Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic Algorithm
Emerging as a highly promising technology, Flying Ad-hoc Networks represent self-organizing networks of Unmanned Aerial Vehicles (UAVs), garnering attention for their diverse applications spanning environmental monitoring, disaster management, precision agriculture, surveillance, and military operations. However, these networks face challenges to various security threats, including malicious node detection due to their deployment in dynamic environments. To address this issue, we present an improved novel security solution, Machine Learning-based Threat Identification for FANET using a Genetic Algorithm (ML-TIFGA) in this paper. The research includes the detection of abnormal behavior nodes using a basic genetic algorithm and dynamically adapting the changing network conditions by utilizing a reputation system. To enhance our security solution ML- TIFGA, we evaluated two key factors: cooperation and trustworthiness, which act as genetic elements within the chromosome of the flying node in our genetic population. Further, a mechanism is incorporated to reconfigure the trust, addressing the challenge of dynamically extracting threats through the updated weighted reputation system while considering past behavior monitoring. Significant improvements were found in the experimental results using actual sample values from the NSL-KDD dataset, which produced a remarkable 99.829% classification accuracy. Additionally, threat identification rates reached 98.36% for training and 98.86% for testing samples, with a remarkable improvement of 99.3% in network reliability through ML-TIFGA. When benchmarked against state-of-the-art approaches, performance metrics such as delay, throughput, and data delivery rate exhibited notable enhancements of 24.65%, 29.16%, and 31.73%, respectively.
[1] Bangui H. and Buhnova B., “Recent Advances in Machine-Learning Driven Intrusion Detection in Transportation: Survey,” Procedia Computer Science, vol. 184, pp. 877-886, 2021. https://doi.org/10.1016/j.procs.2021.04.014
[2] Basan E., Lapina M., Mudruk N., and Abramov E., “Intelligent Intrusion Detection System for a Group of UAVs,” in Proceedings of the 12th International Conference in Advances in Swarm Intelligence, Qingdao, pp. 17-21, 2021. https://doi.org/10.1007/978-3-030-78811-7_22
[3] Bhardwaj V. and Kaur N., “SEEDRP: A Secure Energy Efficient Dynamic Routing Protocol in FANETs,” Wireless Personal Communications, vol. 120, no. 2, pp. 1251-1277, 2021. https://doi.org/10.1007/s11277-021-08513-0
[4] Bhardwaj V., Kaur N., Vashisht S., Jain S., “Secrip: Secure and Reliable Intercluster Routing Protocol for Efficient Data Transmission in Flying Ad Hoc Networks,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 6, pp. 4068, 2021. https://doi.org/10.1002/ett.4068
[5] Choudhary S. and Kesswani N., “Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 Datasets Using Deep Learning in IoT,” Procedia Computer Science, vol. 167, pp. 1561-1573, 2020. https://doi.org/10.1016/j.procs.2020.03.367
[6] Din N., Waheed A., Zareei M., and Alanazi F., “An Improved Identity-Based Generalized Signcryption Scheme for Secure Multi-Access Edge Computing Empowered Flying Ad Hoc Networks,” IEEE Access, vol. 9, pp. 120704- 120714, 2021. DOI:10.1109/ACCESS.2021.3108130
[7] Fu R., Ren X., Li Y., Wu Y., and Sun H., “Machine-Learning-Based UAV-assisted Agricultural Information Security Architecture and Intrusion Detection,” IEEE Internet of Things Journal, vol. 10, no. 21, pp. 18589-18598, 2023. DOI:10.1109/JIOT.2023.3236322
[8] Ghelani J., Gharia P., and El-Ocla H., “Gradient Monitored Reinforcement Learning for Jamming Attack Detection in FANETs,” IEEE Access, vol. 12, pp. 23081-23095, 2024. DOI:10.1109/ACCESS.2024.3361945
[9] Gupta D. and Rathi R., “RDVFF- Reliable Data Dissemination in Vehicular Ad Hoc Networks Based on Validation of Far to Farthest Zone,” Journal of Internet Technology, vol. 25, no. 1, pp. 87-104, 2024. DOI:10.53106/160792642024012501008
[10] Gupta S. and Sharma N., “SCFS-Securing Flying Ad Hoc Network Using Cluster-Based Trusted Fuzzy Scheme,” Complex and Intelligent Systems, vol. 10, no. 3, pp. 1-20, 2024. DOI:10.1007/s40747-024-01348-9
[11] Gupta S., Sharma N., Rathi R., and Gupta D., “Dual Detection Procedure to Secure Flying Ad Hoc Networks: A Trust-Based Framework,” in Proceedings of the Smart Technologies in Data Science and Communication Conference, vol. 210, pp. 83-95, 2021. https://doi.org/10.1007/978- 981-16-1773-7_7
[12] Gupta D., Rathi R., Gupta S., and Sharma N., “Multiple Relay Nodes Selection Scheme using Exit Time Variation for Efficient Data Dissemination in VANET,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 7, pp. 276-286, 2021. DOI:10.14569/IJACSA.2021.0120731
[13] Hosseinzadeh M., Mohammed A., Alenizi F., Malik M., and Yousefpoor E., “A Novel Fuzzy Trust-Based Secure Routing Scheme in Flying Ad Hoc Networks,” Vehicular Communications, vol. 44, no. 100665, 2023. https://doi.org/10.1016/j.vehcom.2023.100665
