Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology

Advances in wireless communications and microelectronics have spearheaded the development of unmanned aerial vehicles (UAVs), which can be used to augment a ground network composed of sensors and/or vehicles in order to increase coverage, enhance the end-to-end delay, and improve data processing. While UAV-aided networks can potentially find applications in many areas, a number of issues, particularly security, have not been readily addressed. The intrusion detection system is the most commonly used technique to detect attackers. In this paper, we focus on addressing two main issues within the context of intrusion detection and attacker ejection in UAV-aided networks, namely, activation of the intrusion monitoring process and attacker ejection. In fact, when a large number of nodes activate their monitoring processes, the incurred overhead can be substantial and, as a consequence, degrades the network performance. Therefore, a tradeoff between the intrusion detection rate and overhead is considered in this work. It is not always the best strategy to eject a node immediately when it exhibits a bad sign of malicious activities since this sign could be provisional (the node may switch to a normal behavior in the future) or be simply due to noise or unreliable communications. Thus, a dilemma between detection and false positive rates is taken into account in this paper. We propose to address these two security issues by a Bayesian game model in order to accurately detect attacks (i.e., high detection and low false positive rates) with a low overhead. Simulation results have demonstrated that our proposed security game framework does achieve reliable detection.

[1]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[2]  Sidi-Mohammed Senouci,et al.  Network connectivity and area coverage for UAV fleet mobility model with energy constraint , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[3]  G. Holland,et al.  Applications of Aerosondes in the Arctic , 2004 .

[4]  Christian Bettstetter,et al.  Channel measurements over 802.11a-based UAV-to-ground links , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[5]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[6]  Hamid Jafarkhani,et al.  UAV-aided cross-layer routing for MANETs , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[7]  Evsen Yanmaz Connectivity versus area coverage in unmanned aerial vehicle networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[8]  Ing-Ray Chen,et al.  Specification based intrusion detection for unmanned aircraft systems , 2012, Airborne '12.

[9]  Sidi-Mohammed Senouci,et al.  Detection and prevention from misbehaving intruders in vehicular networks , 2014, 2014 IEEE Global Communications Conference.

[10]  Sherali Zeadally,et al.  Sustainable Transportation Management System for a Fleet of Electric Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[11]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  Ryu Miura,et al.  Toward Fair Maximization of Energy Efficiency in Multiple UAS-Aided Networks: A Game-Theoretic Methodology , 2015, IEEE Transactions on Wireless Communications.

[13]  Ouns Bouachir,et al.  A mobility model for UAV ad hoc network , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).

[14]  Zhu Han,et al.  Optimization of MANET connectivity via smart deployment/movement of unmanned air vehicles , 2009, IEEE Transactions on Vehicular Technology.

[15]  Xiang Cheng,et al.  D2D for Intelligent Transportation Systems: A Feasibility Study , 2015, IEEE Transactions on Intelligent Transportation Systems.

[16]  Bernhard Rinner,et al.  On path planning strategies for networked unmanned aerial vehicles , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[17]  Nirwan Ansari,et al.  Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.

[18]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[19]  Sidi-Mohammed Senouci,et al.  An efficient intrusion detection framework in cluster-based wireless sensor networks , 2013, Secur. Commun. Networks.

[20]  Kalyanmoy Deb,et al.  Multiple Criteria Decision Making, Multiattribute Utility Theory: Recent Accomplishments and What Lies Ahead , 2008, Manag. Sci..

[21]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[22]  Vashek Matyas,et al.  Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[23]  Sally McClean,et al.  Maintaining connectivity in UAV swarm sensing , 2010, 2010 IEEE Globecom Workshops.

[24]  Ryu Miura,et al.  An optimal data collection technique for improved utility in UAS-aided networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[25]  Prabir Bhattacharya,et al.  A Moderate to Robust Game Theoretical Model for Intrusion Detection in MANETs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[26]  Xiang Cheng,et al.  Envelope Level Crossing Rate and Average Fade Duration of Nonisotropic Vehicle-to-Vehicle Ricean Fading Channels , 2014, IEEE Transactions on Intelligent Transportation Systems.

[27]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[28]  Azzedine Boukerche,et al.  A joint 3D localization and synchronization solution for Wireless Sensor Networks using UAV , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[29]  Naveen K. Chilamkurti,et al.  Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment , 2016, IEEE Transactions on Dependable and Secure Computing.

[30]  Zhu Han,et al.  Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.

[31]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.