A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and...
Saved in:
| Published in: | IEEE transactions on systems, man, and cybernetics. Systems Vol. 48; no. 9; pp. 1594 - 1606 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York
IEEE
01.09.2018
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Subjects: | |
| ISSN: | 2168-2216, 2168-2232 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the most lethal cyber-attacks that can target an UAV network, namely, false information dissemination, GPS spoofing, jamming, and black hole and gray hole attacks. Extensive simulations confirm that the proposed scheme performs well in terms of attack detection even with a large number of UAVs and attackers since it exhibits a high detection rate, a low number of false positives, and prompt detection with a low communication overhead. |
|---|---|
| AbstractList | Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the most lethal cyber-attacks that can target an UAV network, namely, false information dissemination, GPS spoofing, jamming, and black hole and gray hole attacks. Extensive simulations confirm that the proposed scheme performs well in terms of attack detection even with a large number of UAVs and attackers since it exhibits a high detection rate, a low number of false positives, and prompt detection with a low communication overhead. |
| Author | Sedjelmaci, Hichem Senouci, Sidi Mohammed Ansari, Nirwan |
| Author_xml | – sequence: 1 givenname: Hichem surname: Sedjelmaci fullname: Sedjelmaci, Hichem email: sid-ahmed-hichem.sedjelmaci@u-bourgogne.fr organization: DRIVE Lab., Univ. of Burgundy, Nevers, France – sequence: 2 givenname: Sidi Mohammed surname: Senouci fullname: Senouci, Sidi Mohammed organization: DRIVE Lab., Univ. of Burgundy, Nevers, France – sequence: 3 givenname: Nirwan surname: Ansari fullname: Ansari, Nirwan email: nirwan.ansari@njit.edu organization: New Jersey Inst. of Technol., Newark, NJ, USA |
| BackLink | https://ube.hal.science/hal-01557953$$DView record in HAL |
| BookMark | eNp9UU1PGzEQtSoqlVJ-AOrFEqceNvhj1x_HVUoJUigSX1fL6500hsQOtlOUf8-ugnLooacZjd5782beV3QUYgCEziiZUEr0xcP9zXTCCJUTJhQVWn1Cx4wKVTHG2dGhp-ILOs35mRBCmRKciGO0bvHMQ7LJLb2zK_wTCrjiY8A29PgO8iaGDPh-lwuscYn4MixtcMME3Db5ssPtH-tDLngOZTkITHcdpKotxbqXjH3Aj-0T_g3lLaaX_A19XthVhtOPeoIef10-TGfV_PbqetrOK1dzUaoaFsQyCbrjtpadkoKrTrpF0ytJet53sta80aS2ktSq1kKpXvc96WknatF0_AT92OsOjswm-bVNOxOtN7N2bsYZoU0jdcP_0gF7vsduUnzdQi7mOW5TGOwZRqmknGrJBhTdo1yKOSdYHGQpMWMIZgzBjCGYjxAGjvyH43yx43NLsn71X-b3PdMDwGGTVMPJQvJ35RaUmA |
| CODEN | ITSMFE |
| CitedBy_id | crossref_primary_10_1109_TSMC_2019_2911548 crossref_primary_10_1007_s11227_023_05811_1 crossref_primary_10_1016_j_ast_2021_107212 crossref_primary_10_1016_j_comcom_2020_07_042 crossref_primary_10_1049_itr2_12579 crossref_primary_10_1016_j_seta_2022_102686 crossref_primary_10_1007_s10586_025_05461_3 crossref_primary_10_1016_j_adhoc_2019_101970 crossref_primary_10_1002_dac_4926 crossref_primary_10_1002_int_22392 crossref_primary_10_1109_JIOT_2024_3426511 crossref_primary_10_1109_TSMC_2021_3130748 crossref_primary_10_1016_j_adhoc_2024_103407 crossref_primary_10_1016_j_comcom_2020_08_016 crossref_primary_10_1109_ACCESS_2023_3253481 crossref_primary_10_32604_cmc_2022_020774 crossref_primary_10_3390_s21062208 crossref_primary_10_1016_j_comcom_2020_01_023 crossref_primary_10_1016_j_sysarc_2024_103282 crossref_primary_10_1109_ACCESS_2024_3419800 crossref_primary_10_1109_JMASS_2024_3490762 crossref_primary_10_3390_math13132130 crossref_primary_10_1002_ett_3520 crossref_primary_10_1016_j_procs_2021_04_014 crossref_primary_10_1016_j_cose_2024_103878 crossref_primary_10_1109_TITS_2020_3019246 crossref_primary_10_1109_OJCOMS_2025_3528220 crossref_primary_10_1109_COMST_2021_3097916 crossref_primary_10_1109_TSMC_2019_2952539 crossref_primary_10_1109_JBHI_2022_3187037 crossref_primary_10_1109_JSYST_2022_3163139 crossref_primary_10_1088_1742_6596_2637_1_012001 crossref_primary_10_32604_cmc_2023_037257 crossref_primary_10_1109_COMST_2019_2933899 crossref_primary_10_1016_j_comnet_2020_107592 crossref_primary_10_1109_COMST_2018_2873088 crossref_primary_10_1016_j_iot_2023_100883 crossref_primary_10_3390_electronics9010062 crossref_primary_10_1007_s11042_025_20867_2 crossref_primary_10_1109_TETC_2018_2890476 crossref_primary_10_1109_MNET_008_2100472 crossref_primary_10_1002_dac_5237 crossref_primary_10_1109_JIOT_2023_3299554 crossref_primary_10_1109_JIOT_2024_3426054 crossref_primary_10_1145_3448254 crossref_primary_10_1049_iet_com_2020_0073 crossref_primary_10_1016_j_adhoc_2022_102894 crossref_primary_10_1016_j_jii_2021_100239 crossref_primary_10_1145_3673225 crossref_primary_10_1109_TMC_2024_3367124 crossref_primary_10_1038_s41598_024_57480_6 crossref_primary_10_1109_JIOT_2023_3333870 crossref_primary_10_1002_ett_4133 crossref_primary_10_1002_cpe_8206 crossref_primary_10_1016_j_jnca_2020_102706 crossref_primary_10_1016_j_cosrev_2023_100551 crossref_primary_10_1109_ACCESS_2019_2931539 crossref_primary_10_1016_j_comcom_2020_05_025 crossref_primary_10_1145_3701233 crossref_primary_10_3390_designs9030061 crossref_primary_10_1016_j_jisa_2021_102940 crossref_primary_10_1109_ACCESS_2021_3066778 crossref_primary_10_1371_journal_pone_0282567 crossref_primary_10_1002_rnc_7052 crossref_primary_10_1109_JIOT_2024_3360231 crossref_primary_10_1016_j_vehcom_2022_100552 crossref_primary_10_1007_s12652_022_04362_2 crossref_primary_10_1109_JIOT_2025_3545389 crossref_primary_10_1109_TAI_2024_3351095 crossref_primary_10_1016_j_procs_2024_08_068 crossref_primary_10_1109_ACCESS_2021_3124996 crossref_primary_10_1109_JIOT_2020_3020819 crossref_primary_10_1109_ACCESS_2021_3072030 crossref_primary_10_3390_electronics12061299 crossref_primary_10_1016_j_egyr_2022_07_115 crossref_primary_10_1016_j_jnca_2023_103607 crossref_primary_10_3390_drones6110340 crossref_primary_10_1016_j_cose_2024_104073 crossref_primary_10_1016_j_phycom_2020_101109 crossref_primary_10_1109_ACCESS_2024_3361945 crossref_primary_10_1007_s10922_023_09781_w crossref_primary_10_1016_j_ress_2019_106675 crossref_primary_10_1109_ACCESS_2019_2962873 crossref_primary_10_1016_j_cose_2024_104248 crossref_primary_10_1016_j_iot_2020_100218 crossref_primary_10_1109_COMST_2021_3131332 crossref_primary_10_1109_TNSM_2020_3007535 crossref_primary_10_1016_j_compeleceng_2023_108757 crossref_primary_10_1016_j_sigpro_2020_107724 crossref_primary_10_1109_ACCESS_2019_2917135 crossref_primary_10_1109_JIOT_2022_3230786 crossref_primary_10_1109_TVT_2023_3337154 