Machine Learning and Software Defined Network to secure communications in a swarm of drones

As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integrati...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 61; p. 102940
Main Authors Guerber, Christophe, Royer, Mickaël, Larrieu, Nicolas
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.09.2021
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
Abstract As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic. Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target. In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters. Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller. Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes.
AbstractList As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic. Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target. In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters. Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller. Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes.
As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic. Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target. In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters. Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller. Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes.
ArticleNumber 102940
Author Guerber, Christophe
Royer, Mickaël
Larrieu, Nicolas
Author_xml – sequence: 1
  givenname: Christophe
  orcidid: 0000-0003-4127-7615
  surname: Guerber
  fullname: Guerber, Christophe
  email: christophe.guerber@enac.fr
– sequence: 2
  givenname: Mickaël
  surname: Royer
  fullname: Royer, Mickaël
  email: mickael.royer@enac.fr
– sequence: 3
  givenname: Nicolas
  surname: Larrieu
  fullname: Larrieu, Nicolas
  email: nicolas.larrieu@enac.fr
BackLink https://enac.hal.science/hal-03296179$$DView record in HAL
BookMark eNp9kEtPAjEQgHvARET-gKdePYB9sOw28ULwgQnqQT15aGo7la5sa9oF4r-3uHrxwGmSmfnm8Z2gng8eEDqjZEwJnV7U49olNWaE0ZxgYkJ6qM8YnYwYZdNjNEypJoRQRkXBeB-93iu9ch7wElT0zr9j5Q1-CrbdqQj4CmwuGvwA7S7ED9wGnEBvckWHptl4p1Xrgk_YeaxwykyDg8Um5qvSKTqyap1g-BsH6OXm-nm-GC0fb-_ms-VI87JqRxNhdWV4AfkiBSXhlGpRKluUhS65ASWMpoQbKviEFYxoW4g3U1ozrXhljOIDdN7NXam1_IyuUfFLBuXkYraU-xzhTExpKbY091Zdr44hpQhWatf-_NBG5daSErn3KGu59yj3HmXnMaPsH_q36yB02UGQBWwdRJm0A6_BuAi6lSa4Q_g3VYiP2g
CitedBy_id crossref_primary_10_1080_08874417_2023_2175337
crossref_primary_10_1080_15325008_2024_2349192
crossref_primary_10_1002_rob_22157
crossref_primary_10_1007_s12083_022_01296_6
crossref_primary_10_3389_fenrg_2024_1491332
crossref_primary_10_1109_ACCESS_2024_3471806
crossref_primary_10_1109_JIOT_2023_3237661
crossref_primary_10_1109_TVT_2022_3200339
crossref_primary_10_1007_s10922_024_09866_0
crossref_primary_10_1145_3571728
crossref_primary_10_3390_app12157950
crossref_primary_10_1108_IR_09_2021_0203
crossref_primary_10_35193_bseufbd_1102897
Cites_doi 10.23919/ITC.2017.8065806
10.1016/j.cose.2017.10.011
10.1016/j.comcom.2011.07.001
10.3390/s19235170
10.1109/TSMC.2017.2681698
10.1016/j.jnca.2020.102595
10.3390/electronics8121468
10.1109/TrustCom.2012.187
10.1109/ACCESS.2020.2994494
10.1109/DASC.2016.7777970
ContentType Journal Article
Copyright 2021 Elsevier Ltd
Distributed under a Creative Commons Attribution 4.0 International License
Copyright_xml – notice: 2021 Elsevier Ltd
– notice: Distributed under a Creative Commons Attribution 4.0 International License
DBID AAYXX
CITATION
1XC
VOOES
DOI 10.1016/j.jisa.2021.102940
DatabaseName CrossRef
Hyper Article en Ligne (HAL)
Hyper Article en Ligne (HAL) (Open Access)
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID oai_HAL_hal_03296179v1
10_1016_j_jisa_2021_102940
S2214212621001551
GroupedDBID --M
.~1
1~.
4.4
457
4G.
