Machine Learning and Software Defined Network to secure communications in a swarm of drones
As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integrati...
Saved in:
Published in | Journal of information security and applications Vol. 61; p. 102940 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.09.2021
Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic.
Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target.
In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters.
Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller.
Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes. |
---|---|
AbstractList | As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic.
Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target.
In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters.
Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller.
Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes. As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase. Securing the communication taking place with the drones and especially in the network of a swarm, is of primary importance to allow a safe integration of Unmanned Aerial Vehicles into air traffic. Drones are subject to a range of attacks, from GPS jamming to application bug exploits. Among these attacks, and irrespective to whether they have already been implemented or not, communication is one of the main contributors, both as a vector and as a target. In this article, we use previous work on security threats concerning drones to identify two main types of attack in a network of drones: intrusion from the outside and network usage from inside. We demonstrate the robustness of the Software Defined Network (SDN) architecture facing most common attacks from the outside. In addition, we propose a traffic injection detection technique and corresponding countermeasures based on SDN flow counters. Finally, we present an innovative machine learning solution based on Random Forest Classifier to address insider attacks, relying solely on flow creation events. We propose two specific features that characterizes the activity in the network. They allow detecting common network attacks such as denial of service, port scanning and brute force and are easily available to the controller. Detection performance of these abnormal behaviors are promising, both in terms of true positive and false negative, and in terms of detection delay. Detection of these common attacks will allow tightening of security in such wireless network by denying further access to the network by rogue nodes. |
ArticleNumber | 102940 |
Author | Guerber, Christophe Royer, Mickaël Larrieu, Nicolas |
Author_xml | – sequence: 1 givenname: Christophe orcidid: 0000-0003-4127-7615 surname: Guerber fullname: Guerber, Christophe email: christophe.guerber@enac.fr – sequence: 2 givenname: Mickaël surname: Royer fullname: Royer, Mickaël email: mickael.royer@enac.fr – sequence: 3 givenname: Nicolas surname: Larrieu fullname: Larrieu, Nicolas email: nicolas.larrieu@enac.fr |
BackLink | https://enac.hal.science/hal-03296179$$DView record in HAL |
BookMark | eNp9kEtPAjEQgHvARET-gKdePYB9sOw28ULwgQnqQT15aGo7la5sa9oF4r-3uHrxwGmSmfnm8Z2gng8eEDqjZEwJnV7U49olNWaE0ZxgYkJ6qM8YnYwYZdNjNEypJoRQRkXBeB-93iu9ch7wElT0zr9j5Q1-CrbdqQj4CmwuGvwA7S7ED9wGnEBvckWHptl4p1Xrgk_YeaxwykyDg8Um5qvSKTqyap1g-BsH6OXm-nm-GC0fb-_ms-VI87JqRxNhdWV4AfkiBSXhlGpRKluUhS65ASWMpoQbKviEFYxoW4g3U1ozrXhljOIDdN7NXam1_IyuUfFLBuXkYraU-xzhTExpKbY091Zdr44hpQhWatf-_NBG5daSErn3KGu59yj3HmXnMaPsH_q36yB02UGQBWwdRJm0A6_BuAi6lSa4Q_g3VYiP2g |
