Open Access
Detection of Multiple Attackers and Provide Security for UAV Networks
Author(s) -
P. Jenifa,
S. Gomathi,
Mrs. V. Perathuselvi
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.e2632.039520
Subject(s) - computer science , network packet , overhead (engineering) , false positive paradox , intrusion detection system , computer security , computer network , real time computing , denial of service attack , artificial intelligence , the internet , world wide web , operating system
Remote controlled aerial vehicle networks haven’t received right smart analysis attention. Specifically, security problem area unit is a serious concern as a result of such networks that carry very important data square measure at risk of numerous attacks. In our projected system to style and implemented a novel Location –Aided Delay Tolerant Routing Protocol(LADTR) with intrusion detection and response scheme, that operates at the UAV(Unmanned Aerial Vehicle)and ground station level, to find spiteful anomalies that menace the network. And conjointly UAV networks to be used in post-disaster operation, which combined with Store Carry Forward (SCF) techniques. During this theme, a group of detection and response techniques square measure projected to observe the UAV behaviors and reason them into appropriate list (normal, abnormal, suspect, malicious) in keeping with the detected cyber attack. Our simulation result make sure that the projected theme performs well in terms of attack detection even with an oversized range of UAVs and attackers since it exhibits a high detection rate , an occasional range of false positives, and prompt detection overhead and conjointly improve the packet delivery magnitude relation, network time period.