5VS
7-5
8P~
AACTN
AAEDT
AAEDW
AAFJI
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABBOA
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
AKYCK
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOMHK
AOUOD
AVARZ
AXJTR
BKOJK
BLXMC
EBS
EFJIC
EFLBG
EJD
FDB
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
KOM
M41
MO0
OAUVE
P-8
P-9
PC.
PRBVW
RIG
ROL
SPC
SPCBC
SSB
SSO
SSV
SSZ
T5K
~G-
AATTM
AAXKI
AAYWO
AAYXX
ACVFH
ADCNI
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
1XC
VOOES
ID FETCH-LOGICAL-c378t-49fc8d35e952ae70311c97af575c73dea9dc103d19342520cf59bd7fd6838dda3
IEDL.DBID .~1
ISSN 2214-2126
IngestDate Fri May 09 12:22:49 EDT 2025
Thu Apr 24 23:03:02 EDT 2025
Tue Jul 01 02:49:48 EDT 2025
Fri Feb 23 02:43:40 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords FANET
Security architecture
SDN
Machine Learning
AODV
Random Forest Classifier
UAANET
UAV
swarm of drones
Language English
License Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c378t-49fc8d35e952ae70311c97af575c73dea9dc103d19342520cf59bd7fd6838dda3
ORCID 0000-0003-4127-7615
OpenAccessLink https://enac.hal.science/hal-03296179
ParticipantIDs hal_primary_oai_HAL_hal_03296179v1
crossref_citationtrail_10_1016_j_jisa_2021_102940
crossref_primary_10_1016_j_jisa_2021_102940
elsevier_sciencedirect_doi_10_1016_j_jisa_2021_102940
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-09-01
PublicationDateYYYYMMDD 2021-09-01
PublicationDate_xml – month: 09
  year: 2021
  text: 2021-09-01
  day: 01
PublicationDecade 2020
PublicationTitle Journal of information security and applications
PublicationYear 2021
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Sangkatsanee, Wattanapongsakorn, Charnsripinyo (b17) 2011; 34
Sami Oubbati, Atiquzzaman, Ahamed Ahanger, Ibrahim (b10) 2020; 8
Ledieu, Pennel, Pernot (b7) 2019
Guerber, Larrieu, Royer (b20) 2019
Rescorla, Modadugu (b23) 2012
Carnein, Assenmacher, Trautmann (b30) 2017
Hamed, Dara, Kremer (b32) 2018; 73
Boutaba, Salahuddin, Limam, Ayoubi, Shahriar, Estrada-Solano (b12) 2018; 9
Joncheray (b25) 1995
Maxa J, Ben Mahmoud MS, Larrieu N. Extended verification of secure UAANET routing protocol. In: 2016 IEEE/AIAA 35th digital avionics systems conference. 2016. p. 1–6.
Oladimeji, Supakkul, Chung (b3) 2006
Fayollas, Vacher (b6) 2019
Postel (b24) 1981
Perkins, Belding-Royer, Das (b26) 2003
Krishna, Murphy (b4) 2017
Szczypiorski (b28) 2003
(b2) 2001
Sedjelmaci, Senouci, Ansari (b19) 2018; 48
Bithas, Michailidis, Nomikos, Vouyioukas, Kanatas (b18) 2019; 19
of California (b13) 1999
Rescorla (b22) 2018
Boero L, Marchese M, Zappatore S. Support vector machine meets software defined networking in IDS domain. In: 29th International teletraffic congress, Genoa, Italy. 2017. p. 25–30.
Thing, Wu (b5) 2016
Javaid, Sun, Devabhaktuni, Alam (b1) 2012
McCoy, Rawat (b11) 2019; 8
Tavallaee, Bagheri, Lu, Ghorbani (b14) 2009
Shin, Xu, Hong, Gu (b9) 2016
Uskov AV. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. 2012. p. 1042–8.