CitedBy_id | crossref_primary_10_1080_08874417_2023_2175337 crossref_primary_10_1080_15325008_2024_2349192 crossref_primary_10_1002_rob_22157 crossref_primary_10_1007_s12083_022_01296_6 crossref_primary_10_3389_fenrg_2024_1491332 crossref_primary_10_1109_ACCESS_2024_3471806 crossref_primary_10_1109_JIOT_2023_3237661 crossref_primary_10_1109_TVT_2022_3200339 crossref_primary_10_1007_s10922_024_09866_0 crossref_primary_10_1145_3571728 crossref_primary_10_3390_app12157950 crossref_primary_10_1108_IR_09_2021_0203 crossref_primary_10_35193_bseufbd_1102897 |
Cites_doi | 10.23919/ITC.2017.8065806 10.1016/j.cose.2017.10.011 10.1016/j.comcom.2011.07.001 10.3390/s19235170 10.1109/TSMC.2017.2681698 10.1016/j.jnca.2020.102595 10.3390/electronics8121468 10.1109/TrustCom.2012.187 10.1109/ACCESS.2020.2994494 10.1109/DASC.2016.7777970 |
ContentType | Journal Article |
Copyright | 2021 Elsevier Ltd Distributed under a Creative Commons Attribution 4.0 International License |
Copyright_xml | – notice: 2021 Elsevier Ltd – notice: Distributed under a Creative Commons Attribution 4.0 International License |
DBID | AAYXX CITATION 1XC VOOES |
DOI | 10.1016/j.jisa.2021.102940 |
DatabaseName | CrossRef Hyper Article en Ligne (HAL) Hyper Article en Ligne (HAL) (Open Access) |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | oai_HAL_hal_03296179v1 10_1016_j_jisa_2021_102940 S2214212621001551 |
GroupedDBID | --M .~1 1~. 4.4 457 4G. 5VS 7-5 8P~ AACTN AAEDT AAEDW AAFJI AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABBOA ABMAC ABXDB ABYKQ ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKYCK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOMHK AOUOD AVARZ AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FNPLU FYGXN GBLVA GBOLZ KOM M41 MO0 OAUVE P-8 P-9 PC. PRBVW RIG ROL SPC SPCBC SSB SSO SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ACVFH ADCNI AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 1XC VOOES |
ID | FETCH-LOGICAL-c378t-49fc8d35e952ae70311c97af575c73dea9dc103d19342520cf59bd7fd6838dda3 |
IEDL.DBID | .~1 |
ISSN | 2214-2126 |
IngestDate | Fri May 09 12:22:49 EDT 2025 Thu Apr 24 23:03:02 EDT 2025 Tue Jul 01 02:49:48 EDT 2025 Fri Feb 23 02:43:40 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | FANET Security architecture SDN Machine Learning AODV Random Forest Classifier UAANET UAV swarm of drones |
Language | English |
License | Distributed under a Creative Commons Attribution 4.0 International License: http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c378t-49fc8d35e952ae70311c97af575c73dea9dc103d19342520cf59bd7fd6838dda3 |
ORCID | 0000-0003-4127-7615 |
OpenAccessLink | https://enac.hal.science/hal-03296179 |
ParticipantIDs | hal_primary_oai_HAL_hal_03296179v1 crossref_citationtrail_10_1016_j_jisa_2021_102940 crossref_primary_10_1016_j_jisa_2021_102940 elsevier_sciencedirect_doi_10_1016_j_jisa_2021_102940 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-09-01 |
PublicationDateYYYYMMDD | 2021-09-01 |
PublicationDate_xml | – month: 09 year: 2021 text: 2021-09-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Journal of information security and applications |
PublicationYear | 2021 |
Publisher | Elsevier Ltd Elsevier |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
