117 research outputs found

    Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines

    Full text link
    This paper presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping attacks at the physical layer. More specifically, a wireless communication system, which consists of K legal users, one access point (AP) and one active eavesdropper, is considered. To cope with the eavesdropper who breaks into the system during the uplink phase, we first build structured datasets based on several different features. We then apply support vector machine (SVM) classifiers and one-class SVM classifiers to those structured datasets for detecting the presence of eavesdropper. Regarding the data, we first process received signals at the AP and then define three different features (i.e., MEAN, RATIO and SUM) based on the post-processing signals. Noticeably, our three defined features are formulated such that they have relevant statistical properties. Enabling the AP to simulate the entire process of transmission, we form the so-called artificial training data (ATD) that is used for training SVM (or one-class SVM) models. While SVM is preferred in the case of having perfect channel state information (CSI) of all channels, one-class SVM is preferred in the case of having only the CSI of legal users. We also evaluate the accuracy of the trained models in relation to the choice of kernel functions, the choice of features, and the change of eavesdropper's power. Numerical results show that the accuracy is relatively sensitive to adjusting parameters. Under some settings, SVM classifiers (or even one-class SVM) can bring about the accuracy of over 90%.Comment: All versions on this site are withdrawn because of their serious mistakes. Moreover, the contributions of the co-authors were not considered carefully. Two co-authors have little contributions, which cannot constitute any main contribution. It was a mistake when the first author forgot to update the actual authors, and he hurried to upload the incomplete and flaw file

    Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles

    Get PDF
    The damaging effects of cyberattacks to an industry like the Cooperative Connected and Automated Mobility (CCAM) can be tremendous. From the least important to the worst ones, one can mention for example the damage in the reputation of vehicle manufacturers, the increased denial of customers to adopt CCAM, the loss of working hours (having direct impact on the European GDP), material damages, increased environmental pollution due e.g., to traffic jams or malicious modifications in sensors’ firmware, and ultimately, the great danger for human lives, either they are drivers, passengers or pedestrians. Connected vehicles will soon become a reality on our roads, bringing along new services and capabilities, but also technical challenges and security threats. To overcome these risks, the CARAMEL project has developed several anti-hacking solutions for the new generation of vehicles. CARAMEL (Artificial Intelligence-based Cybersecurity for Connected and Automated Vehicles), a research project co-funded by the European Union under the Horizon 2020 framework programme, is a project consortium with 15 organizations from 8 European countries together with 3 Korean partners. The project applies a proactive approach based on Artificial Intelligence and Machine Learning techniques to detect and prevent potential cybersecurity threats to autonomous and connected vehicles. This approach has been addressed based on four fundamental pillars, namely: Autonomous Mobility, Connected Mobility, Electromobility, and Remote Control Vehicle. This book presents theory and results from each of these technical directions

    Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines

    Full text link
    This article presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping attacks at the physical layer. More specifically, a wireless communication system, which consists of an access point (AP), K legitimate users and an active eavesdropper, is considered. To detect the eavesdropper who breaks into the system during the authentication phase, we first build structured datasets based on different features and then apply sophisticated support vector machine (SVM) classifiers to those structured datasets. To be more specific, we first process the signals received by the AP and then define a pair of statistical features based on the post-processing of the signals. By arranging for the AP to simulate the entire process of transmission and the process of constructing features, we form the so-called artificial training data (ATD). By training SVM classifiers on the ATD, we classify the received signals associated with eavesdropping attacks and nonattacks, thereby detecting the presence of the eavesdropper. Two SVM classifiers are considered, including a classic twin-class SVM (TC-SVM) and a single-class SVM (SC-SVM). While the TC-SVM is preferred in the case of having perfect channel state information (CSI) of all channels, the SC-SVM is preferred in the realistic scenario when we have only the CSI of legitimate users. We also evaluate the accuracy of the trained models depending on the choice of kernel functions, the choice of features and on the eavesdropper's power. Our numerical results show that careful parameter-tuning is required for exceeding an eavesdropper detection probability of 95%

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
    • …
    corecore