Mazurczyk, Wendzel, Zander, Houmansadr, Szczypiorski (b29) 2016
Correa Chica, Imbachi, Botero Vega (b8) 2020; 159
(b15) 2009
(b31) 2018
Hamed (10.1016/j.jisa.2021.102940_b32) 2018; 73
Thing (10.1016/j.jisa.2021.102940_b5) 2016
10.1016/j.jisa.2021.102940_b16
Mazurczyk (10.1016/j.jisa.2021.102940_b29) 2016
of California (10.1016/j.jisa.2021.102940_b13) 1999
Shin (10.1016/j.jisa.2021.102940_b9) 2016
Rescorla (10.1016/j.jisa.2021.102940_b22) 2018
Carnein (10.1016/j.jisa.2021.102940_b30) 2017
Guerber (10.1016/j.jisa.2021.102940_b20) 2019
Javaid (10.1016/j.jisa.2021.102940_b1) 2012
Szczypiorski (10.1016/j.jisa.2021.102940_b28) 2003
Fayollas (10.1016/j.jisa.2021.102940_b6) 2019
Postel (10.1016/j.jisa.2021.102940_b24) 1981
Sedjelmaci (10.1016/j.jisa.2021.102940_b19) 2018; 48
(10.1016/j.jisa.2021.102940_b2) 2001
Oladimeji (10.1016/j.jisa.2021.102940_b3) 2006
Rescorla (10.1016/j.jisa.2021.102940_b23) 2012
Tavallaee (10.1016/j.jisa.2021.102940_b14) 2009
Krishna (10.1016/j.jisa.2021.102940_b4) 2017
10.1016/j.jisa.2021.102940_b21
Boutaba (10.1016/j.jisa.2021.102940_b12) 2018; 9
(10.1016/j.jisa.2021.102940_b31) 2018
(10.1016/j.jisa.2021.102940_b15) 2009
10.1016/j.jisa.2021.102940_b27
Sami Oubbati (10.1016/j.jisa.2021.102940_b10) 2020; 8
Correa Chica (10.1016/j.jisa.2021.102940_b8) 2020; 159
Ledieu (10.1016/j.jisa.2021.102940_b7) 2019
McCoy (10.1016/j.jisa.2021.102940_b11) 2019; 8
Sangkatsanee (10.1016/j.jisa.2021.102940_b17) 2011; 34
Bithas (10.1016/j.jisa.2021.102940_b18) 2019; 19
Perkins (10.1016/j.jisa.2021.102940_b26) 2003
Joncheray (10.1016/j.jisa.2021.102940_b25) 1995
References_xml – start-page: 1
  year: 2016
  end-page: 9
  ident: b9
  article-title: Enhancing network security through software defined networking (SDN)
  publication-title: 2016 25th international conference on computer communication and networks
– start-page: 194
  year: 2017
  end-page: 199
  ident: b4
  article-title: A review on cybersecurity vulnerabilities for unmanned aerial vehicles
  publication-title: 2017 IEEE international symposium on safety, security and rescue robotics
– year: 2016
  ident: b29
  article-title: Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures
– reference: Maxa J, Ben Mahmoud MS, Larrieu N. Extended verification of secure UAANET routing protocol. In: 2016 IEEE/AIAA 35th digital avionics systems conference. 2016. p. 1–6.
– volume: 8
  start-page: 98073
  year: 2020
  end-page: 98125
  ident: b10
  article-title: Softwarization of UAV networks: A survey of applications and future trends
  publication-title: IEEE Access
– year: 2001
  ident: b2
  article-title: ETSI TR 101 771 V1.1.1; TIPHON release 4; Service independent requirements definition; threat analysis
– volume: 9
  year: 2018
  ident: b12
  article-title: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
  publication-title: J Internet Serv Appl
– reference: Uskov AV. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. 2012. p. 1042–8.
