{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:54:35Z","timestamp":1753887275232,"version":"3.41.2"},"reference-count":18,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"vor","delay-in-days":251,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University","doi-asserted-by":"publisher","award":["TURSP-2020\/126"],"award-info":[{"award-number":["TURSP-2020\/126"]}],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>The Internet of Things (IoT) plays an important role to connect people, data, processes, and things. From linked supply chains to big data produced by a large number of IoT devices to industrial control systems where cybersecurity has become a critical problem in IoT\u2010powered systems. Denial of Service (DoS), distributed denial of service (DDoS), and ping of death attacks are significant threats to flying networks. This paper presents an intrusion detection system (IDS) based on attack probability using the Markov chain to detect flooding attacks. While the paper includes buffer queue length by using queuing theory concept to evaluate the network safety. Also, the network scenario will change due to the dynamic nature of flying vehicles. Simulation describes the queue length when the ground station is under attack. The proposed IDS utilizes the optimal threshold to make a tradeoff between false positive and false negative states with Markov binomial and Markov chain distribution stochastic models. However, at each time slot, the results demonstrate maintaining queue length in normal mode with less packet loss and high attack detection.<\/jats:p>","DOI":"10.1155\/2021\/1542657","type":"journal-article","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T02:05:05Z","timestamp":1631239505000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Intelligent Detection System Enabled Attack Probability Using Markov Chain in Aerial Networks"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3637-6977","authenticated-orcid":false,"given":"Inam Ullah","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5050-7027","authenticated-orcid":false,"given":"Asrin","family":"Abdollahi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0967-1885","authenticated-orcid":false,"given":"Ryan","family":"Alturki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9520-330X","authenticated-orcid":false,"given":"Mohammad Dahman","family":"Alshehri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5111-9923","authenticated-orcid":false,"given":"Mohammed Abdulaziz","family":"Ikram","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0522-4348","authenticated-orcid":false,"given":"Hasan J.","family":"Alyamani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9508-737X","authenticated-orcid":false,"given":"Shahzad","family":"Khan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"key":"e_1_2_9_1_2","unstructured":"QayyumA. ViennotL. andLaouitiA. Multipoint relaying for flooding broadcast messages in mobile wireless networks Proceedings of the 35th annual Hawaii international conference on system sciences 2002 Big Island HI USA 3866\u20133875."},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981531"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1186\/s40294-020-00070-w"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07139-y"},{"key":"e_1_2_9_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2987688"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011259"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"AlbalawiM.andSongH. Data security and privacy issues in swarms of drones 2019 Integrated communications navigation and surveillance conference (ICNS) 2019 Herndon VA USA 1\u201311 https:\/\/doi.org\/10.1109\/ICNSURV.2019.8735133 2-s2.0-85068093727.","DOI":"10.1109\/ICNSURV.2019.8735133"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"ChenJ. FengZ. WenJ. LiuB. andShaL. A container-based DoS attack-resilient control framework for real-time UAV systems 2019 Design Automation & Test in Europe Conference & Exhibition (DATE) 2019 Florence Italy 1222\u20131227 https:\/\/doi.org\/10.23919\/DATE.2019.8714888 2-s2.0-85066629863.","DOI":"10.23919\/DATE.2019.8714888"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2941345"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"MohanR. RajC. V. AswathiP. andBhavaniR. R. UAV based security system for prevention of harassment against woman 2017 International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT) 2017 Kannur 874\u2013879 https:\/\/doi.org\/10.1109\/ICICICT1.2017.8342680 2-s2.0-85049374155.","DOI":"10.1109\/ICICICT1.2017.8342680"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"PodhradskyM. CoopmansC. andHofferN. Improving communication security of open source UAVs: encrypting radio control link 2017 International Conference on Unmanned Aircraft Systems (ICUAS) 2017 Miami FL USA 1153\u20131159 https:\/\/doi.org\/10.1109\/ICUAS.2017.7991460 2-s2.0-85034055620.","DOI":"10.1109\/ICUAS.2017.7991460"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915617252"},{"key":"e_1_2_9_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846040"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"SalamhF. E. KarabiyikU. RogersM. andAl-HazemiF. Drone disrupted denial of service attack (3DOS): towards an incident response and forensic analysis of remotely piloted aerial systems (RPASs) 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC) 2019 Tangier Morocco 704\u2013710 https:\/\/doi.org\/10.1109\/IWCMC.2019.8766538 2-s2.0-85073887773.","DOI":"10.1109\/IWCMC.2019.8766538"},{"key":"e_1_2_9_15_2","doi-asserted-by":"crossref","unstructured":"SehrawatA. ChoudhuryT. A. andRajG. Surveillance drone for disaster management and military security 2017 International Conference on Computing Communication and Automation (ICCCA) 2017 Greater Noida 470\u2013475 https:\/\/doi.org\/10.1109\/CCAA.2017.8229846 2-s2.0-85046355744.","DOI":"10.1109\/CCAA.2017.8229846"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18030878"},{"key":"e_1_2_9_17_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18114015"},{"key":"e_1_2_9_18_2","doi-asserted-by":"crossref","unstructured":"ZaheerZ. UsmaniA. KhanE. andQadeerM. A. Aerial surveillance system using UAV 2016 Thirteenth International Conference on Wireless and Optical Communications Networks (WOCN) 2016 Hyderabad 1\u20137 https:\/\/doi.org\/10.1109\/WOCN.2016.7759885 2-s2.0-85006073812.","DOI":"10.1109\/WOCN.2016.7759885"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/1542657.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/1542657.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/1542657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:49:21Z","timestamp":1723031361000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/1542657"}},"subtitle":[],"editor":[{"given":"Ihsan","family":"Ali","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/1542657"],"URL":"https:\/\/doi.org\/10.1155\/2021\/1542657","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-04-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"1542657"}}