skip to main content
10.1145/3600160.3605071acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI

Published:29 August 2023Publication History

ABSTRACT

Industry 4.0 is going through a transitional period via the radically automotive transformations. In particular, unmanned aerial vehicles have significantly contributed to the development of intelligent and connected transportation systems. Thus, the continuous development using diverse technologies to achieve a variety of high-performance services raised the security concerns regarding communicating entities. Thus, being managed by networked controllers, UAVs uses controller area networks (CAN) protocol to broadcast information in a bus. However, this protocol is used as a de facto standard which does not have sufficient security features that raise the security risks. This issue caught the attention of the automotive industry researchers and several studies have attempted to improve the security of the CAN protocol attack detection. However, the proposed studies established general perspective solution and did not pay attention to UAVCAN attack detection. To alleviate these concerns, this paper proposed a dynamic intrusion detection frameworks (DIDF) for UAVCAN. The proposed UAVCAN DIDF scheme adopts an artificial intelligence (AI) based model to achieve high detection performance. We performed experiments using public UAVCAN dataset to evaluate our detection system. The experimental results demonstrate that UAVCAN DIDF has significantly reached a high detection rate with a high true positive and a low false negative rate. The simulation results are encouraging and demonstrate the effectiveness of UAVCAN DIDF.

References

  1. Flora Amato, Luigi Coppolino, Francesco Mercaldo, Francesco Moscato, Roberto Nardone, and Antonella Santone. 2021. CAN-Bus Attack Detection With Deep Learning. IEEE Transactions on Intelligent Transportation Systems 22, 8 (2021), 5081–5090. https://doi.org/10.1109/TITS.2020.3046974Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mehmet Bozdal, Mohammad Samie, Sohaib Aslam, and Ian Jennions. 2020. Evaluation of can bus security challenges. Sensors 20, 8 (2020), 2364.Google ScholarGoogle ScholarCross RefCross Ref
  3. Huy Kang Kim (cenda at korea.ac.kr). [n. d.]. UAVCAN ATTACK DATASET. https://ocslab.hksecurity.net/Datasets/uavcan-attack-datasetGoogle ScholarGoogle Scholar
  4. Araya Kibrom Desta, Shuji Ohira, Ismail Arai, and Kazutoshi Fujikawa. 2020. ID sequence analysis for intrusion detection in the CAN bus using long short term memory networks. In 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  5. Mabrouka Gmiden, Mohamed Hedi Gmiden, and Hafedh Trabelsi. 2016. An intrusion detection method for securing in-vehicle CAN bus. In 2016 17th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA). IEEE, 176–180.Google ScholarGoogle ScholarCross RefCross Ref
  6. Achref Haddaji, Samiha Ayed, and Lamia Chaari. 2022. Federated learning with blockchain approach for trust management in IoV. In Advanced Information Networking and Applications: Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022), Volume 1. Springer, 411–423.Google ScholarGoogle ScholarCross RefCross Ref
  7. Achref Haddaji, Samiha Ayed, and Lamia Chaari Fourati. 2022. Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey. Computers and Electrical Engineering 104 (2022), 108460.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Achref Haddaji, Samiha Ayed, and Lamia Chaari Fourati. 2023. A Transfer Learning Based Intrusion Detection System for Internet of Vehicles. In 2023 15th International Conference on Developments in eSystems Engineering (DeSE). 533–539. https://doi.org/10.1109/DeSE58274.2023.10099623Google ScholarGoogle ScholarCross RefCross Ref
  9. Dongsung Kim, Yuchan Song, Soonhyeon Kwon, Haerin Kim, Jeong Do Yoo, and Huy Kang Kim. 2022. UAVCAN Dataset Description. arXiv preprint arXiv:2212.09268 (2022).Google ScholarGoogle Scholar
  10. Bin Li, Zesong Fei, and Yan Zhang. 2018. UAV communications for 5G and beyond: Recent advances and future trends. IEEE Internet of Things Journal 6, 2 (2018), 2241–2263.Google ScholarGoogle ScholarCross RefCross Ref
  11. T Madhuvanthi and S Velliangiri. 2023. Secure Communication for Unmanned Aerial Vehicles. In 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT). IEEE, 217–221.Google ScholarGoogle Scholar
  12. Almotery Ossamah. 2020. Blockchain as a solution to Drone Cybersecurity. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 1–9.Google ScholarGoogle Scholar
  13. Peter Pekarčík, Eva Chovancová, Martin Havrilla, and Martin Hasin. 2023. Security analysis of attacks on UAV. In 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI). 000057–000062. https://doi.org/10.1109/SAMI58000.2023.10044500Google ScholarGoogle ScholarCross RefCross Ref
  14. Niranjan Ravi and Mohamed El-Sharkawy. 2019. Integration of UAVs with Real Time Operating Systems using UAVCAN. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON). 0600–0605. https://doi.org/10.1109/UEMCON47517.2019.8993011Google ScholarGoogle ScholarCross RefCross Ref
  15. Niranjan Ravi and Mohamed El-Sharkawy. 2019. Integration of UAVs with real time operating systems using UAVCAN. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics Mobile Communication Conference (UEMCON). IEEE, 0600–0605.Google ScholarGoogle Scholar
  16. Niranjan Ravi and Mohamed El-Sharkawy. 2021. Enhanced Data Transportation in Remote Locations Using UAV Aided Edge Computing. (2021).Google ScholarGoogle Scholar
  17. Hyun Min Song, Jiyoung Woo, and Huy Kang Kim. 2020. In-vehicle network intrusion detection using deep convolutional neural network. Vehicular Communications 21 (2020), 100198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Fadhila Tlili, Lamia Chaari Fourati, Samiha Ayed, and Bassem Ouni. 2022. Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments countermeasures. Ad Hoc Networks 129 (2022), 102805.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Safi Ullah, Muazzam A Khan, Jawad Ahmad, Sajjad Shaukat Jamal, Zil e Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis, and William J Buchanan. 2022. HDL-IDS: A hybrid deep learning architecture for intrusion detection in the internet of vehicles. Sensors 22, 4 (2022), 1340.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
      August 2023
      1440 pages
      ISBN:9798400707728
      DOI:10.1145/3600160

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate228of451submissions,51%
    • Article Metrics

      • Downloads (Last 12 months)66
      • Downloads (Last 6 weeks)11

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format