– volume: 48
  start-page: 1594
  year: 2018
  end-page: 1606
  ident: b19
  article-title: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks
  publication-title: IEEE Trans Syst Man Cybern A
– start-page: 2
  year: 1995
  ident: b25
  article-title: A simple active attack against TCP
  publication-title: Proceedings of the 5th conference on USENIX UNIX security symposium - volume 5
– year: 2003
  ident: b28
  article-title: Steganography in TCP/IP networks. State of the art and a proposal of a new system-HICCUPS
– year: 2019
  ident: b6
  article-title: Drone predator, one drone to rule them all
– year: 2018
  ident: b22
  article-title: The transport layer security (TLS) protocol version 1.3
– year: 2018
  ident: b31
  article-title: CSE-CIC-IDS2018 on AWS
– volume: 159
  year: 2020
  ident: b8
  article-title: Security in SDN: A comprehensive survey
  publication-title: J Netw Comput Appl
– start-page: 361
  year: 2017
  end-page: 366
  ident: b30
  article-title: An empirical comparison of stream clustering algorithms
  publication-title: Proceedings of the computing frontiers conference
– volume: 73
  start-page: 137
  year: 2018
  end-page: 155
  ident: b32
  article-title: Network intrusion detection system based on recursive feature addition and bigram technique
  publication-title: Comput Secur
– start-page: 585
  year: 2012
  end-page: 590
  ident: b1
  article-title: Cyber security threat analysis and modeling of an unmanned aerial vehicle system
  publication-title: 2012 IEEE conference on technologies for homeland security
– volume: 19
  year: 2019
  ident: b18
  article-title: A survey on machine-learning techniques for UAV-based communications
  publication-title: Sensors
– year: 1981
  ident: b24
  article-title: Transmission control protocol
– year: 1999
  ident: b13
  article-title: Knowledge discovery and datamining cup 1999 data
– start-page: 164
  year: 2016
  end-page: 170
  ident: b5
  article-title: Autonomous vehicle security: A taxonomy of attacks and defences
  publication-title: 2016 IEEE international conference on internet of things and IEEE green computing and communications and IEEE cyber, physical and social computing and IEEE smart data
– year: 2009
  ident: b14
  article-title: A detailed analysis of the KDD CUP 99 data set
  publication-title: IEEE symposium. Computational intelligence for security and defense applications, vol. 2
– year: 2012
  ident: b23
  article-title: Datagram transport layer security version 1.2
– year: 2003
  ident: b26
  article-title: Ad hoc on-demand distance vector (AODV) routing
– volume: 8
  start-page: 1468
  year: 2019
  ident: b11
  article-title: Software-defined networking for unmanned aerial vehicular networking and security: A survey
  publication-title: Electronics
– year: 2009
  ident: b15
  article-title: NSL-KDD dataset
– year: 2006
  ident: b3
  article-title: Security threat modeling and analysis: A goal-oriented approach
  publication-title: Proc. of the 10th IASTED international conference on software engineering and applications
– volume: 34
  start-page: 2227
  year: 2011
  end-page: 2235
  ident: b17
  article-title: Practical real-time intrusion detection using machine learning approaches
  publication-title: Comput Commun
– reference: Boero L, Marchese M, Zappatore S. Support vector machine meets software defined networking in IDS domain. In: 29th International teletraffic congress, Genoa, Italy. 2017. p. 25–30.