References | Sangkatsanee, Wattanapongsakorn, Charnsripinyo (b17) 2011; 34 Sami Oubbati, Atiquzzaman, Ahamed Ahanger, Ibrahim (b10) 2020; 8 Ledieu, Pennel, Pernot (b7) 2019 Guerber, Larrieu, Royer (b20) 2019 Rescorla, Modadugu (b23) 2012 Carnein, Assenmacher, Trautmann (b30) 2017 Hamed, Dara, Kremer (b32) 2018; 73 Boutaba, Salahuddin, Limam, Ayoubi, Shahriar, Estrada-Solano (b12) 2018; 9 Joncheray (b25) 1995 Maxa J, Ben Mahmoud MS, Larrieu N. Extended verification of secure UAANET routing protocol. In: 2016 IEEE/AIAA 35th digital avionics systems conference. 2016. p. 1–6. Oladimeji, Supakkul, Chung (b3) 2006 Fayollas, Vacher (b6) 2019 Postel (b24) 1981 Perkins, Belding-Royer, Das (b26) 2003 Krishna, Murphy (b4) 2017 Szczypiorski (b28) 2003 (b2) 2001 Sedjelmaci, Senouci, Ansari (b19) 2018; 48 Bithas, Michailidis, Nomikos, Vouyioukas, Kanatas (b18) 2019; 19 of California (b13) 1999 Rescorla (b22) 2018 Boero L, Marchese M, Zappatore S. Support vector machine meets software defined networking in IDS domain. In: 29th International teletraffic congress, Genoa, Italy. 2017. p. 25–30. Thing, Wu (b5) 2016 Javaid, Sun, Devabhaktuni, Alam (b1) 2012 McCoy, Rawat (b11) 2019; 8 Tavallaee, Bagheri, Lu, Ghorbani (b14) 2009 Shin, Xu, Hong, Gu (b9) 2016 Uskov AV. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. 2012. p. 1042–8. Mazurczyk, Wendzel, Zander, Houmansadr, Szczypiorski (b29) 2016 Correa Chica, Imbachi, Botero Vega (b8) 2020; 159 (b15) 2009 (b31) 2018 Hamed (10.1016/j.jisa.2021.102940_b32) 2018; 73 Thing (10.1016/j.jisa.2021.102940_b5) 2016 10.1016/j.jisa.2021.102940_b16 Mazurczyk (10.1016/j.jisa.2021.102940_b29) 2016 of California (10.1016/j.jisa.2021.102940_b13) 1999 Shin (10.1016/j.jisa.2021.102940_b9) 2016 Rescorla (10.1016/j.jisa.2021.102940_b22) 2018 Carnein (10.1016/j.jisa.2021.102940_b30) 2017 Guerber (10.1016/j.jisa.2021.102940_b20) 2019 Javaid (10.1016/j.jisa.2021.102940_b1) 2012 Szczypiorski (10.1016/j.jisa.2021.102940_b28) 2003 Fayollas (10.1016/j.jisa.2021.102940_b6) 2019 Postel (10.1016/j.jisa.2021.102940_b24) 1981 Sedjelmaci (10.1016/j.jisa.2021.102940_b19) 2018; 48 (10.1016/j.jisa.2021.102940_b2) 2001 Oladimeji (10.1016/j.jisa.2021.102940_b3) 2006 Rescorla (10.1016/j.jisa.2021.102940_b23) 2012 Tavallaee (10.1016/j.jisa.2021.102940_b14) 2009 Krishna (10.1016/j.jisa.2021.102940_b4) 2017 10.1016/j.jisa.2021.102940_b21 Boutaba (10.1016/j.jisa.2021.102940_b12) 2018; 9 (10.1016/j.jisa.2021.102940_b31) 2018 (10.1016/j.jisa.2021.102940_b15) 2009 10.1016/j.jisa.2021.102940_b27 Sami Oubbati (10.1016/j.jisa.2021.102940_b10) 2020; 8 Correa Chica (10.1016/j.jisa.2021.102940_b8) 2020; 159 Ledieu (10.1016/j.jisa.2021.102940_b7) 2019 McCoy (10.1016/j.jisa.2021.102940_b11) 2019; 8 Sangkatsanee (10.1016/j.jisa.2021.102940_b17) 2011; 34 Bithas (10.1016/j.jisa.2021.102940_b18) 2019; 19 Perkins (10.1016/j.jisa.2021.102940_b26) 2003 Joncheray (10.1016/j.jisa.2021.102940_b25) 1995 |
References_xml | – start-page: 1 year: 2016 end-page: 9 ident: b9 article-title: Enhancing network security through software defined networking (SDN) publication-title: 2016 25th international conference on computer communication and networks – start-page: 194 year: 2017 end-page: 199 ident: b4 article-title: A review on cybersecurity vulnerabilities for unmanned aerial vehicles publication-title: 2017 IEEE international symposium on safety, security and rescue robotics – year: 2016 ident: b29 article-title: Information hiding in communication networks: fundamentals, mechanisms, applications, and countermeasures – reference: Maxa J, Ben Mahmoud MS, Larrieu N. Extended verification of secure UAANET routing protocol. In: 2016 IEEE/AIAA 35th digital avionics systems conference. 