Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
313
result(s) for
"spoofing attack"
Sort by:
Frequency-shifted FMCW method against DRFM spoofing attacks
by
Demir, Şimşek
,
Koç, Sencer
,
Suna Yazar, Gonca
in
Analysis
,
Beat frequencies
,
Continuous radiation
2025
This paper presents a new electronic counter-countermeasure (ECCM) method for frequency modulated continuous wave (FMCW) radars, designed to improve upon existing techniques. This method effectively counters deception attacks based on digital radio frequency memory (DRFM), in which an attacker repeats transmitted radar signals to create false targets. The core principle of the proposed ECCM method involves dividing a linear FMCW (LFMCW) chirp into sub-intervals, applying frequency shifts to each sub-interval before transmission. At the receiver, the incoming signal is dechirped with the original LFMCW, followed by a frequency shift for each sub-interval to recover the correct beat frequency. These frequency shifts are implemented entirely in the analog domain using voltage-controlled oscillators (VCOs). Simulation results across three scenarios with varying range and speed parameters show that the method maintains phase continuity in the beat signal, offering an advantage over similar ECCM techniques. Additionally, the analog implementation provides a low-complexity, cost-effective solution.
Journal Article
FFL-IDS: A Fog-Enabled Federated Learning-Based Intrusion Detection System to Counter Jamming and Spoofing Attacks for the Industrial Internet of Things
by
Rehman, Shafqat Ur
,
Tariq, Noshina
,
Rehman, Tayyab
in
Artificial intelligence
,
Collaboration
,
Comparative analysis
2025
The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure. Developing a robust Intrusion Detection System (IDS) addresses the challenges and vulnerabilities present in these systems. Traditional IDS methods have achieved high detection accuracy but need improved scalability and privacy issues from large datasets. This paper proposes a Fog-enabled Federated Learning-based Intrusion Detection System (FFL-IDS) utilizing Convolutional Neural Network (CNN) that mitigates these limitations. This framework allows multiple parties in IIoT networks to train deep learning models with data privacy preserved and low-latency detection ensured using fog computing. The proposed FFL-IDS is validated on two datasets, namely the Edge-IIoTset, explicitly tailored to environments with IIoT, and CIC-IDS2017, comprising various network scenarios. On the Edge-IIoTset dataset, it achieved 93.4% accuracy, 91.6% recall, 88% precision, 87% F1 score, and 87% specificity for jamming and spoofing attacks. The system showed better robustness on the CIC-IDS2017 dataset, achieving 95.8% accuracy, 94.9% precision, 94% recall, 93% F1 score, and 93% specificity. These results establish the proposed framework as a scalable, privacy-preserving, high-performance solution for securing IIoT networks against sophisticated cyber threats across diverse environments.
Journal Article
A Survey on Consensus Protocols and Attacks on Blockchain Technology
by
Mohanta, Bhabendu Kumar
,
Al-Turjman, Fadi
,
Altrjman, Chadi
in
Algorithms
,
ARP spoofing attack
,
Blockchain
2023
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the latest published article from IEEE, Springer, Elsevier, ACM, Willy, Hindawi, and other publishers. We incorporate various methods involved in blockchain. Our main intention is to gain clarity from earlier published articles to elaborate numerous key methods in terms of a survey article.
Journal Article
Pilot spoofing attack detection and channel estimation for secure massive MIMO
by
Wang, Wei
,
Huang, Yang
,
Liu, Delong
in
channel estimation
,
massive multiple‐input multiple‐output (MIMO)
,
pilot spoofing attack
2024
Pilot spoofing attack (PSA) is an active eavesdropping attack in massive multiple‐input multiple‐output systems, where the eavesdroppers transmit the same pilot sequence as the legitimate user does to the base station to confuse the normal channel estimation during the uplink channel training phase. With the contaminated channel estimations, more information will be leaked to eavesdroppers in the downlink transmission phase. However, it is a challenging issue to detect the PSA attack due to the similarity of the received signals and the variations of the wireless channels. Here, a new PSA detection scheme by using the difference of two different estimators is presented, that is, the least square estimator and the minimum mean square error estimator, without requiring any priori of eavesdroppers. Following that, a new data‐aided channel estimation scheme is proposed to eliminate the PSA effect. Simulation results demonstrate that the proposed PSA detection scheme outperforms the conventional energy detector, and more accurate legitimate channel estimation and higher sum secrecy rates can be obtained with the proposed scheme. We present a pilot spoofing attack detection scheme by using the difference of two different estimators, that is, the least square estimator and the minimum mean square error estimator, without requiring any priori of eavesdroppers. In addition, we propose a data‐aided channel estimation scheme to eliminate the PSA effect.
Journal Article
PerDet: Machine-Learning-Based UAV GPS Spoofing Detection Using Perception Data
2022
To ensure that unmanned aerial vehicle (UAV) positioning is not affected by GPS spoofing signals, we propose PerDet, a perception-data-based UAV GPS spoofing detection approach utilizing machine learning algorithms. Based on the principle of the position estimation process and attitude estimation process, we choose the data gathered by the accelerometer, gyroscope, magnetometer, GPS and barometer as features. Although these sensors have different shortcomings, their variety makes sure that the selected perception data can compensate for each other. We collect the experimental data through real flights, which make PerDet more practical. Furthermore, we run various machine learning algorithms on our dataset and select the most effective classifier as the detector. Through the performance evaluation and comparison, we demonstrate that PerDet is better than existing methods and is an effective method with a detecting rate of 99.69%. For a fair comparison, we reproduce the existing method and run it on our dataset to compare the performance between this method and our PerDet approach.
