A Mamdani-Type Fuzzy Inference Framework for UAV Threat Detection and Countermeasure Deployment in FANETs
Abstract
The proliferation of Unmanned Aerial Vehicles (UAVs) in both civilian and military spheres has raised substantial security issues, especially within volatile communication environments such as Flying Ad Hoc Networks (FANETs). To challenge of the problem of real-time detection and response to UAV misbehaviour, the research proposed a Mamdani-type Fuzzy Inference System (MFIS) for real-time classification and detection of threats and subsequent actions. The MFIS is designed to take in information from UAV behaviours dataset (1000 samples) was obtained from Kaggle, consisting of four main features: energy consumption, mobility pattern, packet transmission, and link stability. After pre-processing the dataset through Min-Max normalization for standardization and amid Principal Component Analysis (PCA) for dimension reduction, the MFIS developed produces less computational load while retaining vital behavioural characteristics of the datasets. The results demonstrate the ability for the MFIS to enhance communication reliability while reducing key issues with routing and communication delays significantly over traditional FMIS methods like the Efficient Honesty-based Detection Scheme (EH-DS). The results show that the framework is an effective method for utilizing real-time context in making energy-efficient decisions for real-time UAV threat response. The simulation results show a significant improvement in performance parameters, including to-end delay, routing overhead (packets), and packet delivery ratio, by 15-55% compared to previous methodologies. While this framework has many advantages in terms of performance, these results confirm that the proposed fuzzy logic framework enables adaptive, accurate, and energy-efficient threat mitigation in real-time UAV operations.DOI:
https://doi.org/10.31449/inf.v49i15.9259Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







