Securing of Unmanned Aerial Systems (UAS) Against Security Threats Using Human Immune System
Securing of Unmanned Aerial Systems (UAS) Against Security Threats Using Human Immune System
Abstract
UASs form a large part of the fighting ability of the advanced military forces. In particular, these
systems that carry confidential information are subject to security attacks. Accordingly, an Intrusion
Detection System (IDS) has been proposed in the proposed design to protect against the security
problems using the human immune system (HIS). The IDSs are used to detect and respond to attempts
to compromise the target system. Since the UASs operate in the real world, the testing and validation
of these systems with a variety of sensors is confronted with problems. This design is inspired by HIS.
In the mapping, insecure signals are equivalent to an antigen that are detected by antibody- based
training patterns and removed from the operation cycle. Among the main uses of the proposed design
are the quick detection of intrusive signals and quarantining their activity. Moreover, SUAS-HIS
method is evaluated here via extensive simulations carried out in NS-3 environment. The simulation
results indicate that the UAS network performance metrics are improved in terms of false positive rate,
false negative rate, detection rate, and packet delivery rate.
Keywords: Unmanned Aerial Systems, Security threats, IDS, HIS, Routing security, SUAS-HIS
1 Introduction
UASs or Aerial vehicles networks (AVNs) are defined as any individual aerial vehicle either in
communication with other vehicles, such as a Unmanned Aerial Vehicles (UAVs) with another UAV
(U2U), and a UAV with an Satellite (U2S), or are in communication with stationary infrastructures
such as an UAV with Traffic control tower (U2T), and a UAV with Ground station (U2G) [1]. A
typical scenario for communication among the UAVs is demonstrated in Figure 1. This scenario
includes multiple components and utilizes various links for communication. Each link is responsible
for transmitting certain types of data and information. In general, according to type of information
being transmitted, there should exist three different types of links in these networks, namely radio
communication, U2U and Satellite link. In the radio communication links, telemetry data, video,
audio, and control information are carried. Moreover, satellite links are responsible for carrying GPS,
weather, and meteorological information, in addition to the data carried by the radio communication
links. Employing UASs in the networks for ballistic missile defense is one of their applications with
the highest level of vitality. In such applications, the tasks for the UAVs are usually patrolling an
intermediary land stretched between the site where the ballistic missile is launched, and its intended
target. Since ballistic missiles can cruise at an extremely high speeds, they mandate the use of quick
detection methods to track and to eliminate. In specific, to increase the chance of successfully
intercepting a ballistic missile, it is essential to have swift detection and tracking system, capable of
detecting and tracking the missile right after it is launched. The designers working on ballistic missile
defense networks are aiming the system to be capable of intercepting the missiles during their initial
2 to 5 minutes of flight, which is called the boost phase. During the boost phase, if the trajectory of
the missile is directly away from the trajectory of the UAV, it will easily recede from the range of the
sensors on the UAV. Hence, the routing of the information used in the network of the sensors of the
ballistic missile should be addressed using networks of hybrid wireless sensors capable of complying
with high availability and requirements mandated due to security. To demonstrate the UAVs’
applications that have an innate time sensitivity, and to signify the urgency of providing security in
communication channels, this case is discussed in the following paper [2, 3]. However, despite the
advantage’s UAVs provide through various applications, since there are situations where no pilot
monitors the activities, they are potentially vulnerable against cyber threats. This intensifies the
emergence to design secure and reliable UASs and overcome the challenges to avoid damage and
destruction to other systems as well as human lives [2, 3].
A number of attacks, such as Wormhole (WH), Black hole (BH), Gray hole (GH), and Fake
Information Dissemination (FID), illegally penetrate the system. Once an unmanned system is affected
by an attack, removing the threat and bringing the system back online is a laborious task. It should be
mentioned that the common methods to secure information, such as encryption or intrusion detection
[4], are inadequate when dealing with such risks. To elaborate, the mentioned schemes do not consider
the sensor and actuator measurements compatibility factor with the physical process and control
mechanism of the UAV, which are substantial to the protection scheme. In the SUAS-HIS proposed
design, the malicious UAV is robust against four lethal attacks (WH, BH, GH, and FID) so that
intrusive operations are quickly identified and removed from the spying missions or top-secret
information surveillance. The proposed schema also improves critical standards of quality of service
including detection rates, false positive rates and false negative rates.
FID attack
2
Security framework aircraft
Sedjelmaci et al. [14] proposed a system to protect the UAVs against vital threats; threats targeting
data integrity and network availability. The proposed system employs a cyber-detection mechanism to
detect deteriorating attacks promptly, upon unfolding. A major issue this paper studied was minimizing
the false flags; since classifying a legitimate node may compromise the security system efficiency.
Hence, to address the issue, this paper proposed a model to estimate threats based on Belief approach.
In [15], Brust et al. proposed a defensive system for UAVs to intercept and escort a malicious aircraft
off the flight zone. The proposed defensive system is a UAV swarm, capable of self-organizing its
formation in the event of detecting an intruder, and chasing the malicious UAV as a networked
defensive swarm. In this paper, to provide a fully localized approach, the authors utilised the principles
of modular design. An innovative auto balancing clustering process is developed to realise the
formation based on interception and capture. The simulation results revealed that the resulting
networked defensive UAV swarm is flexible against communication losses.
Yoon et al. [16], proposed a solution to network channel or physical hardware hijacking of
commercial UAVs by anonymous attackers. The solution proposed here was to exploit an additional
encrypted communication channel, an authentication algorithm, and perform DoS attack through
Raspberry Pi to maintain UAV control in hijacking situations. The resulting system shows high
applicability to commercial UAVs.