crossref_primary_10_1016_j_ress_2021_108246 crossref_primary_10_7717_peerj_cs_2714 crossref_primary_10_1007_s00521_024_10306_y crossref_primary_10_1016_j_adhoc_2024_103610 crossref_primary_10_1016_j_sysarc_2019_101694 crossref_primary_10_1016_j_csi_2024_103844 crossref_primary_10_1016_j_adhoc_2022_102805 crossref_primary_10_1109_JIOT_2023_3263360 crossref_primary_10_1016_j_tra_2021_04_022 crossref_primary_10_1109_ACCESS_2021_3089847 crossref_primary_10_1109_TETC_2021_3104555 crossref_primary_10_1016_j_comnet_2023_110140 crossref_primary_10_1016_j_vehcom_2023_100661 crossref_primary_10_3390_electronics8121468 crossref_primary_10_1109_MCOMSTD_0001_2000078 crossref_primary_10_3390_drones6010008 crossref_primary_10_1007_s11227_020_03462_0 crossref_primary_10_1109_TITS_2020_3023189 crossref_primary_10_1002_ett_3987 crossref_primary_10_1109_ACCESS_2019_2924410 crossref_primary_10_1109_ACCESS_2025_3561068 crossref_primary_10_1186_s13638_019_1616_9 crossref_primary_10_3390_drones5020042 crossref_primary_10_1109_MNET_011_2000245 crossref_primary_10_1016_j_amc_2022_127762 crossref_primary_10_1109_TITS_2020_3015862 crossref_primary_10_1109_JIOT_2024_3429111 crossref_primary_10_1109_JIOT_2021_3113321 crossref_primary_10_1109_TNSM_2024_3448312 crossref_primary_10_1145_3485272 crossref_primary_10_1007_s00521_022_07015_9 crossref_primary_10_3390_s19081875 crossref_primary_10_1049_cmu2_12833 crossref_primary_10_1109_TSMC_2022_3220080 crossref_primary_10_1016_j_paerosci_2023_100949 crossref_primary_10_1155_2021_6653883 crossref_primary_10_1007_s11277_024_11503_7 crossref_primary_10_1038_s41597_025_05560_1 crossref_primary_10_1109_TDSC_2021_3127630 crossref_primary_10_1109_TMLCN_2025_3564912 |
| Cites_doi | 10.1109/TSMC.2015.2415763 10.1109/MCOM.2005.1453433 10.1109/GSIS.2007.4443446 10.1109/TSMC.2015.2503399 10.1145/1029102.1029115 10.1109/ICUAS.2014.6842277 10.1109/GIIS.2013.6684378 10.1109/TSMC.2013.2265083 10.1109/MILCOM.2012.6415722 10.1109/COMST.2014.2365951 10.1109/JSAC.2007.071005 10.1109/GLOCOM.2014.7036781 10.1109/JIOT.2014.2366120 10.1016/S1570-8705(03)00038-6 10.1109/THS.2013.6699094 10.1002/wcm.1171 10.1109/ICC.2014.6883374 10.1109/SURV.2013.052213.00046 10.1109/TVT.2009.2015953 10.1109/VETECF.2011.6093096 10.1002/sec.687 10.1016/j.comnet.2013.02.019 10.1109/INFCOM.2010.5462161 10.1145/345910.345953 10.1109/JSAC.2007.071006 10.1109/TPDS.2004.85 10.1109/TCYB.2015.2490802 10.1002/ett.1432 10.2514/6.2012-2438 10.1002/navi.44 10.1109/GLOCOMW.2011.6162389 10.1109/MWC.2010.5601956 10.1016/j.jpdc.2013.02.001 10.1109/GLOCOM.2016.7841878 10.1109/MNET.2006.1637931 10.1109/MWC.2007.4396938 10.1109/DSN.2005.58 10.1002/wcm.785 10.1109/TR.2013.2240891 10.1145/2382196.2382245 10.1016/j.jnca.2011.03.028 10.1109/INFCOMW.2011.5928811 10.1016/j.comnet.2007.11.015 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 Attribution - NonCommercial |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2018 – notice: Attribution - NonCommercial |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 H8D JQ2 L7M L~C L~D 1XC VOOES |
| DOI | 10.1109/TSMC.2017.2681698 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Aerospace Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) |
