An Efficient Privacy-preserving Intrusion Detection Scheme for UAV Swarm Networks
By: Kanchon Gharami, Shafika Showkat Moni
Potential Business Impact:
Keeps flying robot groups safe from hackers.
The rapid proliferation of unmanned aerial vehicles (UAVs) and their applications in diverse domains, such as surveillance, disaster management, agriculture, and defense, have revolutionized modern technology. While the potential benefits of swarm-based UAV networks are growing significantly, they are vulnerable to various security attacks that can jeopardize the overall mission success by degrading their performance, disrupting decision-making, and compromising the trajectory planning process. The Intrusion Detection System (IDS) plays a vital role in identifying potential security attacks to ensure the secure operation of UAV swarm networks. However, conventional IDS primarily focuses on binary classification with resource-intensive neural networks and faces challenges, including latency, privacy breaches, increased performance overhead, and model drift. This research aims to address these challenges by developing a novel lightweight and federated continuous learning-based IDS scheme. Our proposed model facilitates decentralized training across diverse UAV swarms to ensure data heterogeneity and privacy. The performance evaluation of our model demonstrates significant improvements, with classification accuracies of 99.45% on UKM-IDS, 99.99% on UAV-IDS, 96.85% on TLM-UAV dataset, and 98.05% on Cyber-Physical datasets.
Similar Papers
AI-driven Intrusion Detection for UAV in Smart Urban Ecosystems: A Comprehensive Survey
Cryptography and Security
Keeps flying robots safe from hackers and intruders.
Distributed Intrusion Detection in Dynamic Networks of UAVs using Few-Shot Federated Learning
Cryptography and Security
Drones learn to spot bad guys with less data.
An intrusion detection system in internet of things using grasshopper optimization algorithm and machine learning algorithms
Optimization and Control
Protects smart devices from hackers.