Sedjelmaci et al. [17] proposed an IDRF to protect the UAV network against threats targeting
integrity of the data and availability of network. To our knowledge, this is the only instance of
developing a hybrid-detection technique in UAV networks (i.e., a combination of detection methods
based on rules and anomaly detection techniques), while considering the energy constraints of UAV
nodes. Simulation results demonstrated in [14] reveals a high attack detection ratio and low false-
positive alarms. Plus, the proposed framework requires low communication overhead for a quick
response to detected attacks.
In [18], Gao et al. presented a novel distributed algorithm for a team of UAVs to provide an online
solution for a self-organization problem in a mission based on search and attack in a hostile
environment. This problem requires solving a global optimisation problem, where the proposed
distributed SAMSOA separates into a number of local optimisation problems. To do so, each UAV is
considered as an individual subsystem and is assigned a dedicated processor, to solve its local
optimisation problem. On the other hand, exchanging information in the team enables each subsystem
to optimise its decision according to multiple UAVs system. The proposed algorithm considers two
separate flight modes, namely normal flight mode and threat avoidance flight mode. In normal mode,
the modelled search–attack mission maximises the surveillance coverage ratio, while minimising the
existence time for each target. Then, an improved distributed ACO algorithm is designed to generate
proper path points. Finally, the path points are connected smoothly by a Dubins curve.
In [19], based on edge matching, a novel approach to detect targets is proposed for UAV formation.
A potential function with windowed edges determines the field of attraction for the edges similar to the
windowed edges. Then, the problem of detecting the targets based on the edges is formulated as an
optimisation problem. Afterwards, to specify location, angle of rotation, and an arbitrary template scale
over a specific image, this paper proposed an improved bird swarm algorithm named competitive bird
swarm algorithm. To aid the local optimum obtained via the original Bird Swarm Algorithm, converge
to global optimal point faster and with more stability, a strategy called “disturbing the local optimum”
is proposed. In Table 1, a taxonomy of the common cyber-security threats detection methods developed
to protect the UAS against malicious threats is highlighted.
Table 1: Cyber security threats detection schemes for UAS.
Security The proposed design performance Advantages Disadvantages / constraints
schemes
[10] A thorough investigation on various schemes of cyber • high accuracy detection • Need for additional
detection in AVN is carried out here. Plus, a number of • high prediction rates hardware
cyber-attacks that are susceptible of occurring is • low robustness
highlighted in this network. Moreover, in order to detect • high complexity
and impede occurring of threats that aim communication
systems in aircrafts, a security framework named SFA is
proposed in this study.
[13] The design uses the neural network techniques to defend • Full coverage of attacks: • Information about all
against Wireshark attacks, password theft, Trojan virus password theft, Wireshark, UAVs in the IDS agent
and so on to have a safe UAV system MITM attack, Trojan virus and • Increased overhead
DDoS attack
• Flexibility of the design
High intelligence in using neural
networks
[9] In this design, various security threats for UAV systems • Simple architecture • Need for additional
have been analyzed cyber-security threat model have • Covering more attacks hardware
been proposed to detect possible paths affected by the • Low accuracy rate
attack. This model uses three important communication
components in aircraft carriers. The model also helps
designers and users of UAV systems to detect various
system threats and apply various techniques to eliminate
these types of threats to reduce the effects of these types
of attacks.
[11] In this design an adaptive specification-based system is • Using Ant Colony Multiple • High overhead in
used for detecting UAV in which the IDS3 agent is used Clustering Model detecting attacks
in a distributed system to detect whether the UAVs are • High accuracy in detecting • Not covering more lethal
normal or malicious attacks • Need for additional
• Reduced false positive rate hardware
• Reduced false negative rate
• Continuity of operation
[14] This paper proposes a cyber-security system to protect • Has high speed and high • Not covering other
UAVs from cyber-attacks that disturb the data integrity accuracy in detecting cyber- lethal attacks
and access the network. To face with this lethal attack, attacks, Has the lowest false • High energy
an attack estimation model has been proposed based on positive rate, Has the lowest consumption
the belief method false negative rate
[15] The design offers an air defense system to defend • The use of the modular concept • Excessive blocking of
malicious UAVs outside the flying area. The proposed for a completely localized maneuvers
UAV defense system includes an air defense capability approach • Random noise
that can organize itself in the event of intrusion detection • The clustering process with generation in three
and track the malicious UAV as a network shooter automatic equilibrium to directions that injects
realize the formation of the the overhead into the
UAVs and capture their network
formation • Not covering most
• Resistance to intruding UAVs lethal attacks
[16] In this study, a method was developed to prevent the • Accurate identification of the • High overhead
abduction of network channels or physical hardware by attackers operation due to the use
unidentified attackers on commercial airless systems. • Sending data securely for the of encryption channels
This paper proposes an additional encrypted use of two channels with high • Need for additional
communication channel, authentication algorithm, and reliability hardware
denial of service attack through the likelihood of pi and • High communication
its high applicability in commercial UAV systems delay
[17] In this design, a set of detection and response techniques • Smart activation of the • Need for additional
is proposed for monitoring UAV behaviors and intrusion monitoring process hardware
categorized them into a suitable list (normal, abnormal, • High detection rate
suspicious and destructive UAV) according to cyber • Low communication
threats. overhead
• Rapid intruder detection
The previous works to design IDS for the UAS have been listed in Table 2 (”-” indicates the
indefinite characteristics).
