March 23, 2022, 1:20 a.m. | Joseanne Viana, Hamed Farkhari, Luis Miguel Campos, Pedro Sebastiao, Francisco Cercas, Luis Bernardo, Rui Dinis

cs.CR updates on arXiv.org arxiv.org

Unmanned aerial vehicle (UAV) systems are vulnerable to jamming from
self-interested users who utilize radio devices for their benefits during UAV
transmissions. The vulnerability occurs due to the open nature of air-to-ground
(A2G) wireless communication networks, which may enable network-wide attacks.
This paper presents two strategies to identify Jammers in UAV networks. The
first strategy is based on time series approaches for anomaly detection where
the signal available in resource blocks are decomposed statistically to find
trend, seasonality, and residues, …

jamming networks uavs

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India