2016. p. 1–6. – volume: 8 start-page: 98073 year: 2020 end-page: 98125 ident: b10 article-title: Softwarization of UAV networks: A survey of applications and future trends publication-title: IEEE Access – year: 2001 ident: b2 article-title: ETSI TR 101 771 V1.1.1; TIPHON release 4; Service independent requirements definition; threat analysis – volume: 9 year: 2018 ident: b12 article-title: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities publication-title: J Internet Serv Appl – reference: Uskov AV. Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. 2012. p. 1042–8. – volume: 48 start-page: 1594 year: 2018 end-page: 1606 ident: b19 article-title: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks publication-title: IEEE Trans Syst Man Cybern A – start-page: 2 year: 1995 ident: b25 article-title: A simple active attack against TCP publication-title: Proceedings of the 5th conference on USENIX UNIX security symposium - volume 5 – year: 2003 ident: b28 article-title: Steganography in TCP/IP networks. State of the art and a proposal of a new system-HICCUPS – year: 2019 ident: b6 article-title: Drone predator, one drone to rule them all – year: 2018 ident: b22 article-title: The transport layer security (TLS) protocol version 1.3 – year: 2018 ident: b31 article-title: CSE-CIC-IDS2018 on AWS – volume: 159 year: 2020 ident: b8 article-title: Security in SDN: A comprehensive survey publication-title: J Netw Comput Appl – start-page: 361 year: 2017 end-page: 366 ident: b30 article-title: An empirical comparison of stream clustering algorithms publication-title: Proceedings of the computing frontiers conference – volume: 73 start-page: 137 year: 2018 end-page: 155 ident: b32 article-title: Network intrusion detection system based on recursive feature addition and bigram technique publication-title: Comput Secur – start-page: 585 year: 2012 end-page: 590 ident: b1 article-title: Cyber security threat analysis and modeling of an unmanned aerial vehicle system publication-title: 2012 IEEE conference on technologies for homeland security – volume: 19 year: 2019 ident: b18 article-title: A survey on machine-learning techniques for UAV-based communications publication-title: Sensors – year: 1981 ident: b24 article-title: Transmission control protocol – year: 1999 ident: b13 article-title: Knowledge discovery and datamining cup 1999 data – start-page: 164 year: 2016 end-page: 170 ident: b5 article-title: Autonomous vehicle security: A taxonomy of attacks and defences publication-title: 2016 IEEE international conference on internet of things and IEEE green computing and communications and IEEE cyber, physical and social computing and IEEE smart data – year: 2009 ident: b14 article-title: A detailed analysis of the KDD CUP 99 data set publication-title: IEEE symposium. Computational intelligence for security and defense applications, vol. 2 – year: 2012 ident: b23 article-title: Datagram transport layer security version 1.2 – year: 2003 ident: b26 article-title: Ad hoc on-demand distance vector (AODV) routing – volume: 8 start-page: 1468 year: 2019 ident: b11 article-title: Software-defined networking for unmanned aerial vehicular networking and security: A survey publication-title: Electronics – year: 2009 ident: b15 article-title: NSL-KDD dataset – year: 2006 ident: b3 article-title: Security threat modeling and analysis: A goal-oriented approach publication-title: Proc. of the 10th IASTED international conference on software engineering and applications – volume: 34 start-page: 2227 year: 2011 end-page: 2235 ident: b17 article-title: Practical real-time intrusion detection using machine learning approaches publication-title: Comput Commun – reference: Boero L, Marchese M, Zappatore S. Support vector machine meets software defined networking in IDS domain. In: 29th International teletraffic congress, Genoa, Italy. 