Table 2: Summary of the approaches for UAS literature.
References Placement schema Detection schema Attack type Validation schema
[12] Centralized Hybrid Cooperative attack _ Simulation
[13] Hybrid Anomaly-based DoS _ Simulation
[9] Distributed Signature-based Cyber-security attack _ None
[11] Hybrid Hybrid Cyber-attack _ Simulation
[14] Hybrid Hybrid Vital attacks _ Simulation
[15] Distributed Signature-based MIMA, replay and impersonation attack _ Simulation
[16] – Signature-based DoS attacks _ Empirical
[17] Hybrid Anomaly-based DDoS _ Empirical
[18] – Signature-based DoS attacks _ None
[19] Distributed Signature-based Distributed attack _ Simulation
3 HIS
HIS is the basic protection system of human that supports the human to survive environmental threats
and diseases. Moreover, by resembling the internet to human beings in a number of ways, it can be
said that an immune system could be developed for the internet based on the fundamentals of HIS.
Immunity system refers to all bodily mechanisms responsible in protecting the body against
detrimental agents in the environment such as microorganisms and their products, chemicals, drugs
and pollen grains. The HIS is comprised of three defensive lines functioning in cooperation. The first
layer consists of skin, mucous membranes, and secretions of skin. As for the second layer, phagocytic
white blood cells, antimicrobial proteins, and the inflammatory responses are the subsections. Finally,
the third layer, which is the specific defensive mechanisms, includes lymphocytes and antibodies.
Antibodies respond to particular microorganisms, aberrant body cells, toxins and other substances
marked by foreign molecules, in specific ways. The human immunity system is of two types: Innate
immunity system, and acquired immunity system [20, 21]. Figure 3 illustrates the lymphoid organs,
and their main functions.
( r -s )
2
Euclidean D= 0 0
i=o
where r and s respectively represent different characteristics of columns, m is the number of data.
_____
- Clonal Selection Algorithm: Clonal selection describes a response to an antigen by the immune
system. The antibodies that can recognize the antigens multiply and are chosen over ones that do
not. This allows detectors to clone their parents by a mutation mechanism with high rates while
the antibodies which are self-reactive get eliminated. This act is known as clonal selection.
CLONALG was the algorithm created by De Castro which is based on clonal selection [24]. This
algorithm takes into account all counts about cloning the best antibodies, affinity maturation,
taking out non-stimulated antibodies, and maintaining diversity. Clonal selection has a great
strategy for optimization and pattern recognition. This helps evolve the immune system, so it can
recognize the antigens that it met in the past.
- Negative Selection Algorithm: According to a general definition, a negative selection algorithm
is any algorithm with classification aim that imitates the negative selection process in the
vertebrate immune system; an idea proposed and developed first by Forrest et al [25]. Such
algorithms are part of one-class classifiers; meaning their training sessions are performed on un-
labelled data, which are sampled from a certain sub-region of the problem domain. Then, the
results are utilised to determine whether the new and unseen data points belong to the same sub-
region or not. The algorithms for negative selection are based on agents that are called detectors,
which can patterns matching with small problem domain subsets. For instance, in the problem
domain illustrated as U = 0,1 , consisting binary strings of length 5, the pattern 1***1 is a
5
candidate for being a detector, since it matches with all the strings starting and ending with 1.
[23].
- Learning: In an HIS, agents learn to distinguish, through actions such as negative selection, clonal
selection, danger theory, or human immune networks, self and non-self [24].
- Adaptation: The immune system is capable of initiating attacks on invaders that the innate
defensive system is incapable of removing, via an acquired or adaptive immunity system. Such
adaptive immune system can be directed to specific types of invasions, and can be modified via
being exposed to agents imposing such invasions. It generally includes white blood cells named
lymphocytes. In specific, B and T-cell lymphocytes facilitate the recognition process and aid in
destroying specific types of substances. Immunogens (or antigens) are substances that can
generate response from the lymphocytes. However, antigens do not attack the microorganisms
themselves. Instead, substances existing in the microorganisms including toxins or enzymes are
considered foreign by the immune system. Responses created by the immune system that are of
adaptive nature normally target the provoking antigens and thus, are referred to as antigen-specific
[24].
In Algorithm 1, the pseudo code for Negative Selection Algorithm is demonstrated [26].
Algorithm 1: Pseudo code for Negative Selection Algorithm
1: Procedure Negative Selection Algorithm
2: Input: A S ⊂ Ui ("self-set"); a set Mo ⊂ Ui ("monitor set"); an integer ni
3: Output: For each element mo ∈ Mo , either "normal UAV" or "malicious UAV".
4: // phase I: Training
5: de ← empty set
6: while | De | < ni do
7: de ← the random detector set
8: if de does not match any element of Si then
9: insert de into De
10: End if
11: End while
12: // phase II: Classification
13: For each mo ∈ mo do
14: if mo matches any detector de ∈ De then
15: output " mo is non-self" (an attacker)
16: else
17: output " mo is self"
18: End if
19: End For
20s: End Procedure
The major acronyms and notations used in this paper are provided Table 4.
Table 4: Major acronyms and notations used in this paper.
Acronyms Abbreviated acronyms Notation Abbreviated notations
NS − 3 Network Simulator 3 RREQ Route Request
NAM Network Animator RREP Route Reply
IDS Intrusion Detection System DA Denoising Auto Encoder
HIS Human Immune System UAVS Source UAV
SUAS − HIS Securing of Unmanned Aerial Systems by UAVD Destination UAV
Human Immune System
UAS Unmanned Aerial Systems Ts Surveillance Threshold
UAV Unmanned Aerial Vehicles DR Detection rate
AVN Aerial Vehicles Networks Gsrc Ground station source
U 2U UAV-UAV GDST Ground station destination
U 2S UAV-Satellite m Malicious
U 2T UAV- Traffic control tower Pm (r ) Probability malicious (route)
U 2G UAV-Ground station SSI Signal Strength Intensity
GPS Global Positioning System Fr Fitness route
WH Wormhole Psb Probability subversive behavior
BH Blackhole Ns Number of packets
GH Grayhole RTTi Round Trip Time
FID Fake Information Dissemination MaxRTT Maximum RTT
FPR False positive rate SSI i Signal Strength Intensity i
FNR False negative rate MaxSSI Maximum SSI
TPR True positive rate Agi Anti-gen
TNR True negative rate Abi Anti-body
PC Packet counter D Distance
SFA Security Framework Aircraft R Route
ROS Robot Operating System AS Antigen Self
DoS Denial of Service SPCUAV The number of packets sent
ACO Ant Colony Optimization
RTT Round Trip Time
4.4 Details of the proposed method: Securing the UASs against security threats using HIS
After the source UAV or ground station receives the first response message, the default air systems
detect the shortest route and sends packets by receiving the first message from other UAVs.
Accordingly, it pays no attention to the security of the communication channel (the absence of a WH,
BH, a GH and FID attacks). However, in the proposed method, the UAV examines the security of
routes by the HIS algorithm and then sends packets through the safest route. The overall idea of the
proposed method is that as in the HIS, Abi are taught to discover and remove malignant Agi , here a
set of rules are created and updated to track the routes infected by attacking UAVs and exclude them
from the cycle. The proposed mapping and comparison between the HIS and UAS under the attack
is shown in Table 4. The details on how to use the mapping are provided in Table 4.
Table 4: The mapping between HIS and UASs.
Antigen Structure The set of all routes connecting the source to destination UAV.
Antibody Structure Attack-detection rules based on ( SSI , RTT), and packets count
backwards from the destination).
Colonization Reproduction of antibodies that best match the antigens.
Affinity value The sum of SSI , RTT, and packets count backwards from the
destination.
Mutation Under identical conditions, the fastest route response is selected.
4.5 Assessing the safety and performance of the routes with UAVs
At this stage, the intended antibodies are designed to provide security and performance for both UAVs
and ground stations simultaneously. This design is done in the following three phases:
Phase 1: Initial assessment of candidate routes using Hello packets
At this phase, each route for which the route response is received is tested in terms of security.
Accordingly, a "Hello packet” is sent through each route, and the target UAV is required to send a
confirmation packet for those routes containing the UAVs if the "Hello packet" is received.
Obviously, if a route is affected with malicious UAVs, the “Hello packet" will not be delivered and
the confirmation packet will not be received. Under these conditions, the probability of rout
contamination increases i.e. the Pm (r ) value for the r route increases but if the “Hello packet" reaches
its destination, a confirmation packet will be received, which means that there is no malicious UAVs,
so the Pm (r ) value decreases. The process of sending “Hello packet" is repeated 4 times.
Initial value of the Pm(r) variable: If, according to the attacker UAV detection mechanism the route
is confirmed, the initial Pm (r ) value will be zero but if the route is not approved, Pm (r ) value will be
100. Then, in order to update it, the source UAV sends a "Hello packet" four times from all possible
routes to the destination UAV. If the confirmation packet is sent by the destination UAV, 25 units
will be deducted from the Pm (r ) variable; but if the confirmation packet is not sent by the destination
UAV, 15 units will be added to the Pm (r ) variable. This is repeated 4 times and Pm (r ) is updated for
all routes (threshold value). If the Pm (r ) value is greater than 50, that route will be set aside as a
contaminated route (rejected). Otherwise, that route will be sent to the next part i.e. Phase 2 to
evaluate the safety and efficiency of the routes.
Phase 3: Assessing the safety and efficiency of the routes that went through Phase 1 and Phase
2
Given that, the attacks show the number of hops below the actual value, if a route has a lower number
of hops, the probability that the route is infected increases. Meanwhile, the low RTT and high SSI of
the UAVs on the route, in addition to improve the route safety in terms of attacks, it is also desirable
based on the route performance. Therefore, the optimal route can be considered as a route that
maximizes the Fr index according to Eq. (3).
MaxRTT SSI i (3)
Fr ( RTTi , SSI i ) = +
RTTi MaxSSI
MaxRTT
The meaning of the equation is that the routes which have a lower RTT will be chosen
RTTi
as the intended route.
MaxRTT
Since among the values equation yields as output for all the routes, the maximum value
RTTi
is selected as the shortest route.
i SSI
The meaning of the equation is that the routes with higher SSI get selected as the
MaxSSI
intended route. Since among the values this equation yields for all routes, the maximum value is
selected as the higher SSI .
In Eq. (4), the Pm (r ) variable calculates the probability of the r candidate routes being malicious. On
the other hand, (1 − Pm ( r ) ) presents the probability of the r candidate routes being healthy. Also,
equation Fr ( RTTi , SSI i ) selects the route which has a low RTT and high SSI . By combining these
two, we created the UAVSR equation in order for routes to be selected from the r candidate ones which
are less likely to be malicious. Therefore, the chosen route is the one which has both security and
high performance.
