Security Approaches in Machine Learning for Satellite Communication

The emerging technical approach Machine Learning (ML) is apprehensive with the design and growth of algorithms and techniques that allocate computers to “learn”. The major focus of ML research is to extract information from data automatically, by computational and statistical methods. It is thus closely related to data mining and statistics. The power of neural networks stems from their representation capability. In many applications including current discussion of security in satellite communication, feed forward networks are proved to offer the capability of universal function approximation. This chapter thrashes out in details and highlights on important technical issues during machine learning strategies in developing satellite communication systems.

[1]  Xu-Cheng Yin,et al.  Satellite super-resolution images depending on deep learning methods: A comparative study , 2017, 2017 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[2]  Binod Kumar Pattanayak,et al.  An Overview on Social Networking: Design, Issues, Emerging Trends, and Security , 2019, Social Network Analytics.

[3]  Mamata Rath,et al.  Big Data and IoT-Allied Challenges Associated With Healthcare Applications in Smart and Automated Systems , 2018, Int. J. Strateg. Inf. Technol. Appl..

[4]  Jeong Hyun Yi,et al.  Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.

[5]  Binod Kumar Pattanayak,et al.  Monitoring of QoS in MANET Based Real Time Applications , 2017 .

[6]  Binod Kumar Pattanayak,et al.  Energetic Routing Protocol Design for Real-time Transmission in Mobile Ad hoc Network , 2017 .

[7]  Randy Paffenroth,et al.  Multiobjective Reinforcement Learning for Cognitive Satellite Communications Using Deep Neural Network Ensembles , 2018, IEEE Journal on Selected Areas in Communications.

[8]  Tingting Liu,et al.  Fault Prediction for Satellite Communication Equipment Based on Deep Neural Network , 2018, 2018 International Conference on Virtual Reality and Intelligent Systems (ICVRIS).

[9]  Zhiguo Hong,et al.  SPN-based performance analysis of LEO Satellite Networks with multiple users , 2011, 2011 International Conference on Machine Learning and Cybernetics.

[10]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[11]  Erhan Guven,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.

[12]  Binod Kumar Pattanayak,et al.  Load balanced routing scheme for MANETs with power and delay optimisation , 2017, Int. J. Commun. Networks Distributed Syst..

[13]  Mamata Rath,et al.  Resource provision and QoS support with added security for client side applications in cloud computing , 2019 .

[14]  Tony Q. S. Quek,et al.  Transmit Antenna Selection in MIMO Wiretap Channels: A Machine Learning Approach , 2018, IEEE Wireless Communications Letters.

[15]  Shuning Wu,et al.  A user-centric machine learning framework for cyber security operations center , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[16]  Mamata Rath Delay and power based network assessment of network layer protocols in MANET , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[17]  Lior Bragilevsky,et al.  Deep learning for Amazon satellite image analysis , 2017, 2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).

[18]  Raja Datta,et al.  A Secure Addressing Scheme for Large-Scale Managed MANETs , 2015, IEEE Transactions on Network and Service Management.

[19]  H. Vincent Poor,et al.  Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.

[20]  Binod Kumar Pattanayak,et al.  Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications , 2016 .

[21]  Yusuf Sinan Akgül,et al.  Ship location estimation from radar and optic images using metric learning , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).

[22]  Susmita Sur-Kolay,et al.  Systematic Poisoning Attacks on and Defenses for Machine Learning in Healthcare , 2015, IEEE Journal of Biomedical and Health Informatics.

[23]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[24]  S. Prakash,et al.  An ACO look-ahead approach to QOS enabled fault- tolerant routing in MANETs , 2015, China Communications.

[25]  Mamata Rath,et al.  Prioritization of Security Measures at the Junction of MANET and IoT , 2016, ICTCS '16.

[26]  Yin Chen,et al.  On-Device Mobile Phone Security Exploits Machine Learning , 2017, IEEE Pervasive Computing.

[27]  Naveen K. Chilamkurti,et al.  Leveraging LSTM Networks for Attack Detection in Fog-to-Things Communications , 2018, IEEE Communications Magazine.

[28]  Mohammad S. Obaidat,et al.  FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.

[29]  Binod Kumar Pattanayak,et al.  MAQ: A Mobile Agent Based Quality of Service Platform for MANETs , 2017, Int. J. Bus. Data Commun. Netw..

[30]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[31]  Symeon Chatzinotas,et al.  Automatic Modulation Classification for adaptive Power Control in cognitive satellite communications , 2014, 2014 7th Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop (ASMS/SPSC).

[32]  Binod Kumar Pattanayak,et al.  SCICS: A Soft Computing Based Intelligent Communication System in VANET , 2017 .

[33]  Jue Wang,et al.  Machine Learning: The State of the Art , 2008, IEEE Intelligent Systems.

[34]  Mamata Rath,et al.  QTM: A QoS Task Monitoring System for Mobile Ad hoc Networks , 2019 .

[35]  Louise Lamont,et al.  Impact of trust-based security association and mobility on the delay metric in MANET , 2016, Journal of Communications and Networks.

[36]  Binod Kumar Pattanayak,et al.  Manifold Surveillance Issues in Wireless Network and the Secured Protocol , 2020, Int. J. Inf. Secur. Priv..

[37]  Hsiao-Hwa Chen,et al.  A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study , 2009, IEEE Transactions on Vehicular Technology.

[38]  Qing Guo,et al.  An Adaptive Routing Based on an Improved Ant Colony Optimization in Leo Satellite Networks , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[39]  M. R. Bhavani Shankar,et al.  Centralized Rainfall Estimation Using Carrier to Noise of Satellite Communication Links , 2018, IEEE Journal on Selected Areas in Communications.

[40]  Binod Kumar Pattanayak,et al.  Energy Competent Routing Protocol Design in MANET with Real Time Application Provision , 2015, Int. J. Bus. Data Commun. Netw..

[41]  Mamata Rath,et al.  Security Issues in Mobile Devices and Mobile Adhoc Networks , 2018 .

[42]  Patrick D. McDaniel,et al.  Machine Learning in Adversarial Settings , 2016, IEEE Security & Privacy.

[43]  Iftikhar Ahmad,et al.  Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000 , 2018 .

[44]  Binod Kumar Pattanayak,et al.  Cross layer based QoS platform for multimedia transmission in MANET , 2017, 2017 11th International Conference on Intelligent Systems and Control (ISCO).

[45]  Saumya Chaturvedi,et al.  Sentiment analysis using machine learning for business intelligence , 2017, 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI).

[46]  Binod Kumar Pattanayak,et al.  Technological improvement in modern health care applications using Internet of Things (IoT) and proposal of novel health care approach , 2019, International Journal of Human Rights in Healthcare.

[47]  Randy Paffenroth,et al.  Multi-objective reinforcement learning-based deep neural networks for cognitive space communications , 2017, 2017 Cognitive Communications for Aerospace Applications Workshop (CCAA).

[48]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[49]  Chunhua Wang,et al.  Machine Learning and Deep Learning Methods for Cybersecurity , 2018, IEEE Access.

[50]  Wei Cai,et al.  A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View , 2018, IEEE Access.

[51]  Aleena Swetapadma,et al.  Land Cover Prediction from Satellite Imagery Using Machine Learning Techniques , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[52]  Jian Weng,et al.  Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition , 2018, IEEE Transactions on Neural Networks and Learning Systems.

[53]  Mamata Rath,et al.  MAQ system development in mobile ad-hoc networks using mobile agents , 2016, 2016 2nd International Conference on Contemporary Computing and Informatics (IC3I).

[54]  Binod Kumar Pattanayak,et al.  Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET , 2019, Int. J. Inf. Secur. Priv..

[55]  R. J. Mangialardo,et al.  Integrating Static and Dynamic Malware Analysis Using Machine Learning , 2015, IEEE Latin America Transactions.

[56]  Binod Kumar Pattanayak,et al.  Comparative analysis of AODV routing protocols based on network performance parameters in Mobile Adhoc Networks , 2016 .

[57]  Marco Carvalho Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.