12 research outputs found
Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems
rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been
thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying
nature, is expected to be an integral part of future wireless communications and Internet of drones
(IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems
including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate
receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such
scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated)
and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches
very challenging and inefficient for such systems. This motives the utilization of alternative approaches
enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based
on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there
is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest
advances and state of art researches on the field of applying PLS to UAV systems in a unified and
structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and
use cases of UAVs, which are categorized based on how the drone is utilized and employed in the
communication system setup. The main classified categories include the deployment of the flying, mobile
UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations
and future open research issues are stated and discussed.No sponso
Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices
In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have
evolved into indispensable tools for effectively managing disasters and
responding to emergencies. For example, one of their most critical applications
is to provide seamless wireless communication services in remote rural areas.
Thus, it is substantial to identify and consider the different security
challenges in the research and development associated with advanced UAV-based
B5G/6G architectures. Following this requirement, the present study thoroughly
examines the security considerations about UAVs in relation to the
architectural framework of the 5G/6G system, the technologies that facilitate
its operation, and the concerns surrounding privacy. It exhibits security
integration at all the protocol stack layers and analyzes the existing
mechanisms to secure UAV-based B5G/6G communications and its energy and power
optimization factors. Last, this article also summarizes modern technological
trends for establishing security and protecting UAV-based systems, along with
the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table
Physical layer security (PLS) solutions for passive eavesdropping in wireless communication
An absolute secured wireless communication is unattainable. Nevertheless, communication models must be secure and unique across each layer of the model. The
physical layer is the easiest layer through which information leaks, due to its broadcast nature. The security in the physical layer, measured as secrecy capacity, is
subdivided into keyed and keyless security models. In practice, the eavesdropper’s
evasive and obscure random wireless channel model makes it difficult to optimise
keyless security measure at the physical layer. Considering this practical challenge,
the objective of this work is to use novel keyless approaches to reduce the ability of
an illegitimate user to access the transmitted message via the physical layer. Physical layer security (PLS) was achieved through the deployment of unmanned aerial
vehicles (UAV), intelligent reflecting surfaces (IRS), and communication sensing as
security enablers in this thesis. The UAV operates with interfering signals while the
IRS and sensing techniques optimise respective inherent properties leading to higher
PLS performance. The thesis presents solutions to the parametric design of UAV,
IRS, and wireless sensing technologies for PLS functionality. Designs and analysis
herein follow from analytical derivations and numerical simulations. Specifically, the
thesis presents a novel average secrecy rate formulation for passive eavesdropping
with a reception rate upper bound by that of the legitimate receiver. The keyless
PLS assessed from the formulations guaranteed positive rates with the design of a
broadcast interfering signal delivered from a UAV. Based on the verification of the
positive secrecy rate with passive eavesdropping, a swarm of UAVs improved the
PLS of the communication system delivering more interfering signals. Furthermore,
the functionalities of the interference driven UAV swarm were miniaturised with a
system of aerial IRS. By harnessing inherent channel dynamics, a novel non-iterative
design of the aerial IRS system was presented as a panacea to PLS requirements.
Finally, the thesis presents the analysis of a legitimate receiver with a novel noise
and interference filter as a sensing mitigation technique. The filter enhanced PLS
by enabling the legitimate receiver to effectively extract desired information
Resource Scheduling for UAVs-aided D2D Networks: A Multi-objective Optimization Approach
Unmanned aerial vehicles (UAVs)-aided device-todevice (D2D) networks have
attracted great interests with the development of 5G/6G communications, while
there are several challenges about resource scheduling in UAVs-aided D2D
networks. In this work, we formulate a UAVs-aided D2D network resource
scheduling optimization problem (NetResSOP) to comprehensively consider the
number of deployed UAVs, UAV positions, UAV transmission powers, UAV flight
velocities, communication channels, and UAV-device pair assignment so as to
maximize the D2D network capacity, minimize the number of deployed UAVs, and
minimize the average energy consumption over all UAVs simultaneously. The
formulated NetResSOP is a mixed-integer programming problem (MIPP) and an
NP-hard problem, which means that it is difficult to be solved in polynomial
time. Moreover, there are trade-offs between the optimization objectives, and
hence it is also difficult to find an optimal solution that can simultaneously
make all objectives be optimal. Thus, we propose a non-dominated sorting
genetic algorithm-III with a Flexible solution dimension mechanism, a Discrete
part generation mechanism, and a UAV number adjustment mechanism (NSGA-III-FDU)
for solving the problem comprehensively. Simulation results demonstrate the
effectiveness and the stability of the proposed NSGA-III-FDU under different
scales and settings of the D2D networks
Optimization and Communication in UAV Networks
UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects