Harini Kolamunna, Junye Li, T. Dahanayaka, Suranga Seneviratne, Kanchana Thilakaratne, Albert Y. Zomaya, Aruna Seneviratne
{"title":"AcousticPrint","authors":"Harini Kolamunna, Junye Li, T. Dahanayaka, Suranga Seneviratne, Kanchana Thilakaratne, Albert Y. Zomaya, Aruna Seneviratne","doi":"10.1145/3395351.3401700","DOIUrl":null,"url":null,"abstract":"Malicious or improper use of drones can pose significant privacy and security threats in both civilian and military settings. There are many situations where it requires to detect the presence of a drone and identify the exact model to be used in applications such as law enforcement depending on the size and capabilities of different models. Nonetheless, this remains a challenging task, especially in low visibility, limited access, or hostile environments. In this paper, we propose to use acoustic signatures to identify the make and the model of drones. We achieved 94% accuracy in a closed set scenario and 80% accuracy in a more challenging open set scenario.","PeriodicalId":165929,"journal":{"name":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"AcousticPrint\",\"authors\":\"Harini Kolamunna, Junye Li, T. Dahanayaka, Suranga Seneviratne, Kanchana Thilakaratne, Albert Y. Zomaya, Aruna Seneviratne\",\"doi\":\"10.1145/3395351.3401700\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malicious or improper use of drones can pose significant privacy and security threats in both civilian and military settings. There are many situations where it requires to detect the presence of a drone and identify the exact model to be used in applications such as law enforcement depending on the size and capabilities of different models. Nonetheless, this remains a challenging task, especially in low visibility, limited access, or hostile environments. In this paper, we propose to use acoustic signatures to identify the make and the model of drones. We achieved 94% accuracy in a closed set scenario and 80% accuracy in a more challenging open set scenario.\",\"PeriodicalId\":165929,\"journal\":{\"name\":\"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks\",\"volume\":\"101 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3395351.3401700\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3395351.3401700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malicious or improper use of drones can pose significant privacy and security threats in both civilian and military settings. There are many situations where it requires to detect the presence of a drone and identify the exact model to be used in applications such as law enforcement depending on the size and capabilities of different models. Nonetheless, this remains a challenging task, especially in low visibility, limited access, or hostile environments. In this paper, we propose to use acoustic signatures to identify the make and the model of drones. We achieved 94% accuracy in a closed set scenario and 80% accuracy in a more challenging open set scenario.