– start-page: 51
  year: 2019
  end-page: 60
  ident: b20
  article-title: Software defined network based architecture to improve security in a swarm of drones
  publication-title: 2019 international conference on unmanned aircraft systems
– year: 2019
  ident: b7
  article-title: Attaques sur un ar drone 2.0 parrot
– start-page: 2
  year: 1995
  ident: 10.1016/j.jisa.2021.102940_b25
  article-title: A simple active attack against TCP
– ident: 10.1016/j.jisa.2021.102940_b16
  doi: 10.23919/ITC.2017.8065806
– start-page: 1
  year: 2016
  ident: 10.1016/j.jisa.2021.102940_b9
  article-title: Enhancing network security through software defined networking (SDN)
– volume: 73
  start-page: 137
  year: 2018
  ident: 10.1016/j.jisa.2021.102940_b32
  article-title: Network intrusion detection system based on recursive feature addition and bigram technique
  publication-title: Comput Secur
  doi: 10.1016/j.cose.2017.10.011
– year: 2006
  ident: 10.1016/j.jisa.2021.102940_b3
  article-title: Security threat modeling and analysis: A goal-oriented approach
– year: 2009
  ident: 10.1016/j.jisa.2021.102940_b15
– year: 2018
  ident: 10.1016/j.jisa.2021.102940_b22
– volume: 34
  start-page: 2227
  issue: 18
  year: 2011
  ident: 10.1016/j.jisa.2021.102940_b17
  article-title: Practical real-time intrusion detection using machine learning approaches
  publication-title: Comput Commun
  doi: 10.1016/j.comcom.2011.07.001
– start-page: 51
  year: 2019
  ident: 10.1016/j.jisa.2021.102940_b20
  article-title: Software defined network based architecture to improve security in a swarm of drones
– year: 2019
  ident: 10.1016/j.jisa.2021.102940_b7
– volume: 19
  issue: 23
  year: 2019
  ident: 10.1016/j.jisa.2021.102940_b18
  article-title: A survey on machine-learning techniques for UAV-based communications
  publication-title: Sensors
  doi: 10.3390/s19235170
– year: 2003
  ident: 10.1016/j.jisa.2021.102940_b26
– year: 2019
  ident: 10.1016/j.jisa.2021.102940_b6
– volume: 48
  start-page: 1594
  issue: 9
  year: 2018
  ident: 10.1016/j.jisa.2021.102940_b19
  article-title: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks
  publication-title: IEEE Trans Syst Man Cybern A
  doi: 10.1109/TSMC.2017.2681698
– volume: 159
  year: 2020
  ident: 10.1016/j.jisa.2021.102940_b8
  article-title: Security in SDN: A comprehensive survey
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2020.102595
– volume: 8
  start-page: 1468
  year: 2019
  ident: 10.1016/j.jisa.2021.102940_b11
  article-title: Software-defined networking for unmanned aerial vehicular networking and security: A survey
  publication-title: Electronics
  doi: 10.3390/electronics8121468
– year: 2018
  ident: 10.1016/j.jisa.2021.102940_b31
– start-page: 194
  year: 2017
  ident: 10.1016/j.jisa.2021.102940_b4
  article-title: A review on cybersecurity vulnerabilities for unmanned aerial vehicles
– volume: 9
  issue: 16
  year: 2018
  ident: 10.1016/j.jisa.2021.102940_b12
  article-title: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities
  publication-title: J Internet Serv Appl
– year: 2001
  ident: 10.1016/j.jisa.2021.102940_b2
– ident: 10.1016/j.jisa.2021.102940_b21
  doi: 10.1109/TrustCom.2012.187
– volume: 8
  start-page: 98073
  year: 2020
  ident: 10.1016/j.jisa.2021.102940_b10
  article-title: Softwarization of UAV networks: A survey of applications and future trends
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2994494
– start-page: 164
  year: 2016
  ident: 10.1016/j.jisa.2021.102940_b5
  article-title: Autonomous vehicle security: A taxonomy of attacks and defences
– year: 1981
  ident: 10.1016/j.jisa.2021.102940_b24
– year: 2009
  ident: 10.1016/j.jisa.2021.102940_b14
  article-title: A detailed analysis of the KDD CUP 99 data set
– ident: 10.1016/j.jisa.2021.102940_b27
  doi: 10.1109/DASC.2016.7777970
– start-page: 361
  year: 2017
  ident: 10.1016/j.jisa.2021.102940_b30
  article-title: An empirical comparison of stream clustering algorithms
– year: 2016
  ident: 10.1016/j.jisa.2021.102940_b29
– year: 1999
  ident: 10.1016/j.jisa.2021.102940_b13
– start-page: 585
  year: 2012
  ident: 10.1016/j.jisa.2021.102940_b1
  article-title: Cyber security threat analysis and modeling of an unmanned aerial vehicle system
– year: 2003
  ident: 10.1016/j.jisa.2021.102940_b28
– year: 2012
  ident: 10.1016/j.jisa.2021.102940_b23
SSID ssj0001219523
Score 2.404528
Snippet As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase....
SourceID hal
crossref
elsevier
SourceType Open Access Repository
Enrichment Source
Index Database
Publisher
StartPage 102940
SubjectTerms AODV
Computer Science
Cryptography and Security
FANET
Machine Learning
Networking and Internet Architecture
Random Forest Classifier
SDN
Security architecture
Title Machine Learning and Software Defined Network to secure communications in a swarm of drones
URI https://dx.doi.org/10.1016/j.jisa.2021.102940
https://enac.hal.science/hal-03296179
Volume 61
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI7GuHDhjXhOEeKGypq0aZrjNJjGY7sA0iQOVZoHDME2bQNu_HbiNkUgoR04No3T1klsx7U_I3QilFURj2iQ20QGMaF5IGiYBtYKrkPGJC-iCXv9pHsfXw3YoIbaVS4MhFV62V_K9EJa-5am52ZzMhw2bymghRGaUFIqfshgjzms8rNP8sPPQgQrqrxB_wAIfO5MGeb1DP-MqdN0AGIgwAfyt35aeqo8rYXm6ayjVW8y4lb5VhuoZkabaK0qx4D97txCD70iMNJgj5n6iOVI41snZz_k1OBzY91Njftl4Deej_EMnO0Gq59JIjM8HGGJZ47mFY8t1lNA899G952Lu3Y38LUTAsf6dB7EwqpUR8y4j5cGQOqJElxaZ50pHmkjhVYkjLSz39yupaGyTOSaW52kUaq1jHZQfeTG30U4Zu6MxhPDFVOxtFJYraRIcx3qkEgp9xCpOJYpDywO9S1esiqC7DkDLmfA5azk8h46_aaZlLAaC3uzaiKyX4sjc3J_Id2xm7XvBwCSdrd1k0FbGFHhjDfxTvb_OfgBWoGrMt7sENXn0zdz5AyUed4oVmADLbcur7v9Lzqt43Q
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NTxUxEJ_wcdALCmpERRqDJ7O-bXe7uz14ICJ5yHvvAiQkHmq3H_KIPsh7T4kX_yn_QWZ2uwQSwoGEa7sz20wnM9PprzMAW8oGm5WZSOpQmCTnok6USKskBFW6VEpTNmjC4ajoH-Vfj-XxAvzv3sIQrDLa_tamN9Y6jvSiNHvn43HvQFC1MC4KwVvHH5GV-_7vBZ7bZp_2dnCT3wux--Xwcz-JrQUSXFk1T3IVbOUy6ZUUxlMNd25VaQIGL7bMnDfKWZ5mDsMbVGqR2iBV7crgiiqrnDMZ8l2E5RzNBbVN-PiPX0vscGRKN9u0wIRWGB_rtLiyU7qkFuhaqWqCoqTL7Q5x8aRL7TaubvcprMQYlW23YliFBT9Zgydd_wcWzcEz-DZskJiexSKtP5iZOHaAhv3CTD3b8QEnHRu1SHM2P2Mzyu57Zq-_Spmx8YQZNkOaX-wsMDel9gHP4ehBJPoClibI_yWwXOKhsCx8aaXNTTAqOGtUVbvUpdwYsw68k5i2sZI5NdT4qTvI2qkmKWuSsm6lvA4frmjO2zoed34tu43QN7RRo6O5k-4d7trVD6h0d397oGkszYTCaFH94a_uyXwTHvUPhwM92Bvtv4bHNNOC3d7A0nz6229gdDSv3zbayOD7Q6v_JcwfH3U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Machine+Learning+and+Software+Defined+Network+to+secure+communications+in+a+swarm+of+drones&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Guerber%2C+Christophe&rft.au=Royer%2C+Micka%C3%ABl&rft.au=Larrieu%2C+Nicolas&rft.date=2021-09-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=61&rft_id=info:doi/10.1016%2Fj.jisa.2021.102940&rft.externalDocID=S2214212621001551
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon