In smart cities, unmanned aerial vehicles (UAVS) play a vital role in surveillance, monitoring, and data collection. However, the widespread integration of UAVs brings forth a pressing concern: security and privacy vulnerabilities. This study introduces the SP-IoUAV (Secure and Privacy Preserving Intrusion Detection and Prevention for UAVS) model, tailored specifically for the Internet of UAVs ecosystem. The challenge lies in safeguarding UAV operations and ensuring data confidentiality. Our model employs cutting-edge techniques, including federated learning, differential privacy, and secure multi-party computation. These fortify data confidentiality and enhance intrusion detection accuracy. Central to our approach is the integration of deep neural networks (DNNs) like the convolutional neural network-long short-term memory (CNN-LSTM) network, enabling real-time anomaly detection and precise threat identification. This empowers UAVs to make immediate decisions in dynamic environments. To proactively counteract security breaches, we have implemented a real-time decision mechanism triggering alerts and initiating automatic blacklisting. Furthermore, multi-factor authentication (MFA) strengthens access security for the intrusion detection system (IDS) database. The SP-IoUAV model not only establishes a comprehensive machine framework for safeguarding UAV operations but also advocates for secure and privacy-preserving machine learning in UAVS. Our model's effectiveness is validated using the CIC-IDS2017 dataset, and the comparative analysis showcases its superiority over previous approaches like FCL-SBL, RF-RSCV, and RBFNNs, boasting exceptional levels of accuracy (99.98%), precision (99.93%), recall (99.92%), and -Score (99.92%).

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10575224PMC
http://dx.doi.org/10.3390/s23198077DOI Listing

Publication Analysis

Top Keywords

intrusion detection
16
secure privacy-preserving
8
detection prevention
8
unmanned aerial
8
aerial vehicles
8
safeguarding uav
8
uav operations
8
data confidentiality
8
uavs
6
detection
5

Similar Publications

Insider threats pose a significant challenge to IT security, particularly with the rise of generative AI technologies, which can create convincing fake user profiles and mimic legitimate behaviors. Traditional intrusion detection systems struggle to differentiate between real and AI-generated activities, creating vulnerabilities in detecting malicious insiders. To address this challenge, this paper introduces a novel Deep Synthesis Insider Intrusion Detection (DS-IID) model.

View Article and Find Full Text PDF

The widespread use of wireless networks to transfer an enormous amount of sensitive information has caused a plethora of vulnerabilities and privacy issues. The management frames, particularly authentication and association frames, are vulnerable to cyberattacks and it is a significant concern. Existing research in Wi-Fi attack detection focused on obtaining high detection accuracy while neglecting modern traffic and attack scenarios such as key reinstallation or unauthorized decryption attacks.

View Article and Find Full Text PDF
Article Synopsis
  • The study evaluated SMS text reminders for colorectal cancer screening in Catalonia, finding that they were less effective than standard postal reminders in increasing participation rates.
  • The trial involved over 24,000 participants aged 50 to 69 and was halted early due to lower than expected participation in the SMS group (17.2% vs. 21.9% for control).
  • Despite initial low participation, a recovery strategy of sending additional postal reminders to nonparticipants in the SMS group improved overall participation rates to 29.3%.
View Article and Find Full Text PDF

Subslab soil gas (SSSG) samples were collected as part of an investigation to evaluate vapor intrusion (VI) into a building. The June 2015 Office of Solid Waste and Emergency Response (OSWER) VI Guide (U.S.

View Article and Find Full Text PDF

Vehicle-to-everything (V2X) communication has many benefits. It improves fuel efficiency, road safety, and traffic management. But it raises privacy and security concerns.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!