2017. p. 25–30. – start-page: 51 year: 2019 end-page: 60 ident: b20 article-title: Software defined network based architecture to improve security in a swarm of drones publication-title: 2019 international conference on unmanned aircraft systems – year: 2019 ident: b7 article-title: Attaques sur un ar drone 2.0 parrot – start-page: 2 year: 1995 ident: 10.1016/j.jisa.2021.102940_b25 article-title: A simple active attack against TCP – ident: 10.1016/j.jisa.2021.102940_b16 doi: 10.23919/ITC.2017.8065806 – start-page: 1 year: 2016 ident: 10.1016/j.jisa.2021.102940_b9 article-title: Enhancing network security through software defined networking (SDN) – volume: 73 start-page: 137 year: 2018 ident: 10.1016/j.jisa.2021.102940_b32 article-title: Network intrusion detection system based on recursive feature addition and bigram technique publication-title: Comput Secur doi: 10.1016/j.cose.2017.10.011 – year: 2006 ident: 10.1016/j.jisa.2021.102940_b3 article-title: Security threat modeling and analysis: A goal-oriented approach – year: 2009 ident: 10.1016/j.jisa.2021.102940_b15 – year: 2018 ident: 10.1016/j.jisa.2021.102940_b22 – volume: 34 start-page: 2227 issue: 18 year: 2011 ident: 10.1016/j.jisa.2021.102940_b17 article-title: Practical real-time intrusion detection using machine learning approaches publication-title: Comput Commun doi: 10.1016/j.comcom.2011.07.001 – start-page: 51 year: 2019 ident: 10.1016/j.jisa.2021.102940_b20 article-title: Software defined network based architecture to improve security in a swarm of drones – year: 2019 ident: 10.1016/j.jisa.2021.102940_b7 – volume: 19 issue: 23 year: 2019 ident: 10.1016/j.jisa.2021.102940_b18 article-title: A survey on machine-learning techniques for UAV-based communications publication-title: Sensors doi: 10.3390/s19235170 – year: 2003 ident: 10.1016/j.jisa.2021.102940_b26 – year: 2019 ident: 10.1016/j.jisa.2021.102940_b6 – volume: 48 start-page: 1594 issue: 9 year: 2018 ident: 10.1016/j.jisa.2021.102940_b19 article-title: A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks publication-title: IEEE Trans Syst Man Cybern A doi: 10.1109/TSMC.2017.2681698 – volume: 159 year: 2020 ident: 10.1016/j.jisa.2021.102940_b8 article-title: Security in SDN: A comprehensive survey publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2020.102595 – volume: 8 start-page: 1468 year: 2019 ident: 10.1016/j.jisa.2021.102940_b11 article-title: Software-defined networking for unmanned aerial vehicular networking and security: A survey publication-title: Electronics doi: 10.3390/electronics8121468 – year: 2018 ident: 10.1016/j.jisa.2021.102940_b31 – start-page: 194 year: 2017 ident: 10.1016/j.jisa.2021.102940_b4 article-title: A review on cybersecurity vulnerabilities for unmanned aerial vehicles – volume: 9 issue: 16 year: 2018 ident: 10.1016/j.jisa.2021.102940_b12 article-title: A comprehensive survey on machine learning for networking: evolution, applications and research opportunities publication-title: J Internet Serv Appl – year: 2001 ident: 10.1016/j.jisa.2021.102940_b2 – ident: 10.1016/j.jisa.2021.102940_b21 doi: 10.1109/TrustCom.2012.187 – volume: 8 start-page: 98073 year: 2020 ident: 10.1016/j.jisa.2021.102940_b10 article-title: Softwarization of UAV networks: A survey of applications and future trends publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2994494 – start-page: 164 year: 2016 ident: 10.1016/j.jisa.2021.102940_b5 