687
10.1016/j.comnet.2013.02.019
10.1109/INFCOM.2010.5462161
10.1145/345910.345953
10.1109/JSAC.2007.071006
10.1109/TPDS.2004.85
10.1109/TCYB.2015.2490802
10.1002/ett.1432
10.2514/6.2012-2438
10.1002/navi.44
10.1109/GLOCOMW.2011.6162389
10.1109/MWC.2010.5601956
10.1016/j.jpdc.2013.02.001
10.1109/GLOCOM.2016.7841878
10.1109/MNET.2006.1637931
10.1109/MWC.2007.4396938
10.1109/DSN.2005.58
10.1002/wcm.785
10.1109/TR.2013.2240891
10.1145/2382196.2382245
10.1016/j.jnca.2011.03.028
10.1109/INFCOMW.2011.5928811
10.1016/j.comnet.2007.11.015
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
Attribution - NonCommercial
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018
– notice: Attribution - NonCommercial
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
H8D
JQ2
L7M
L~C
L~D
1XC
VOOES
DOI 10.1109/TSMC.2017.2681698
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
Aerospace Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
DatabaseTitle CrossRef
Aerospace Database
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Aerospace Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2168-2232
EndPage 1606
ExternalDocumentID oai:HAL:hal-01557953v1
10_1109_TSMC_2017_2681698
7890467
Genre orig-research
GroupedDBID 0R~
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFS
ACIWK
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
H8D
JQ2
L7M
L~C
L~D
1XC
VOOES
ID FETCH-LOGICAL-c436t-4ef0a27e9b3a47b87638b7cf5d870d3db74935904a704849688d9dd0d1b6465b3
IEDL.DBID RIE
ISICitedReferencesCount 163
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000442360400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2168-2216
IngestDate Tue Oct 14 20:20:44 EDT 2025
Sun Nov 09 06:31:07 EST 2025
Sat Nov 29 03:45:28 EST 2025
Tue Nov 18 22:26:32 EST 2025
Wed Aug 27 06:01:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 9
Keywords intrusion detection system
cyber-attacks
Anomaly detection and rules-based intrusion detection techniques
Intrusion detection
Mobile communication
IDS
Unmanned aerial vehicles
Ad hoc networks
UAV
Monitoring
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
Attribution - NonCommercial: http://creativecommons.org/licenses/by-nc
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c436t-4ef0a27e9b3a47b87638b7cf5d870d3db74935904a704849688d9dd0d1b6465b3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8541-3565
0000-0001-5854-1852
0000-0001-8525-9596
OpenAccessLink https://ube.hal.science/hal-01557953
PQID 2117131972
PQPubID 75739
PageCount 13
ParticipantIDs crossref_primary_10_1109_TSMC_2017_2681698
hal_primary_oai_HAL_hal_01557953v1
ieee_primary_7890467
crossref_citationtrail_10_1109_TSMC_2017_2681698
proquest_journals_2117131972
PublicationCentury 2000
PublicationDate 2018-09-01
PublicationDateYYYYMMDD 2018-09-01
PublicationDate_xml – month: 09
  year: 2018
  text: 2018-09-01
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on systems, man, and cybernetics. Systems
PublicationTitleAbbrev TSMC
PublicationYear 2018
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Institute of Electrical and Electronics Engineers
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
– name: Institute of Electrical and Electronics Engineers
References ref13
ref12
ref15
ref14
ref53
ref17
mitrokotsa (ref8) 2008
ref19
ref18
sedjelmaci (ref52) 2016
ref51
ref50
ref45
ref48
ref47
ref42
ref41
ref44
hai (ref46) 2010; 10
ref49
shepard (ref21) 2011
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
wen (ref31) 2005
ref34
ref37
ref36
ref30
ref33
ref32
ref2
ref1
ref38
(ref54) 2016
ref24
ref23
ref26
ref25
ref20
ref22
wesson (ref10) 0
(ref43) 2016
ref28
ref27
ref29
scholkopf (ref39) 2006
shepard (ref11) 2012
kuypers (ref16) 2005
References_xml – ident: ref51
  doi: 10.1109/TSMC.2015.2415763
– ident: ref27
  doi: 10.1109/MCOM.2005.1453433
– ident: ref6
  doi: 10.1109/GSIS.2007.4443446
– year: 2016
  ident: ref54
– ident: ref49
  doi: 10.1109/TSMC.2015.2503399
– ident: ref41
  doi: 10.1145/1029102.1029115
– ident: ref44
  doi: 10.1109/ICUAS.2014.6842277
– ident: ref30
  doi: 10.1109/GIIS.2013.6684378
– ident: ref12
  doi: 10.1109/TSMC.2013.2265083
– ident: ref33
  doi: 10.1109/MILCOM.2012.6415722
– ident: ref9
  doi: 10.1109/COMST.2014.2365951
– start-page: 1
  year: 2011
  ident: ref21
  article-title: Characterization of receiver response to spoofing attacks
  publication-title: Proc ION GNSS
– start-page: 1
  year: 2012
  ident: ref11
  article-title: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks
  publication-title: Proc ION GNSS Meeting
– ident: ref32
  doi: 10.1109/JSAC.2007.071005
– start-page: 251
  year: 2008
  ident: ref8
  article-title: Intrusion detection techniques in sensor networks
  publication-title: Wireless Sensor Network Security
– ident: ref42
  doi: 10.1109/GLOCOM.2014.7036781
– ident: ref35
  doi: 10.1109/JIOT.2014.2366120
– ident: ref19
  doi: 10.1016/S1570-8705(03)00038-6
– ident: ref23
  doi: 10.1109/THS.2013.6699094
– ident: ref2
  doi: 10.1002/wcm.1171
– ident: ref40
  doi: 10.1109/ICC.2014.6883374
– ident: ref38
  doi: 10.1109/SURV.2013.052213.00046
– ident: ref17
  doi: 10.1109/TVT.2009.2015953
– ident: ref4
  doi: 10.1109/VETECF.2011.6093096
– ident: ref5
  doi: 10.1002/sec.687
– start-page: 1285
  year: 2005
  ident: ref31
  article-title: Countermeasures for GPS signal spoofing
  publication-title: Proc 18th Int Tech Meeting Satellite Div Inst Navigat
– year: 0
  ident: ref10
  publication-title: Can Cryptography Secure Next Generation Air Traffic Surveillance?
– ident: ref20
  doi: 10.1016/j.comnet.2013.02.019
– ident: ref14
  doi: 10.1109/INFCOM.2010.5462161
– ident: ref18
  doi: 10.1145/345910.345953
– ident: ref3
  doi: 10.1109/JSAC.2007.071006
– ident: ref45
  doi: 10.1109/TPDS.2004.85
– ident: ref50
  doi: 10.1109/TCYB.2015.2490802
– ident: ref7
  doi: 10.1002/ett.1432
– ident: ref24
  doi: 10.2514/6.2012-2438
– ident: ref34
  doi: 10.1002/navi.44
– ident: ref1
  doi: 10.1109/GLOCOMW.2011.6162389
– year: 2006
  ident: ref39
  publication-title: Learning With Kernels Support Vector Machines Regularization Optimization and Beyond
– ident: ref15
  doi: 10.1109/MWC.2010.5601956
– ident: ref36
  doi: 10.1016/j.jpdc.2013.02.001
– ident: ref53
  doi: 10.1109/GLOCOM.2016.7841878
– start-page: 1
  year: 2016
  ident: ref52
  article-title: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology
  publication-title: IEEE Trans Intell Transp Syst
– ident: ref28
  doi: 10.1109/MNET.2006.1637931
– ident: ref26
  doi: 10.1109/MWC.2007.4396938
– ident: ref47
  doi: 10.1109/DSN.2005.58
– volume: 10
  start-page: 559
  year: 2010
  ident: ref46
  article-title: A lightweight intrusion detection framework for wireless sensor networks
  publication-title: Wireless Commun Mobile Comput
  doi: 10.1002/wcm.785
– start-page: 1
  year: 2005
  ident: ref16
  article-title: Traffic performance evaluation of data links in TETRA and TETRAPOL
  publication-title: Proc 11th Eur Wireless Conf Next Gener Wireless Mobile Commun Services
– ident: ref48
  doi: 10.1109/TR.2013.2240891
– ident: ref22
  doi: 10.1145/2382196.2382245
– ident: ref37
  doi: 10.1016/j.jnca.2011.03.028
– ident: ref13
  doi: 10.1109/INFCOMW.2011.5928811
– ident: ref25
  doi: 10.1016/j.comnet.2007.11.015
– year: 2016
  ident: ref43
– ident: ref29
  doi: 10.1109/MWC.2010.5601956
SSID ssj0001286306
Score 2.482119
Snippet Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such...
