265 research outputs found

    Decentralized Navigation of a UAV Team for Collaborative Covert Eavesdropping on a Group of Mobile Ground Nodes

    Full text link
    Unmanned aerial vehicles (UAVs) are increasingly applied to surveillance tasks, thanks to their excellent mobility and flexibility. Different from existing works using UAVs for video surveillance, this paper employs a UAV team to carry out collaborative radio surveillance on ground moving nodes and disguise the purpose of surveillance. We consider two aspects of disguise. The first is that the UAVs do not communicate with each other (or the ground nodes can notice), and each UAV plans its trajectory in a decentralized way. The other aspect of disguise is that the UAVs avoid being noticed by the nodes for which a metric quantifying the disguising performance is adopted. We present a new decentralized method for the online trajectory planning of the UAVs, which maximizes the disguising metric while maintaining uninterrupted surveillance and avoiding UAV collisions. Based on the model predictive control (MPC) technique, our method allows each UAV to separately estimate the locations of the UAVs and the ground nodes, and decide its trajectory accordingly. The impact of potential estimation errors is mitigated by incorporating the error bounds into the online trajectory planning, hence achieving a robust control of the trajectories. Computer-based simulation results demonstrate that the developed strategy ensures the surveillance requirement without losing disguising performance, and outperforms existing alternatives. Note to Practitioners - The paper is motivated by the covertness requirement in the radio surveillance (also called eavesdropping) by UAVs. In some situations, the UAV user (such as the police department) wishes to disguise the surveillance intention from the targets, and the trajectories of UAVs play a significant role in the disguising. However, the typical UAV trajectories such as standoff tracking and orbiting can easily be noticed by the targets. Considering this gap, we focus on how to plan the UAVs' trajectories so that they are less noticeable while conducting effective eavesdropping. We formulate a path planning problem aiming at maximizing a disguising metric, which measures the magnitude of the relative position change between a UAV and a target. A decentralized method is proposed for the online trajectory planning of the UAVs based on MPC, and its robust version is also presented to account for the uncertainty in the estimation and prediction of the nodes' states

    Covert communication in relay and RIS networks

    Get PDF
    Covert communication aims to prevent the warden from detecting the presence of communications, i.e. with a negligible detection probability. When the distance between the transmitter and the legitimate receiver is large, large transmission power is needed, which in turn increases the detection probability. Relay is an effective technique to tackle this problem, and various relaying strategies have been proposed for long-distance covert communication in these years. In this article, we first offer a tutorial on the relaying strategies utilized in covert transmission. With the emergence of reflecting intelligent surface and its application in covert communications, we propose a hybrid relay-reflecting intelligent surface (HR-RIS)-assisted strategy to further enhance the performance of covert communications, which simultaneously improves the signal strength received at the legitimate receiver and degrades that at the warden relying on optimizing both the phase and the amplitude of the HR-RIS elements. The numerical results show that the proposed HR-RIS-assisted strategy significantly outperforms the conventional RIS-aided strategy in terms of covert rate

    An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks

    Full text link

    A critical review of cyber-physical security for building automation systems

    Full text link
    Modern Building Automation Systems (BASs), as the brain that enables the smartness of a smart building, often require increased connectivity both among system components as well as with outside entities, such as optimized automation via outsourced cloud analytics and increased building-grid integrations. However, increased connectivity and accessibility come with increased cyber security threats. BASs were historically developed as closed environments with limited cyber-security considerations. As a result, BASs in many buildings are vulnerable to cyber-attacks that may cause adverse consequences, such as occupant discomfort, excessive energy usage, and unexpected equipment downtime. Therefore, there is a strong need to advance the state-of-the-art in cyber-physical security for BASs and provide practical solutions for attack mitigation in buildings. However, an inclusive and systematic review of BAS vulnerabilities, potential cyber-attacks with impact assessment, detection & defense approaches, and cyber-secure resilient control strategies is currently lacking in the literature. This review paper fills the gap by providing a comprehensive up-to-date review of cyber-physical security for BASs at three levels in commercial buildings: management level, automation level, and field level. The general BASs vulnerabilities and protocol-specific vulnerabilities for the four dominant BAS protocols are reviewed, followed by a discussion on four attack targets and seven potential attack scenarios. The impact of cyber-attacks on BASs is summarized as signal corruption, signal delaying, and signal blocking. The typical cyber-attack detection and defense approaches are identified at the three levels. Cyber-secure resilient control strategies for BASs under attack are categorized into passive and active resilient control schemes. Open challenges and future opportunities are finally discussed.Comment: 38 pages, 7 figures, 6 tables, submitted to Annual Reviews in Contro

    Defenses against Covert-Communications in Multimedia and Sensor Networks

    Get PDF
    Steganography and covert-communications represent a great and real threat today more than ever due to the evolution of modern communications. This doctoral work proposes defenses against such covert-communication techniques in two threatening but underdeveloped domains. Indeed, this work focuses on the novel problem of visual sensor network steganalysis but also proposes one of the first solutions against video steganography. The first part of the dissertation looks at covert-communications in videos. The contribution of this study resides in the combination of image processing using motion vector interpolation and non-traditional detection theory to obtain better results in identifying the presence of embedded messages in videos compared to what existing still-image steganalytic solutions would offer. The proposed algorithm called MoViSteg utilizes the specifics of video, as a whole and not as a series of images, to decide on the occurrence of steganography. Contrary to other solutions, MoViSteg is a video-specific algorithm, and not a repetitive still-image steganalysis, and allows for detection of embedding in partially corrupted sequences. This dissertation also lays the foundation for the novel study of visual sensor network steganalysis. We develop three different steganalytic solutions to the problem of covert-communications in visual sensor networks. Because of the inadequacy of the existing steganalytic solutions present in the current research literature, we introduce the novel concept of preventative steganalysis, which aims at discouraging potential steganographic attacks. We propose a set of solutions with active and passive warden scenarii using the material made available by the network. To quantify the efficiency of the preventative steganalysis, a new measure for evaluating the risk of steganography is proposed: the embedding potential which relies on the uncertainty of the image’s pixel values prone to corruption
    • …
    corecore