| DatabaseTitle | CrossRef Aerospace Database Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Aerospace Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 2168-2232 |
| EndPage | 1606 |
| ExternalDocumentID | oai:HAL:hal-01557953v1 10_1109_TSMC_2017_2681698 7890467 |
| Genre | orig-research |
| GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS ACIWK AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL PQQKQ RIA RIE RNS AAYXX CITATION 7SC 7SP 7TB 8FD FR3 H8D JQ2 L7M L~C L~D 1XC VOOES |
| ID | FETCH-LOGICAL-c436t-4ef0a27e9b3a47b87638b7cf5d870d3db74935904a704849688d9dd0d1b6465b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 163 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000442360400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2168-2216 |
| IngestDate | Tue Oct 14 20:20:44 EDT 2025 Sun Nov 09 06:31:07 EST 2025 Sat Nov 29 03:45:28 EST 2025 Tue Nov 18 22:26:32 EST 2025 Wed Aug 27 06:01:04 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 9 |
| Keywords | intrusion detection system cyber-attacks Anomaly detection and rules-based intrusion detection techniques Intrusion detection Mobile communication IDS Unmanned aerial vehicles Ad hoc networks UAV Monitoring |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html Attribution - NonCommercial: http://creativecommons.org/licenses/by-nc |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c436t-4ef0a27e9b3a47b87638b7cf5d870d3db74935904a704849688d9dd0d1b6465b3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-8541-3565 0000-0001-5854-1852 0000-0001-8525-9596 |
| OpenAccessLink | https://ube.hal.science/hal-01557953 |
| PQID | 2117131972 |
| PQPubID | 75739 |
| PageCount | 13 |
| ParticipantIDs | crossref_primary_10_1109_TSMC_2017_2681698 hal_primary_oai_HAL_hal_01557953v1 ieee_primary_7890467 crossref_citationtrail_10_1109_TSMC_2017_2681698 proquest_journals_2117131972 |
| PublicationCentury | 2000 |
| PublicationDate | 2018-09-01 |
| PublicationDateYYYYMMDD | 2018-09-01 |
| PublicationDate_xml | – month: 09 year: 2018 text: 2018-09-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on systems, man, and cybernetics. Systems |
| PublicationTitleAbbrev | TSMC |
| PublicationYear | 2018 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Institute of Electrical and Electronics Engineers |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) – name: Institute of Electrical and Electronics Engineers |
| References | ref13 ref12 ref15 ref14 ref53 ref17 mitrokotsa (ref8) 2008 ref19 ref18 sedjelmaci (ref52) 2016 ref51 ref50 ref45 ref48 ref47 ref42 ref41 ref44 hai (ref46) 2010; 10 ref49 shepard (ref21) 2011 ref7 ref9 ref4 ref3 ref6 ref5 ref40 ref35 wen (ref31) 2005 ref34 ref37 ref36 ref30 ref33 ref32 ref2 ref1 ref38 (ref54) 2016 ref24 ref23 ref26 ref25 ref20 ref22 wesson (ref10) 0 (ref43) 2016 ref28 ref27 ref29 scholkopf (ref39) 2006 shepard (ref11) 2012 kuypers (ref16) 2005 |