article-title: Autonomous vehicle security: A taxonomy of attacks and defences – year: 1981 ident: 10.1016/j.jisa.2021.102940_b24 – year: 2009 ident: 10.1016/j.jisa.2021.102940_b14 article-title: A detailed analysis of the KDD CUP 99 data set – ident: 10.1016/j.jisa.2021.102940_b27 doi: 10.1109/DASC.2016.7777970 – start-page: 361 year: 2017 ident: 10.1016/j.jisa.2021.102940_b30 article-title: An empirical comparison of stream clustering algorithms – year: 2016 ident: 10.1016/j.jisa.2021.102940_b29 – year: 1999 ident: 10.1016/j.jisa.2021.102940_b13 – start-page: 585 year: 2012 ident: 10.1016/j.jisa.2021.102940_b1 article-title: Cyber security threat analysis and modeling of an unmanned aerial vehicle system – year: 2003 ident: 10.1016/j.jisa.2021.102940_b28 – year: 2012 ident: 10.1016/j.jisa.2021.102940_b23 |
SSID | ssj0001219523 |
Score | 2.404528 |
Snippet | As drones become more and more frequent in industry and perhaps tomorrow in everyday life, the variety and sensitivity of their missions will increase.... |
SourceID | hal crossref elsevier |
SourceType | Open Access Repository Enrichment Source Index Database Publisher |
StartPage | 102940 |
SubjectTerms | AODV Computer Science Cryptography and Security FANET Machine Learning Networking and Internet Architecture Random Forest Classifier SDN Security architecture |
Title | Machine Learning and Software Defined Network to secure communications in a swarm of drones |
URI | https://dx.doi.org/10.1016/j.jisa.2021.102940 https://enac.hal.science/hal-03296179 |
Volume | 61 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8MwDI7GuHDhjXhOEeKGypq0aZrjNJjGY7sA0iQOVZoHDME2bQNu_HbiNkUgoR04No3T1klsx7U_I3QilFURj2iQ20QGMaF5IGiYBtYKrkPGJC-iCXv9pHsfXw3YoIbaVS4MhFV62V_K9EJa-5am52ZzMhw2bymghRGaUFIqfshgjzms8rNP8sPPQgQrqrxB_wAIfO5MGeb1DP-MqdN0AGIgwAfyt35aeqo8rYXm6ayjVW8y4lb5VhuoZkabaK0qx4D97txCD70iMNJgj5n6iOVI41snZz_k1OBzY91Njftl4Deej_EMnO0Gq59JIjM8HGGJZ47mFY8t1lNA899G952Lu3Y38LUTAsf6dB7EwqpUR8y4j5cGQOqJElxaZ50pHmkjhVYkjLSz39yupaGyTOSaW52kUaq1jHZQfeTG30U4Zu6MxhPDFVOxtFJYraRIcx3qkEgp9xCpOJYpDywO9S1esiqC7DkDLmfA5azk8h46_aaZlLAaC3uzaiKyX4sjc3J_Id2xm7XvBwCSdrd1k0FbGFHhjDfxTvb_OfgBWoGrMt7sENXn0zdz5AyUed4oVmADLbcur7v9Lzqt43Q |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NTxUxEJ_wcdALCmpERRqDJ7O-bXe7uz14ICJ5yHvvAiQkHmq3H_KIPsh7T4kX_yn_QWZ2uwQSwoGEa7sz20wnM9PprzMAW8oGm5WZSOpQmCTnok6USKskBFW6VEpTNmjC4ajoH-Vfj-XxAvzv3sIQrDLa_tamN9Y6jvSiNHvn43HvQFC1MC4KwVvHH5GV-_7vBZ7bZp_2dnCT3wux--Xwcz-JrQUSXFk1T3IVbOUy6ZUUxlMNd25VaQIGL7bMnDfKWZ5mDsMbVGqR2iBV7crgiiqrnDMZ8l2E5RzNBbVN-PiPX0vscGRKN9u0wIRWGB_rtLiyU7qkFuhaqWqCoqTL7Q5x8aRL7TaubvcprMQYlW23YliFBT9Zgydd_wcWzcEz-DZskJiexSKtP5iZOHaAhv3CTD3b8QEnHRu1SHM2P2Mzyu57Zq-_Spmx8YQZNkOaX-wsMDel9gHP4ehBJPoClibI_yWwXOKhsCx8aaXNTTAqOGtUVbvUpdwYsw68k5i2sZI5NdT4qTvI2qkmKWuSsm6lvA4frmjO2zoed34tu43QN7RRo6O5k-4d7trVD6h0d397oGkszYTCaFH94a_uyXwTHvUPhwM92Bvtv4bHNNOC3d7A0nz6229gdDSv3zbayOD7Q6v_JcwfH3U |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Machine+Learning+and+Software+Defined+Network+to+secure+communications+in+a+swarm+of+drones&rft.jtitle=Journal+of+information+security+and+applications&rft.au=Guerber%2C+Christophe&rft.au=Royer%2C+Micka%C3%ABl&rft.au=Larrieu%2C+Nicolas&rft.date=2021-09-01&rft.pub=Elsevier+Ltd&rft.issn=2214-2126&rft.volume=61&rft_id=info:doi/10.1016%2Fj.jisa.2021.102940&rft.externalDocID=S2214212621001551 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2214-2126&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2214-2126&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2214-2126&client=summon |