The increasing popularity of low-cost aerial vehicles that can be remotely piloted by amateurs, is giving rise to a number of issues related to public safety and privacy. At the same time, the need for surveillance methods able to detect the presence of unauthorized drones meets the ubiquitous connectivity and pervasive technology typical of the big data era. This dualism drives the research community towards the design of monitoring systems able to integrate machine learning methods and data mining techniques in this evolving environment. In this framework, we consider a WiFi based approach aimed at detecting nearby unmanned aerial vehicles, by performing statistical fingerprint analysis on wireless traffic. We study the inherent vulnerabilities of the considered method through real-life experimental tests by setting up specific attack scenarios, and we devise and test a solution in order to improve the efficiency of the proposed technique in the presence of malicious countermeasures. Results show that the proposed improved detection technique is indeed robust to stealth attacks, and it is able to achieve very good recognition performance in different real-life testing scenarios.

Improving WiFi Statistical Fingerprint-based Detection Techniques against UAV Stealth Attacks

Bisio, I;Garibotto, C;Lavagetto, F;Sciarrone, A;Zappatore, S
2018-01-01

Abstract

The increasing popularity of low-cost aerial vehicles that can be remotely piloted by amateurs, is giving rise to a number of issues related to public safety and privacy. At the same time, the need for surveillance methods able to detect the presence of unauthorized drones meets the ubiquitous connectivity and pervasive technology typical of the big data era. This dualism drives the research community towards the design of monitoring systems able to integrate machine learning methods and data mining techniques in this evolving environment. In this framework, we consider a WiFi based approach aimed at detecting nearby unmanned aerial vehicles, by performing statistical fingerprint analysis on wireless traffic. We study the inherent vulnerabilities of the considered method through real-life experimental tests by setting up specific attack scenarios, and we devise and test a solution in order to improve the efficiency of the proposed technique in the presence of malicious countermeasures. Results show that the proposed improved detection technique is indeed robust to stealth attacks, and it is able to achieve very good recognition performance in different real-life testing scenarios.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11567/984121
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 10
  • ???jsp.display-item.citation.isi??? 1
social impact