A flying ad-hoc network dataset for early time series classification of grey hole attacks

Abstract Flying ad-hoc networks (FANETs) consist of multiple unmanned aerial vehicles (UAVs) that rely on multi-hop routes for communication. These routes are particularly susceptible to grey hole attacks, necessitating swift and accurate defence to preserve the network’s quality of service. Grey ho...

Full description

Saved in:
Bibliographic Details
Main Authors: Charles Hutchins, Leonardo Aniello, Enrico Gerding, Basel Halak
Format: Article
Language:English
Published: Nature Portfolio 2025-08-01
Series:Scientific Data
Online Access:https://doi.org/10.1038/s41597-025-05560-1
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract Flying ad-hoc networks (FANETs) consist of multiple unmanned aerial vehicles (UAVs) that rely on multi-hop routes for communication. These routes are particularly susceptible to grey hole attacks, necessitating swift and accurate defence to preserve the network’s quality of service. Grey hole attacks are a type of denial-of-service attack where malicious nodes selectively drop packets, disrupting the normal flow of data in the network. This paper introduces and motivates a novel dataset, FAN-GHETS24, designed for the fast classification of various grey hole attacks. The dataset is derived from sequences of packet interactions between UAVs within the network, generated through multiple simulations of FANETs. These sequences undergo post-processing via two methods: firstly, an anonymization procedure that replaces IP addresses with standard string variables, allowing for offline model training and deployment on any UAV; and secondly, the application of feature engineering techniques to format the data for machine learning model integration. The dataset’s utility is validated using a time series classification model which focuses on classifying grey hole attacks as quickly as possible.
ISSN:2052-4463