Computer Science ›› 2025, Vol. 52 ›› Issue (11): 444-451.doi: 10.11896/jsjkx.250300079

• Information Security • Previous Articles    

Research on Individual Unmanned Aerial Vehicles Identification Technology Based on Voiceprint Characteristics

ZHANG Meng1,2, QIAO Jinlan3   

  1. 1 Zhejiang Institute of Communications,Hangzhou 311112,China
    2 School of Cyber Science and Technology,Zhejiang University,Hangzhou 310058,China
    3 Department of Logistics Command,Engineering University of the Joint Logistics Support Force,Chongqing 401331,China
  • Received:2025-03-14 Revised:2025-07-18 Online:2025-11-15 Published:2025-11-06
  • About author:ZHANG Meng,born in 1988,Ph.D,postdoctoral researcher,associate professor.Her main research interests include Internet of Things security and wireless communication security.
    QIAO Jinlan,born in 1990,lecturer.Her main research interests include operational research,big data intelligence and AI.
  • Supported by:
    National Natural Science Foundation of China(62372406) and High-level Talent Project of Zhejiang Institute of Communications(2025rcxm01).

Abstract: With the rapid development of artificial intelligence and communication technologies,unmanned aerial vehicles(UAVs) are increasingly being applied across various industries.In the field of low-altitude logistics and transportation,UAVs demonstrate significant potential due to their efficiency,convenience,and low cost.However,legitimate UAVs performing delivery tasks are highly susceptible to spoofing attacks.Shippers relying solely on visual characteristics,especially when malicious third parties use UAVs of the same model as legitimate ones,find it difficult to accurately determine whether an incoming UAV is authorized to pick up a package.To effectively address this issue,an individual UAV identification system based on voiceprint features is proposed.Firstly,audio of a hovering UAV is recorded using a mobile device,and empirical wavelet transform is applied to remove high-frequency noise from the UAV's audio signal,thereby improving the signal-to-noise ratio.Then,a filter bank is designed based on the spectral characteristics of audio signals from different UAVs of the same model,enabling efficient extraction of key audio features.Finally,a long short-term memory network model incorporating the Open-Max algorithm is constructed to handle open-set classification problems,further enhancing the system's recognition capability.Experimental results demonstrate that the proposed system achieves an accuracy of 99.8% in identifying individual UAVs of the same model and a success rate of 99.5% in detecting unauthorized UAVs,effectively mitigating spoofing attacks.

Key words: Unmanned aerial vehicle, Voiceprint, Identity recognition, Security, Logistics and delivery

CLC Number: 