| References_xml | – ident: ref51 doi: 10.1109/TSMC.2015.2415763 – ident: ref27 doi: 10.1109/MCOM.2005.1453433 – ident: ref6 doi: 10.1109/GSIS.2007.4443446 – year: 2016 ident: ref54 – ident: ref49 doi: 10.1109/TSMC.2015.2503399 – ident: ref41 doi: 10.1145/1029102.1029115 – ident: ref44 doi: 10.1109/ICUAS.2014.6842277 – ident: ref30 doi: 10.1109/GIIS.2013.6684378 – ident: ref12 doi: 10.1109/TSMC.2013.2265083 – ident: ref33 doi: 10.1109/MILCOM.2012.6415722 – ident: ref9 doi: 10.1109/COMST.2014.2365951 – start-page: 1 year: 2011 ident: ref21 article-title: Characterization of receiver response to spoofing attacks publication-title: Proc ION GNSS – start-page: 1 year: 2012 ident: ref11 article-title: Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks publication-title: Proc ION GNSS Meeting – ident: ref32 doi: 10.1109/JSAC.2007.071005 – start-page: 251 year: 2008 ident: ref8 article-title: Intrusion detection techniques in sensor networks publication-title: Wireless Sensor Network Security – ident: ref42 doi: 10.1109/GLOCOM.2014.7036781 – ident: ref35 doi: 10.1109/JIOT.2014.2366120 – ident: ref19 doi: 10.1016/S1570-8705(03)00038-6 – ident: ref23 doi: 10.1109/THS.2013.6699094 – ident: ref2 doi: 10.1002/wcm.1171 – ident: ref40 doi: 10.1109/ICC.2014.6883374 – ident: ref38 doi: 10.1109/SURV.2013.052213.00046 – ident: ref17 doi: 10.1109/TVT.2009.2015953 – ident: ref4 doi: 10.1109/VETECF.2011.6093096 – ident: ref5 doi: 10.1002/sec.687 – start-page: 1285 year: 2005 ident: ref31 article-title: Countermeasures for GPS signal spoofing publication-title: Proc 18th Int Tech Meeting Satellite Div Inst Navigat – year: 0 ident: ref10 publication-title: Can Cryptography Secure Next Generation Air Traffic Surveillance? – ident: ref20 doi: 10.1016/j.comnet.2013.02.019 – ident: ref14 doi: 10.1109/INFCOM.2010.5462161 – ident: ref18 doi: 10.1145/345910.345953 – ident: ref3 doi: 10.1109/JSAC.2007.071006 – ident: ref45 doi: 10.1109/TPDS.2004.85 – ident: ref50 doi: 10.1109/TCYB.2015.2490802 – ident: ref7 doi: 10.1002/ett.1432 – ident: ref24 doi: 10.2514/6.2012-2438 – ident: ref34 doi: 10.1002/navi.44 – ident: ref1 doi: 10.1109/GLOCOMW.2011.6162389 – year: 2006 ident: ref39 publication-title: Learning With Kernels Support Vector Machines Regularization Optimization and Beyond – ident: ref15 doi: 10.1109/MWC.2010.5601956 – ident: ref36 doi: 10.1016/j.jpdc.2013.02.001 – ident: ref53 doi: 10.1109/GLOCOM.2016.7841878 – start-page: 1 year: 2016 ident: ref52 article-title: Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A Bayesian game-theoretic methodology publication-title: IEEE Trans Intell Transp Syst – ident: ref28 doi: 10.1109/MNET.2006.1637931 – ident: ref26 doi: 10.1109/MWC.2007.4396938 – ident: ref47 doi: 10.1109/DSN.2005.58 – volume: 10 start-page: 559 year: 2010 ident: ref46 article-title: A lightweight intrusion detection framework for wireless sensor networks publication-title: Wireless Commun Mobile Comput doi: 10.1002/wcm.785 – start-page: 1 year: 2005 ident: ref16 article-title: Traffic performance evaluation of data links in TETRA and TETRAPOL publication-title: Proc 11th Eur Wireless Conf Next Gener Wireless Mobile Commun Services – ident: ref48 doi: 10.1109/TR.2013.2240891 – ident: ref22 doi: 10.1145/2382196.2382245 – ident: ref37 doi: 10.1016/j.jnca.2011.03.028 – ident: ref13 doi: 10.1109/INFCOMW.2011.5928811 – ident: ref25 doi: 10.1016/j.comnet.2007.11.015 – year: 2016 ident: ref43 – ident: ref29 doi: 10.1109/MWC.2010.5601956 |
| SSID | ssj0001286306 |
| Score | 2.482119 |
| Snippet | Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such... |