SourceID hal
proquest
crossref
ieee
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1594
SubjectTerms Ad hoc networks
Anomaly detection and rules-based intrusion detection techniques
Computer Science
Cryptography and Security
cyber-attacks
Cybersecurity
Denial of service attacks
Ground stations
Information dissemination
Intrusion detection
intrusion detection system (IDS)
Intrusion detection systems
Jamming
Mobile communication
Mobile computing
Monitoring
Networking and Internet Architecture
Networks
Spoofing
Unmanned aerial vehicles
unmanned aerial vehicles (UAVs)
Title A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
URI https://ieeexplore.ieee.org/document/7890467
https://www.proquest.com/docview/2117131972
https://ube.hal.science/hal-01557953
Volume 48
WOSCitedRecordID wos000442360400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 2168-2232
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001286306
  issn: 2168-2216
  databaseCode: RIE
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS-NAEB9suQd98D5UrFePRXySiybNZj8eQ1X60Cvix-FbyH5UC5pKG4X7729mE4uHx8G9LCHswmZ_O5mZ3ZnfABwKVCFlzH3EbYmNFjxSNnORmFrFS4kqyATK_LGcTNTtrb5Yg--rXBjvfQg-88f0GO7y3dw-01HZCSVtomB3oCOlbHK13pynKJGGUpqDRCD42LaXmEmsT66vfgwpjkseD4RKhFZ_qKHOPQVBhuoq737JQc-cf_y_GX6CzdaeZHmzAT7Dmq--wMYblsEteMzZaEZ5xqHsyQM79XWIv6pYWTl22QTJetZwl7N6zs6qe9oL7Kqtbcfyu3KGZiQb-xq_gQ1_Gb-I8rqm_Hw2q9hN_pNNmnjy5TbcnJ9dD0dRW2UhsjwVdcT9NC4H0muTllwaYqhTRtpp5lCUHdEvc8rejRE5lHZEUymnnYtdYgQXmUl3oFvNK78LDL23xDqujfGaI0SqNGg9GE6sXpm2sgfx66IXtqUgp0oYD0VwRWJdEE4F4VS0OPXgaDXkqeHf-FfnA1yFVT9izh7l44LekWkodZa-JD3YItxWvVrIetB_Bb5oxXhZoHeMTjxVZtv7-6ivsI4TUE3QWR-69eLZ78MH-1LPlotvYYf-Bry54GU
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB_aKqgP9aOKp1UX8UlMm1w2-_EYri0npofYq_RtyX6cPag5uUsL_vfObNKjYin4soSwC5v97WRmdmd-A_BBoAqpUx4S7mpstOCJcoVPxMwpXktUQTZS5ldyMlFnZ_rrBnxa58KEEGLwWdijx3iX7xfuko7K9ilpEwV7E-4VnA-zLlvrxomKEnkspjnMBMKPbX-NmaV6f3pyPKJILrk3FCoTWv2liDbPKQwy1lf556ccNc3R4_-b4xPY7i1KVnZb4ClshOYZPLrBM7gDP0s2nlOmcSx8csEOQhsjsBpWN55968JkA-vYy1m7YIfNOe0GdtJXt2Plj3qOhiSrQovfwEa_bVgmZdtShj6bN-y0_M4mXUT56jmcHh1OR-Okr7OQOJ6LNuFhltZDGbTNay4tcdQpK92s8CjMngiYOeXvpogdyjviqZTX3qc-s4KLwuYvYKtZNOElMPTfMue5tjZoLqVUtUX7wXLi9Sq0kwNIrxfduJ6EnGphXJjojKTaEE6GcDI9TgP4uB7yq2PguKvze1yFdT_izh6XlaF3ZBxKXeRX2QB2CLd1rx6yAexeA296QV4Z9I_RjafabK9uH_UOHoynx5WpPk--vIaHOBnVhaDtwla7vAxv4L67auer5du4W_8AkKPjrA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Hierarchical+Detection+and+Response+System+to+Enhance+Security+Against+Lethal+Cyber-Attacks+in+UAV+Networks&rft.jtitle=IEEE+transactions+on+systems%2C+man%2C+and+cybernetics.+Systems&rft.au=Sedjelmaci%2C+Hichem&rft.au=Senouci%2C+Sidi+Mohammed&rft.au=Ansari%2C+Nirwan&rft.date=2018-09-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=2168-2216&rft.eissn=2168-2232&rft.volume=48&rft.issue=9&rft.spage=1594&rft.epage=1606&rft_id=info:doi/10.1109%2FTSMC.2017.2681698&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai%3AHAL%3Ahal-01557953v1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2216&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2216&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2216&client=summon