  • TP391
[1]KUMAWAT H C,CHAKRABORTY M,RAJ A A B,et al.Architecture for Micro-Doppler-Based Small Unmanned Aerial Vehicle(SUAV) Targets' Detection and Classification[J].IEEE Transactions on Instrumentation and Measurement,2022,71:8504011.
[2]SUN Y,ABEYWICKRAMA S,JAYASINGHE L,et al.Micro-Doppler signature-based detection,classification,and localization of small UAV with long short-term memory neural network[J].IEEE Transactions on Geoscience and Remote Sensing,2020,59(8):6285-6300.
[3]YAN J,HU H,GONG J,et al.Exploring Radar Micro-Doppler Signatures for Recognition of Drone Types [J].Drones,2023,7(4):280.
[4]HAN S K,LEE J H,JUNG Y H.Convolutional Neural Network-Based Drone Detection and Classification Using Overlaid Frequency-Modulated Continuous-Wave Range-Doppler Images [J].Sensors,2024,24(17):5805.
[5]ZHANG P,LI G,HUO C,et al.Exploitation of multipath micro-Doppler signatures for drone classification[J].IET Radar,Sonar &Navigation,2020,14(4):586-592.
[6]ZHENG Y,ZHANG X,WANG S,et al.Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification [J].Drones,2024,8(8):391.
[7]HAN J,YU Z,YANG J.Real-world UAV recognition based on radio frequency fingerprinting with Transformer[J/OL].https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cmu2.70004.
[8]LI Z,CHEN B,CHEN X,et al.Reliable digital forensics in the air:Exploring an RF-based drone identification system[C]//Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies.2022:1-25.
[9]NIE W,HAN Z C,ZHOU M,et al.UAV Detection and Identification Based on WiFi Signal and RF Fingerprint [J].IEEE Sensors Journal,2021,21(12):13540-13550.
[10]XIE Y,JIANG P,GU Y,et al.Dual-Source Detection and Identification System Based on UAV Radio Frequency Signal [J].IEEE Transactions on Instrumentation and Measurement,2021,70:1-15.
[11]SWINNEY C J,WOODS J C.RF detection and classification of unmanned aerial vehicles in environments with wireless interfe-rence[C]//2021 International Conference on Unmanned Aircraft Systems(ICUAS).IEEE,2021:1494-1498.
[12]MPOUZIOTAS D,KARVELIS P,STYLIOS C.Advanced Computer Vision Methods for Tracking Wild Birds from Drone Foo-tage [J].Drones,2024,8(6):259.
[13]ASHRAF M W,SULTANI W,SHAH M.Dogfight:Detecting drones from drones videos[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2021:7067-7076.
[14]BEHERA D K,RAJ A B.Drone detection and classificationusing deep learning[C]//2020 4th International Conference on Intelligent Computing and Control Systems(ICICCS).IEEE,2020:1012-1016.
[15]SHI Q,LI J.Objects detection of UAV for anti-UAV based on YOLOv4[C]//2020 IEEE 2nd International Conference on Civil Aviation Safety and Information Technology(ICCASIT).IEEE,2020:1048-1052.
[16]DONG Q,LIU Y,LIU X.Drone sound detection system based on feature result-level fusion using deep learning[J].Multimedia Tools and Applications,2023,82(1):149-171.
[17]AYDIN I·,KIZILAY E.Development of a new light-weight convolutional neural network for acoustic-based amateur drone detection[J].Applied Acoustics,2022,193:108773.
[18]BERNARDINI A,MANGIATORDI F,PALLOTTI E,et al.Drone detection by acoustic signature identification[J].Electronic Imaging,2017,29:60-64.
[19]ANWAR M Z,KALEEM Z,JAMALIPOUR A.Machine learning inspired sound-based amateur drone detection for public safety applications[J].IEEE Transactions on Vehicular Technology,2019,68(3):2526-2534.
[20]KOLAMUNNA H,DAHANAYAKA T,LI J,et al.Droneprint:Acoustic signatures for open-set drone detection and identification with online data[C]// Proceedings of the ACM on Interactive,Mobile,Wearable and Ubiquitous Technologies.2021:1-31.
[21]RAMESH S,PATHIER T,HAN J.Sounduav:Towards deliverydrone authentication via acoustic noise fingerprinting[C]//Proceedings of the 5th Workshop on Micro Aerial Vehicle Networks,Systems,and Applications.2019:27-32.
[22]DIAO Y,ZHANG Y,ZHAO G,et al.Drone authentication via acoustic fingerprint[C]//Proceedings of the 38th Annual Computer Security Applications Conference.2022:658-668.
[23]ZHANG M,LU L,WU Y,et al.DroneAudioID:A Lightweight Acoustic Fingerprint-Based Drone Authentication System for Secure Drone Delivery[J].IEEE Transactions on Information Forensics and Security,2025,20:1447-1461.
[24]MUGISHA S,WASSAJJA M.Review and analysis on digital filter design in digital signal processing [J].KIU Journal of Science Engineering and Technology,2024,3(2):12-20.
[25]HAYES B,SHIER J,FAZEKAS G,et al.A review of differentiable digital signal processing for music and speech synthesis [J].arXiv:2308.15422,2023.
[26]NOGUEIRA A F R,OLIVEIRA H S,MACHADO J J M,et al.Sound Classification and Processing of Urban Environments:A Systematic Literature Review [J].Sensors,2022,22(22):8608.
[1] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[2] LIU Hongle, CHEN Juan, FU Cai, HAN Lansheng, GUO Xiaowei, JIANG shuai. Authorship Gender Recognition of Source Code Based on Multiple Mixed Features [J]. Computer Science, 2025, 52(8): 51-61.
[3] SUN Qiming, HOU Gang, JIN Wenjie, HUANG Chen, KONG Weiqiang. Survey on Fuzzing of Embedded Software [J]. Computer Science, 2025, 52(7): 13-25.
[4] CHEN Jinyin, XI Changkun, ZHENG Haibin, GAO Ming, ZHANG Tianxin. Survey of Security Research on Multimodal Large Language Models [J]. Computer Science, 2025, 52(7): 315-341.
[5] ZHANG Guanghua, CHEN Fang, CHANG Jiyou, HU Boning, WANG He. Accelerating Firmware Vulnerability Discovery Through Precise Localization of IntermediateTaint Sources and Dangerous Functions [J]. Computer Science, 2025, 52(7): 379-387.
[6] WANG Yun, ZHAO Jianming, GUO Yifeng, ZHOU Huanhuan, ZHOU Wuai, ZHANG Wanzhe, FENG Jianhua. Automation and Security Strategies and Empirical Research on Operation and Maintenance of Digital Government Database [J]. Computer Science, 2025, 52(6A): 240500045-8.
[7] YU Yiming, CHEN Yuanzhi, LANG Jun. Analysis of DNS Threats and the Challenges of DNS Security [J]. Computer Science, 2025, 52(6A): 240900140-8.
[8] ZHU Keda, CAI Ruijie, LIU Shengli. Large Scale Network Defense Algorithm Based on Temporal Network Flow Watermarking Technology [J]. Computer Science, 2025, 52(6A): 240900110-6.
[9] XIA Zhuoqun, ZHOU Zihao, DENG Bin, KANG Chen. Security Situation Assessment Method for Intelligent Water Resources Network Based on ImprovedD-S Evidence [J]. Computer Science, 2025, 52(6A): 240600051-6.
[10] LI Weifeng, XIE Jiangping. Study on System Security Testing Method Based on Digital Twin [J]. Computer Science, 2025, 52(6A): 240700068-7.
[11] WEI Youyuan, SONG Jianhua, ZHANG Yan. Survey of Binary Code Similarity Detection Method [J]. Computer Science, 2025, 52(6): 365-380.
[12] JIANG Yufei, TIAN Yulong, ZHAO Yanchao. Persistent Backdoor Attack for Federated Learning Based on Trigger Differential Optimization [J]. Computer Science, 2025, 52(4): 343-351.
[13] CHEN Yanfeng, FENG Zhiwei, DENG Qingxu, WANG Yan. Survey of Sensor Attack Defense Strategies for Cyber Physical Systems [J]. Computer Science, 2025, 52(4): 4-13.
[14] CAO Mingwei, ZHANG Di, PENG Shengjie, LI Ning, ZHAO Haifeng. Survey of Metaverse Technology Development and Applications [J]. Computer Science, 2025, 52(3): 4-16.
[15] LUO Zhengquan, WANG Yunlong, WANG Zilei, SUN Zhenan, ZHANG Kunbo. Study on Active Privacy Protection Method in Metaverse Gaze Communication Based on SplitFederated Learning [J]. Computer Science, 2025, 52(3): 95-103.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!