[14] Kai-Yun T., Girdler T., and Vassilakis V., “A Survey of Cyber Security Threats and Solutions for UAV Communications and Flying Ad-Hoc Networks,” Ad Hoc Networks, vol. 133, no. 102894, 2022. https://doi.org/10.1016/j.adhoc.2022.102894
[15] Karthiga B., Durairaj D., Nawaz N., Venkatasamy T., and Ramasamy G., “Intelligent Intrusion Detection System for VANET Using Machine Learning and Deep Learning Approaches,” Wireless Communications and Mobile Computing, vol. 2022, 2022. https://doi.org/10.1155/2022/5069104
[16] Karthikeyan M., Manimegalai D., and RajaGopal K., “Firefly Algorithm Based WSN-IoT Security Enhancement with Machine Learning for Intrusion Detection,” Scientific Reports, vol. 14, no. 1, pp. 231, 2024. https://doi.org/10.1038/s41598-023-50554-x
[17] Kaur M., Prashar D., Rashid M., Alshamrani S., and AlGhamdi A., “A Novel Approach for Securing Nodes Using Two-Ray Model and Shadow Effects in Flying Ad-Hoc Network,” Electronics, vol. 10, no. 24, pp. 3164, 2021. https://doi.org/10.3390/electronics1024316 4
[18] Khan M., Ullah I., Nisar S., Noor F., and Qureshi I., “Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption,” Mobile Information System, vol. 2020, 2020. https://doi.org/10.1155/2020/8861947
[19] Liu J., Shuai H., and Yi W., “Throughput Optimization for Flying Ad Hoc Network Based On Position Control Using Genetic Algorithm,” Machine Learning Driven Threat Identification to Enhance FANET Security using Genetic ... 721 International Journal of Metrology and Quality Engineering, vol. 11, pp. 1-13, 2020. https://doi.org/10.1051/ijmqe/2020012
[20] Manoharan S., Sugumaran P., and Kumar K., “Multichannel Based IoT Malware Detection System Using System Calls and Opcode Sequences,” The International Arab Journal of Information Technology, vol. 19, no. 2, pp. 261- 271, 2022. https://doi.org/10.34028/iajit/19/2/13
[21] Namdev M., Goyal S., and Agarwal R., “An Optimized Communication Scheme for Energy Efficient and Secure Flying Ad-Hoc Network (FANET),” Wireless Personal Communications. vol. 120, no. 2, pp. 1291-1312, 2021. https://doi.org/10.1007/s11277-021-08515-y
[22] Oubbati O., Atiquzzaman M., Lorenz P., Tareque H., and Hossain S., “Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives,” IEEE Access, vol. 7, pp. 81057-81105, 2019. Doi:10.1109/ACCESS.2019.2923840
[23] Priya S. and Mohanraj M., “Flying Ad-Hoc Networks Rely on Trust-Aware Route Selection for Efficient Packet Transmission,” Journal of Algebraic Statistics, vol. 13, no. 3, pp. 682-692, 2022. https://www.publishoa.com/index.php/journal/art icle/view/675/563
[24] Rahman K., Aziz M., Usman N., Kiren T., and Cheema T., “Cognitive Lightweight Logistic Regression‐Based IDS for IoT‐Enabled FANET to Detect Cyberattacks,” Mobile Information Systems, vol. 2023, no. 1, pp. 7690322, 2023. https://doi.org/10.1155/2023/7690322
[25] Rahman K., Aziz M., Kashif A., and Cheema T., Big Data Analytics and Computational Intelligence for Cybersecurity, Springer, 2022. https://doi.org/10.1007/978-3-031-05752-6_7
[26] Raj J., “A Novel Hybrid Secure Routing for Flying AD-HOC Networks,” Journal of Trends in Computer Science and Smart Technology, vol. 2, no. 3, pp. 155-164, 2020. DOI:10.36548/jtcsst.2020.3.005
[27] Ramadan R., Emara A., Al-Sarem M., and Elhamahmy M., “Internet of Drones Intrusion Detection Using Deep Learning,” Electronics, vol. 10, no. 21, pp. 2633, 2021. https://doi.org/10.3390/electronics10212633
[28] Safia L., Rizwan M., Hassan M., “Security Threats in Flying Ad Hoc Network (FANET),” Computational Intelligence for Unmanned Aerial Vehicles Communication Networks, vol. 1033, pp 73-96, 2022. https://doi.org/10.1007/978-3-030- 97113-7_5
[29] Shitharth S., Yonbawi S., Manoharan H., Shankar A., and Maple C., “Secured Data Transmissions in Corporeal Unmanned Device to Device Using Machine Learning Algorithm,” Physical Communication, vol. 59, pp. 102116, 2023. https://doi.org/10.1016/j.phycom.2023.102116
[30] Singh K. and Verma A., “A Trust Model for Effective Cooperation in Flying Ad Hoc Networks Using Genetic Algorithm,” in Proceedings of the International Conference on Communication and Signal Processing, Chennai, pp. 0491-0495, 2018. DOI:10.1109/ICCSP.2018.8524558
[31] Sucharitha Y., Reddy P., and Suryanarayana G., Drone Technology: Future Trends and Practical Applications, Wiley 2023. https://doi.org/10.1002/9781394168002.ch15
[32] Tangade S., Kumaar R., Malavika S., Monisha S., and Azam F. “Detection of Malicious Nodes in Flying Ad-hoc Network with Supervised Machine Learning,” in Proceedings of the 3rd International Conference on Smart Technologies in Computing, Electrical and Electronics, Bengaluru, pp. 1-5, 2022. DOI:10.1109/ICSTCEE56972.2022
[33] Tavallaee M., Bagheri E., Lu W., Ghorbani A., “A Detailed Analysis of the KDD CUP 99 Data Set,” in Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 2009.
[34] Vijay A., Patidar K., Yadav M., and Kushwah R., “An Efficient Intrusion Detection Mechanism Based on Particle Swarm Optimization and KNN,” ACCENTS Transactions on Information Security, vol. 5, no. 20, pp. 36-41, 2020. DOI:10.19101/TIS.2020.517003