Unlock instant, AI-driven research and patent intelligence for your innovation.

A detection method, system and device for spoofing attack of UAV

A technology of spoofing attacks and detection methods, which is applied in the field of UAV communication, can solve the problem of inaccurate detection results of vulnerability detection, and achieve the effect of improving accuracy

Active Publication Date: 2022-04-05
BEIJING UNIV OF POSTS & TELECOMM
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes the detection loopholes or the detection results inaccurate in the existing solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method, system and device for spoofing attack of UAV
  • A detection method, system and device for spoofing attack of UAV
  • A detection method, system and device for spoofing attack of UAV

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0091] In order to improve the accuracy of detecting the spoofing attack of the UAV, the embodiment of the present invention provides a detection method, system and device for the spoofing attack of the UAV. The following will describe a kind of unmanned aerial vehicle provided by the embodiment of the present invention in conjunction with the accompanying drawings. The detection method, system and device of computer spoofing attack are described in detail.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a method, system and device for detecting spoofing attacks of UAVs, the method including: receiving a plurality of information to be processed; according to the first position of the UAV when receiving each information to be processed, and The second position of the ground base station connected by the UAV and the transmission power of the ground base station determine the theoretical received signal strength value of each message to be processed; calculate the actual received signal strength value of each message to be processed and the theoretical received signal strength value The absolute value of the difference is used as the signal strength error value corresponding to the information to be processed; whether there is attack information in multiple information to be processed is detected, and the attack information is the information to be processed whose corresponding signal strength error value is greater than the preset error threshold; if If there is attack information, it is determined that the UAV is subjected to a spoofing attack. The accuracy of detecting spoofing attacks of drones is improved by the above method.

Description

technical field [0001] The invention relates to the technical field of UAV communication, in particular to a method, system and device for detecting spoofing attacks of UAVs. Background technique [0002] With the rapid advancement of science and technology, drone technology is developing rapidly. Due to its high flexibility and other advantages, UAVs have been widely used in many fields. For example, UAVs can be used as air BS (Base Station, base station), which can provide reliable and cost-effective wireless communication to the required area. In addition, the unmanned aerial vehicle can also coexist with the ground user equipment and be used as an aerial UE (User Equipment, user equipment) called a cellular unmanned aerial vehicle. Due to the openness of the wireless environment, when the UAV is used as an air UE, the UAV is similar to the ground user equipment. When communicating with the GCS (Ground Control Station, ground base station), it is vulnerable to malicious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/122
Inventor 李娜王晓慧陶小峰崔琪楣张志远
Owner BEIJING UNIV OF POSTS & TELECOMM