Since malicious UAVs always insert their location incorrectly in the RREP packet, due to this
problem, we use RTT to obtain the precise distance between UAVs in order to forward the packet to
the UAV which has the shortest distance. Also, by calculating SSI for each UAV, we notice their
fake signals. In order to deliver the desired package to a healthy UAV. By doing so, malicious
activities of WH, BH, GH, and FID attacks will be prevented.
Example:
Pm (route 1) = 0.25; Pm (route 2) = 0.50; Pm (route 3) = 0.40;
According to the UAVSR = (1 − Pm (r ) ) * Fr ( RTTi , SSI i ) equation, it will be as follows:
As seen in the examples, the route which had a lower RTT and a higher SSI was selected as the
output.
Antibody and antigen structure: Antibody is considered as the three features of limiting the attacks
( RTT , SSI and reverse packet counting from destination) and antigen is the total set of routes for
which the route response are achieved.
Affinity: As defined in the HIS, antibodies that have a stronger binding to an antigen than other
antibodies are selected as a safe antibody for composition. In the proposed method, affinity is selected
as routes with less RTT, high SSI and reverse packet counting from destination. Otherwise, the
candidate route will be eliminated.
Match: In this section, the responses of the routes collected on the UAV of the source are compares
in terms of the two below features and the safest route is selected. Meanwhile, the most important
feature of the attacker detection mechanism is that they are modified over time and defined in a way
that can be easily corrected and learned.
Details of the first and second features of the antibody in matching section: These details are
expressed in two following features:
First feature )RTT between the source UAV and destination UAV): The RTT is calculated for all
routes received from the source UAV to destination UAV. The objective of the first feature is to
calculate the precise and correct distance between UAVs in order to prevent the malicious operation
of the intruder UAV which makes its distance seem less. This is done using RTT.
Second feature (SSI): The attacker UAV generates high-intensity signal to control the target UAV.
In such detection, it collects all SSIs generated by the transmitters UAVs and then compares them
with normal UAV SSIs. Accordingly, the suspicious transmitter signal and normal UAV signals are
differentiated. The objective of the second feature is to distinguish the SSIs created by the malicious
UAV from the ones created by healthy UAVs. This is done this way that we calculate the difference
between the SSI with the highest signal and all other received SSIs. Now, if this difference is bigger
than the threshold value, we conclude that the considered SSI is not safe and remove it. this step is
performed on all received SSIs. The reason for comparing to the threshold value is that the intruder
UAV wants to make the destructive attack (4 attacks we mentioned before) as close to the source
UAVs as possible. This is because the malicious UAV being closer is the most dangerous type of
attack since it will remove the most amount of data traffic.
Completion of detector set: For all routes the Pm (r ) value of which is less than 50, the algorithm 2
is used to choose the safest route. The pseudo code of the SUAS-HIS is given in Algorithm 2.
According to algorithm 2, the Fr function is calculated for each route and the route that has a larger
number is selected as the safest route.
Hyper mutation: Among the assessed routes, routes with almost identical conditions are transmitted
to the hyper mutation stage so that the routes are assessed with a different criterion (under the equal
terms, the fastest route response is selected) to select the safest route for UAVs.
Registration in safety memory: routes that have the largest number in accordance with Eq. 3, are
the safest route and are registered in the memory for later use.
TPR (7)
DR = *100 where All = TPR + TNR + FPR + FNR
TPR + FNR
n (8)
1 X i
PDR = * i =1
n
*100%
Y
n
i
i =1
Parameters Value
First scenario Number of UAVs: 100 to 400
Simulation time: 1400 S (fixed)
Network size (m x m): 6000 x 6000
Second scenario Number of UAVs: 400 (fixed)
Simulation time: 200 to 1400 S
Network size (m x m): 4000 x 4000
Channel type Channel/Wireless channel
MAC Layer MAC/802.11.b
Traffic type CBR
UAV speed 180 m/s
Transmission layer UDP
Packet size 512 Byte
Malicious UAV 0 - 0.30
Type of attacks FID, BH, GH, and WH
Transmission range 30 M
Table 6-9 compares the performance of SUAS-HIS with that of Cyber Security System, BRUIDS
and SFA in terms of FPR, FNR, DR, and PDR.
Table 6: DR (in %) of various frameworks with varying degree of malicious UAVs.
Misbehaving DR (%)
UAV ratio
Cyber Security System BRUIDS SFA SUAS − HIS
0 96.63 95.3 95.2 99.5
0.05 94.49 94.5 93.57 98.2
0.10 85.46 86.1 86.8 96.38
0.15 78.35 79.5 81.37 94.27
0.20 69.19 72.8 75.43 92.28
0.25 55.34 62.7 71.16 89.7
0.30 51.14 59.7 65.67 87.4
Table 7: FNR (in %) of various frameworks with varying degree of malicious UAVs .
Table 8: FPR (in %) of various frameworks with varying degree of malicious UAVs .
Table 9: PDR (in %) of various frameworks with varying degree of malicious UAVs .
Table 10 represents average values of various frameworks for all metrics under security threats.
Table 10: Average values of various frameworks for all metrics under security threats.
Cyber Security System Number of UAVs (7% of overall nodes) 77.91 10.04571429 18.21 72.2285714
FPR: Figure 5 demonstrates the comparison of the proposed SUAS-HIS framework against three
approaches, one game theory-based (SFA), the second adaptive behavior-rule specification-based
(BRUIDS), and other one risk-based algorithm (Cyber Security System) frameworks. As shown in
the Figure 5(a), when the number of normal UAVs ranged from 100 to 400 and the rate of malicious
UAVs increased from 7% to 21%, the FPR generated by the proposed design had a slight and
moderate growth compared to the other three designs. The FPR of the proposed design is less than
3% when number of normal UAVs and the rate of malicious UAVs are equal to 400 and 7%,
respectively. However, this amount is set to 20% for the SFA, 25% for the BRUIDS, and 35% for the
Cyber Security System. The reason for the superiority of the proposed design is the rapid detection
of malicious UAVs and their removal by cooperation between ground stations and normal UAVs that
the process is performed by the trained rules stored in memory. Also, the other reason is that the
SUAS-HIS detects security threats and isolates them from the UAS network, thereby decreasing the
FPR that occurs as a result of the attacks. As shown in the Figure 5(a), (b), (c) and (d), SUAS-HIS
decreases the FPR by more than 11.98, 14.87, and 25.13% those of SFA, BRUIDS, and Cyber
Security System models, respectively.
(a) (7% malicious UAV) (b) (14% malicious UAV)
Figure 5: Comparison of the SUAS-HIS proposed scheme, Cyber Security System, BRUIDS and SFA models in term
of FPR.
Figure 6 shows the comparison results of the SUAS-HIS proposed scheme, in terms of FPR at
different type of attacks and different TS .
Figure 6: Comparison of the SUAS-HIS proposed scheme, in terms of FPR at different type of attacks and different TS .
FNR: Figure 7 shows the comparison of the SUAS-HIS proposed scheme, SFA, BRUIDS, and
Cyber Security System models in term of FNR in lethal attacks. (a) Number of UAVs (7%
malicious), (b) Number of UAVs (14% malicious), (c) Number of UAVs (21% malicious), (d)
Simulation times respectively. As shown in the diagrams, the FNR of the SUAS-HIS proposed
schema has increased slightly but this value is much higher in the SFA, BRUIDS, and Cyber Security
System. In Figure 7(a), the FNR of the proposed schema is less than 2% when the number of normal
UAVs is 400, but for the other three approaches, it is 12, 14 and 18% respectively. In Figure 7(b),
when the rate of malicious UAVs is 14%, it is less than 4% in the proposed design but this amount
is 7, 12, and 22% for the other three methods respectively. Figure 7(c) explains the FNR under
security threats with number of UAVs (21% malicious UAV). The result indicates in Figure 7(d)
that, with the traditional technique, the FNR during security threats at simulation time 200 is
approximately 6%, which decreases to approximately 4% at 1400 second in a simulation time
condition. As shown in the Figure 7(a), (b), (c) and (d), SUAS-HIS decreases the FNR by more than
11.97, 15.3, and 25.74% those of SFA, BRUIDS, and Cyber Security System models, respectively.
Figure 7: Comparison of the SUAS-HIS proposed scheme, Cyber Security System, BRUIDS and SFA models in term
of FNR.
The comparison results of the SUAS-HIS proposed scheme, in terms of FNR at different type of
attacks and different TS are provided in Figure 8.
Figure 8: Comparison of the SUAS-HIS proposed scheme, in terms of FNR at different type of attacks and different TS .
DR: Figure 9 shows the comparison of the SUAS-HIS proposed scheme, SFA, BRUIDS, and Cyber
Security System models in term of DR. (a) Number of UAVs (7% malicious), (b) Number of UAVs
(14% malicious), (c) Number of UAVs (21% malicious), and (d) Simulation times respectively. As
shown in the Figure (a), the DR in each of the four methods is reduced according to two scenarios,
especially when the number of malicious UAVs is high. This reduction is much higher for the Cyber
Security System than for other mechanisms. The SUAS-HIS proposed scheme can detect all of the
above attacks at a DR higher than 95%. This result is achieved when the number of normal UAVs
and the rate of malicious UAVs are equal to 400 and 21%, respectively. The reason for the superiority
of the SUAS-HIS is the rapid detection of malicious UAVs and their removal by mapping of unsafe
and antigenic routes, which are discovered by the model trained with antibody and removed from the
operation cycle. As shown in the Figure 9(a), (b), (c) and (d), SUAS-HIS increases the DR by more
than 20.73, 24.4, and 37% those of SFA, BRUIDS, and Cyber Security System models, respectively.
Figure 9: Comparison of the SUAS-HIS proposed scheme, Cyber Security System, BRUIDS and SFA models in term
of DR.
Figure 10 shows the comparison results of the SUAS-HIS proposed scheme, in terms of DR at
different type of attacks and different TS .
Figure 10: Comparison of the SUAS-HIS proposed scheme, in terms of DR at different type of attacks and different TS .
PDR: Figure 11 demonstrates the relationship between PDR, number of UAVs, and Simulation
times. With 200 active UAVs, the PDR is relatively low for three the SFA, BRUIDS, and Cyber
Security System. The reason for this is the fact that in such conditions, some packets fail to reach
destination in the designated timeframe. However, since increasing the number of UAVs results in
more packets being delivered to the destination, using more UAVs would slightly improve the PDR.
When the number of employed UAVs is 200 and 400, due to random factors occurring in simulation,
a slight degradation is witnessed in the SUAS-HIS ratio of packet delivery. However, when the
simulation times is in range of 600 to 1400, SUAS-HIS is capable of generally outperforming all
current approaches. As shown in the Figure 11(a), (b), (c) and (d), SUAS-HIS increases the PDR by
more than 18.5, 21.7, and 23.81% those of SFA, BRUIDS, and Cyber Security System models,
respectively.