| SourceID | hal proquest crossref ieee |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1594 |
| SubjectTerms | Ad hoc networks Anomaly detection and rules-based intrusion detection techniques Computer Science Cryptography and Security cyber-attacks Cybersecurity Denial of service attacks Ground stations Information dissemination Intrusion detection intrusion detection system (IDS) Intrusion detection systems Jamming Mobile communication Mobile computing Monitoring Networking and Internet Architecture Networks Spoofing Unmanned aerial vehicles unmanned aerial vehicles (UAVs) |
| Title | A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks |
| URI | https://ieeexplore.ieee.org/document/7890467 https://www.proquest.com/docview/2117131972 https://ube.hal.science/hal-01557953 |
| Volume | 48 |
| WOSCitedRecordID | wos000442360400015&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 2168-2232 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001286306 issn: 2168-2216 databaseCode: RIE dateStart: 20130101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS-NAEB9suQd98D5UrFePRXySiybNZj8eQ1X60Cvix-FbyH5UC5pKG4X7729mE4uHx8G9LCHswmZ_O5mZ3ZnfABwKVCFlzH3EbYmNFjxSNnORmFrFS4kqyATK_LGcTNTtrb5Yg--rXBjvfQg-88f0GO7y3dw-01HZCSVtomB3oCOlbHK13pynKJGGUpqDRCD42LaXmEmsT66vfgwpjkseD4RKhFZ_qKHOPQVBhuoq737JQc-cf_y_GX6CzdaeZHmzAT7Dmq--wMYblsEteMzZaEZ5xqHsyQM79XWIv6pYWTl22QTJetZwl7N6zs6qe9oL7Kqtbcfyu3KGZiQb-xq_gQ1_Gb-I8rqm_Hw2q9hN_pNNmnjy5TbcnJ9dD0dRW2UhsjwVdcT9NC4H0muTllwaYqhTRtpp5lCUHdEvc8rejRE5lHZEUymnnYtdYgQXmUl3oFvNK78LDL23xDqujfGaI0SqNGg9GE6sXpm2sgfx66IXtqUgp0oYD0VwRWJdEE4F4VS0OPXgaDXkqeHf-FfnA1yFVT9izh7l44LekWkodZa-JD3YItxWvVrIetB_Bb5oxXhZoHeMTjxVZtv7-6ivsI4TUE3QWR-69eLZ78MH-1LPlotvYYf-Bry54GU |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB_aKqgP9aOKp1UX8UlMm1w2-_EYri0npofYq_RtyX6cPag5uUsL_vfObNKjYin4soSwC5v97WRmdmd-A_BBoAqpUx4S7mpstOCJcoVPxMwpXktUQTZS5ldyMlFnZ_rrBnxa58KEEGLwWdijx3iX7xfuko7K9ilpEwV7E-4VnA-zLlvrxomKEnkspjnMBMKPbX-NmaV6f3pyPKJILrk3FCoTWv2liDbPKQwy1lf556ccNc3R4_-b4xPY7i1KVnZb4ClshOYZPLrBM7gDP0s2nlOmcSx8csEOQhsjsBpWN55968JkA-vYy1m7YIfNOe0GdtJXt2Plj3qOhiSrQovfwEa_bVgmZdtShj6bN-y0_M4mXUT56jmcHh1OR-Okr7OQOJ6LNuFhltZDGbTNay4tcdQpK92s8CjMngiYOeXvpogdyjviqZTX3qc-s4KLwuYvYKtZNOElMPTfMue5tjZoLqVUtUX7wXLi9Sq0kwNIrxfduJ6EnGphXJjojKTaEE6GcDI9TgP4uB7yq2PguKvze1yFdT_izh6XlaF3ZBxKXeRX2QB2CLd1rx6yAexeA296QV4Z9I_RjafabK9uH_UOHoynx5WpPk--vIaHOBnVhaDtwla7vAxv4L67auer5du4W_8AkKPjrA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Hierarchical+Detection+and+Response+System+to+Enhance+Security+Against+Lethal+Cyber-Attacks+in+UAV+Networks&rft.jtitle=IEEE+transactions+on+systems%2C+man%2C+and+cybernetics.+Systems&rft.au=Sedjelmaci%2C+Hichem&rft.au=Senouci%2C+Sidi+Mohammed&rft.au=Ansari%2C+Nirwan&rft.date=2018-09-01&rft.pub=Institute+of+Electrical+and+Electronics+Engineers&rft.issn=2168-2216&rft.eissn=2168-2232&rft.volume=48&rft.issue=9&rft.spage=1594&rft.epage=1606&rft_id=info:doi/10.1109%2FTSMC.2017.2681698&rft.externalDBID=HAS_PDF_LINK&rft.externalDocID=oai%3AHAL%3Ahal-01557953v1 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2168-2216&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2168-2216&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2168-2216&client=summon |