Journal Article
Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey
2023
Due to the openness of communication network and the complexity of system structures, multi-agent systems are vulnerable to malicious network attacks, which can cause intense instability to these systems. This article provides a survey of state-of-the-art results of network attacks on multi-agent systems. Recent advances on three types of attacks, i.e., those on DoS attacks, spoofing attacks and Byzantine attacks, the three main network attacks, are reviewed. Their attack mechanisms are introduced, and the attack model and the resilient consensus control structure are discussed, respectively, in detail, in terms of the theoretical innovation, the critical limitations and the change of the application. Moreover, some of the existing results along this line are given in a tutorial-like fashion. In the end, some challenges and open issues are indicated to guide future development directions of the resilient consensus of multi-agent system under network attacks.
Journal Article
ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs
2022
UAVs are widely used in agriculture, the military, and industry. However, it is easy to perform GPS spoofing attacks on UAVs, which can lead to catastrophic consequences. In this paper, we propose ConstDet, a control semantics-based detection approach for GPS spoofing attacks of UAVs using machine learning algorithms. Various real experiments are conducted to collect real flight data, on the basis of which ConstDet is designed as a practical detection framework. To train models for the detection of GPS spoofing attacks, specified flight data types are selected as features based on the control semantics, including the altitude control process and the horizontal position control process, since these data are able to represent the dynamic flight and control processes. Multiple machine learning algorithms are used to train and generate the best classifier for GPS spoofing attacks. ConstDet is further implemented and deployed on a real UAV to support onboard detection. Experiments and evaluations validate that ConstDet can effectively detect GPS spoofing attacks and the detection rate can reach 97.70%. The experimental comparison demonstrates that ConstDet has better performance than existing detection approaches.
Journal Article
Detection of Spoofing Attack using Machine Learning based on Multi-Layer Neural Network in Single-Frequency GPS Receivers
2018
The importance of the Global Positioning System (GPS) and related electronic systems continues to increase in a range of environmental, engineering and navigation applications. However, civilian GPS signals are vulnerable to Radio Frequency (RF) interference. Spoofing is an intentional intervention that aims to force a GPS receiver to acquire and track invalid navigation data. Analysis of spoofing and authentic signal patterns represents the differences as phase, energy and imaginary components of the signal. In this paper, early-late phase, delta, and signal level as the three main features are extracted from the correlation output of the tracking loop. Using these features, spoofing detection can be performed by exploiting conventional machine learning algorithms such as K-Nearest Neighbourhood (KNN) and naive Bayesian classifier. A Neural Network (NN) as a learning machine is a modern computational method for collecting the required knowledge and predicting the output values in complicated systems. This paper presents a new approach for GPS spoofing detection based on multi-layer NN whose inputs are indices of features. Simulation results on a software GPS receiver showed adequate detection accuracy was obtained from NN with a short detection time.
Journal Article
Sensor Spoofing Detection On Autonomous Vehicle Using Channel-spatial-temporal Attention Based Autoencoder Network
2024
Autonomous vehicles heavily rely on various sensors to evaluate their surroundings and issue essential control commands. Nonetheless, these sensors are susceptible to false data injection and spoofing attacks, posing a significant security threat. In response, this paper proposes a channel-spatial-temporal attention-based autoencoder network to detect sensor spoofing attacks on autonomous vehicles. The innovative network utilizes the reconstruction error based on the autoencoder to detect abnormalities in input time series data collected from multiple sensors. The proposed model consists of a memory-augmented based spatial-attention block and PSE-Res2Net block-based encoder and decoder. PSE-Res2Net block initially adopts Res2Net module to generate a multi-scale feature graph and enhance multi-dimensional representation ability of neural network, then applies the PSENet module to capture location-aware channel information and channel-sensitive spatial information through the interaction of channel attention and spatial attention. Moreover, the memory-augmented based temporal-attention block is developed to integrate multi-scale features and aggregate global sequence information of sensor measurements. Experimental evaluations conducted on the comma2k19, KITTI, and CCSAD datasets illustrate the superiority of the proposed detection model over baseline technologies. It exhibits enhanced performance in terms of mPre, mRe, mF1 score, and showcases heightened resilience against noise and attacks.
Journal Article
GPS Spoofing Detection Method for Small UAVs Using 1D Convolution Neural Network
2022
The navigation of small unmanned aerial vehicles (UAVs), such as quadcopters, significantly relies on the global positioning system (GPS); however, UAVs are vulnerable to GPS spoofing attacks. GPS spoofing is an attempt to manipulate a GPS receiver by broadcasting manipulated signals. A commercial GPS simulator can cause a GPS-guided drone to deviate from its intended course by transmitting counterfeit GPS signals. Therefore, an anti-spoofing technique is essential to ensure the operational safety of UAVs. Various methods have been introduced to detect GPS spoofing; however, most methods require additional hardware. This may not be appropriate for small UAVs with limited capacity. This study proposes a deep learning-based anti-spoofing method equipped with 1D convolutional neural network. The proposed method is lightweight and power-efficient, enabling real-time detection on mobile platforms. Furthermore, the performance of our approach can be enhanced by increasing training data and adjusting the network architecture. We evaluated our algorithm on the embedded board of a drone in terms of power consumption and inference time. Compared to the support vector machine, the proposed method showed better performance in terms of precision, recall, and F-1 score. Flight test demonstrated our algorithm could successfully detect GPS spoofing attacks.
Journal Article