Abstract

Sybil attack refers to the situation when a malicious node falsely claims to have numerous identities and is known to be one of the security threats to the Internet of Things (IoT). Due to recent increase usage of unmanned aerial vehicles (UAVs) in various applications, Sybil attack has been identified as a threat to the flying ad hoc network (FANET) paradigm and its integration with the IoT to form the Internet of Flying Things (IoFT). In this paper, we propose an intelligent Sybil attack detection approach for FANETs-based IoFT using physical layer characteristics of the radio signals emitted from the UAVs as detected by two ground nodes. A supervised machine learning approach is employed and experimented with several different classifiers available in the Weka workbench platform. The experiment was carried out based on two features of the radio signals, namely, the received signal strength difference (RSSD) and the time difference of arrival (TDoA). Simulation results revealed that the proposed scheme can achieve a high correct classification accuracy of above 91% on average, even for smart malicious nodes with power control capability operating at power levels not directly trained. In addition to its high performance, the proposed scheme is also less susceptible to various attacks commonly carried out on the upper layers, such as data spoofing, due to the use of only intrinsically generated physical layer data. Furthermore, no additional communications overheads of the UAV nodes are required for the functionality of this scheme.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call