Figure 11: Comparison of the SUAS-HIS proposed scheme, Cyber Security System, BRUIDS and SFA models in term
of PDR.
The comparison results of the SUAS-HIS proposed scheme, in terms of PDR at different type of
attacks and different TS are provided in Figure 12.
Figure 12: Comparison of the SUAS-HIS proposed scheme, in terms of PDR at different type of attacks and different TS
The simulation was once again considered with a dynamic TS of 0, 0.1, and 0.2 where the diagrams
were obtained using different values of TS . As seen in the diagrams, the performance of the proposed
method in the mentioned criteria is presented by increasing the value of parameter TS . When TS is set
to 0, the proposed defense mechanism (SUAS-HIS) gets activated immediately and will react to the
operation of malicious UAVs in order to stop them and prevent lots of packets from being removed by
the malicious UAVs. If TS is set to 0.1, SUAS-HIS will be activated after 10 percent of the packets are
deleted and the malicious operation will be prevented. Finally, if TS is set to 0.2, it means that after 20
percent of the packets are lost, SUAS-HIS will start operating.
As is clearly demonstrated in simulation results, employing UAVs to establish a real-time
communication is not highly efficient. Instead, they should be potentially employed as assistive
mediums to create or improve the level of communication in environments with special characteristics.
For instance, in Linear Sensor Networks based on UAVs or temporary communications, UAVs are an
easy-to-deploy and low-cost means of data transfer.
6 Conclusion
In a UAS, in order to protect the continuity of the operation, it is imperative to detect attackers, whilst
limiting the ratios of FPR and FNR. In this paper, an IDS has been proposed in the SUAS-HIS method to
protect against the security problems using the HIS. In the SUAS-HIS, the malicious UAV is robust against
four lethal attacks (WH, BH, GH, and FID) so that intrusive operations are quickly identified and removed
from the spying missions or top-secret information surveillance. The IDSs are used to detect and respond
to attempts to compromise the target system. This design is inspired by HIS. In the mapping, insecure
signals are equivalent to an antigen that is detected by antibody-based training patterns and removed from
the operation cycle. Among the main uses of the proposed design are the quick detection of intrusive signals
and quarantining their activity. SUAS-HIS is more efficient than the Cyber Security System, BRUIDS and
SFA approaches under security threats because not only it detects the malicious node beforehand but also
it isolates the malicious node and restore the accused node after the penalty period. In our analysis, the
performance of our proposed SUAS-HIS scheme is evaluated using NS-3. The results confirmed that our
scheme is capable of exhibiting high-levels of security and high ratio of detection (exceeding 92.93%). It
addition, our proposed scheme has high PDR (more than 64.41%), low FPR (less than 6.89%), and low
FNR (less than 3.95%), in comparison with the other approaches currently being employed.
Reference
1. Colomina, I. and P. Molina, Unmanned aerial systems for photogrammetry and remote sensing: A review.
ISPRS Journal of photogrammetry and remote sensing, 2014. 92: p. 79-97.
2. Jamali, S. and R. Fotohi, DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and
artificial immune system. 2017. 73(12): p. 5173-5196.
3. Ouédraogo, M.M., et al., The evaluation of unmanned aerial system-based photogrammetry and terrestrial
laser scanning to generate DEMs of agricultural watersheds. Geomorphology, 2014. 214: p. 339-355.
4. Chen, T.M., et al., Intrusion detection. IET Engineering & Technology Reference, 2014: p. 1-9.
5. Loukas, G., et al., A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles. Ad
Hoc Networks, 2019. 84: p. 124-147.
6. García-Magariño, I., et al., Security in networks of unmanned aerial vehicles for surveillance with an agent-
based approach inspired by the principles of blockchain. Ad Hoc Networks, 2019. 86: p. 72-82.
7. Gurung, S. and S. Chauhan, A novel approach for mitigating gray hole attack in MANET. 2018. 24(2): p.
565-579.
8. Panda, S. GPS Hash Table Based Location Identifier Algorithm for Security and Integrity Against Vampire
Attacks. in Cyber Security: Proceedings of CSI 2015. 2018. Springer.
9. Javaid, A.Y., et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. in
Homeland Security (HST), 2012 IEEE Conference on Technologies for. 2012. IEEE.
10. Sedjelmaci, H. and S. Senouci, Cyber security methods for aerial vehicle networks: taxonomy, challenges
and solution. 2018: p. 1-17.
11. Mitchell, R., R. Chen, Man, and C. Systems, Adaptive intrusion detection of malicious unmanned air
vehicles using behavior rule specifications. 2014. 44(5): p. 593-604.
12. Abusitta, A., et al., A deep learning approach for proactive multi-cloud cooperative intrusion detection
system. Future Generation Computer Systems, 2019.
13. Rani, C., et al., Security of unmanned aerial vehicle systems against cyber-physical attacks. 2016. 13(3): p.
331-342.
14. Sedjelmaci, H., S.M. Senouci, and M.-A. Messous. How to detect cyber-attacks in unmanned aerial vehicles
network? in Global Communications Conference (GLOBECOM), 2016 IEEE. 2016. IEEE.
15. Brust, M.R., et al. Defending Against Intrusion of Malicious UAVs with Networked UAV Defense Swarms.
in Local Computer Networks Workshops (LCN Workshops), 2017 IEEE 42nd Conference on. 2017. IEEE.
16. Yoon, K., et al. Security authentication system using encrypted channel on UAV network. in Robotic
Computing (IRC), IEEE International Conference on. 2017. IEEE.
17. Sedjelmaci, H., et al., A hierarchical detection and response system to enhance security against lethal cyber-
attacks in UAV networks. 2018. 48(9): p. 1594-1606.
18. Gao, C., et al., A self-organized search and attack algorithm for multiple unmanned aerial vehicles. 2016.
54: p. 229-240.
19. Wang, X., et al., Edge-based target detection for unmanned aerial vehicles using competitive Bird Swarm
Algorithm. 2018. 78: p. 708-720.
20. Seyedi, B., & Fotohi, R. NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT)
function for trust Internet of Things. The Journal of Supercomputing, 1-24. doi:10.1007/s11227-019-03143-
7
21. Sarkohaki, F., et al., An efficient routing protocol in mobile ad-hoc networks by using artificial immune
system. 2017.
22. De Castro, L.N. and F. Von Zuben, Dezembro de, Tech. Rep, Artificial immune systems: Part I–basic theory
and applications. 1999. 210(1).
23. Mabodi, K., Yusefi, M., Zandiyan, S., Irankhah, L., & Fotohi, R. Multi-level trust-based intelligence schema
for securing of internet of things (IoT) against security threats using cryptographic authentication. The
Journal of Supercomputing, 1-25. doi:10.1007/s11227-019-03137-5
24. Irimia, R.-E. and M. Gottschling, Taxonomic revision of Rochefortia Sw.(Ehretiaceae, Boraginales).
2016(4).
25. Dasgupta, D. and S. Forrest, Tool breakage detection in milling operations using a negative-selection
algorithm. 1995, Technical report CS95-5, Department of computer science, University of New ….
26. Hatata, A., et al., An optimization method for sizing a solar/wind/battery hybrid power system based on the
artificial immune system. 2018. 27: p. 83-93.
27. Fotohi, R., & Bari, S. F. (2020). A novel countermeasure technique to protect WSN against denial-of-sleep
attacks using firefly and Hopfield neural network (HNN) algorithms. The Journal of Supercomputing, 1-27.
doi: 10.1007/s11227-019-03131-x
28. Behzad, S., R. Fotohi, and S. Jamali, Improvement over the OLSR routing protocol in mobile Ad Hoc
networks by eliminating the unnecessary loops. International Journal of Information Technology and
Computer Science (IJITCS), 2013. 5(6): p. 2013.
29. Fotohi, R., et al., An Improvement over AODV routing protocol by limiting visited hop count. International
Journal of Information Technology and Computer Science (IJITCS), 2013. 5(9): p. 87-93.
30. Fotohi, R., Y. Ebazadeh, and M.S. Geshlag, A new approach for improvement security against DoS attacks
in vehicular ad-hoc network. International Journal of Advanced Computer Science and Applications, 2016.
7(7): p. 10-16.
31. Consortium, N.-. ns-3 network simulator. 2018.
32. Behzad, S., R. Fotohi, and F. Dadgar, Defense against the attacks of the black hole, gray hole and wormhole
in MANETs based on RTT and PFT. International Journal of Computer Science and Network Solutions
(IJCSNS), 2015. 3(3): p. 89-103.
33. Jamali, S. and R. Fotohi, Defending against wormhole attack in MANET using an artificial immune system.
2016. 21(2): p. 79-100.
34. Fotohi, R. and S. Jamali, A comprehensive study on defence against wormhole attack methods in mobile Ad
hoc networks. International journal of Computer Science & Network Solutions, 2014. 2: p. 37-56.
35. Fotohi, R., R. Heydari, and S. Jamali, A Hybrid routing method for mobile ad-hoc networks. Journal of
Advances in Computer Research, 2016. 7(3): p. 93-103.
36. Manesh, M.R. and N. Kaabouch, Cyber Attacks on Unmanned Aerial System Networks: Detection,
Countermeasure, and Future Research Directions. Computers & Security, 2019.
Reza Fotohi received his B.Sc. degree in computer software technology engineering
from university of applied science and technology, Shabestar, IRAN (2009) (selected
as the best student). M.Sc. degree in computer software engineering from Islamic Azad
University (IAU), Shabestar, IRAN (2013), under the supervision of Dr. Shahram
Jamali associate professor University of Mohaghegh Ardabili (UMA) (selected as the
best student). From 2012 until now, he is a lecturer in the department of computer
engineering, PNU and UAST university. Iran. From 2015, M.Sc. Fotohi is a member of reviewer the Applied
Soft Computing (Elsevier, ISI-JCR), Artificial Intelligence Review (Springer, ISI-JCR), Human-centric
Computing and Information Sciences (Springer, ISI-JCR), The Journal of Supercomputing (Springer, ISI-
JCR), Wireless Personal Communications Journal (Springer, ISI-JCR), National Academy Science Letters
(Springer, ISI-JCR), KSII Transactions on Internet and Information Systems (ISI-JCR), and The Turkish
Journal of Electrical Engineering & Computer Sciences (ISI-JCR). His research interests include computer
networks, Internet of Things (IoT), Unmanned Aerial Systems (UASs), wireless networks, network security,
cyber security, Artificial Immune System (AIS), Fuzzy Logic Systems (FLS), and NS-2, NS-3, Cooja
Simulation. He is currently student member of the IEEE. He is author and coauthor of more than 10 journal
and international conferences papers. His papers have more than 175 citations with 9 h-index.