59 research outputs found
Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes
PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017). 26 to 30, Jun, 2017, Vehicular Communications Symposium. Valencia, Spain.We consider a wireless information surveillance in
UAV network, where a legitimate unmanned aerial vehicle (UAV)
proactively eavesdrops communication between two suspicious
UAVs. However, challenges arise due to lossy airborne channels
and limited power of the UAV. In this paper, we study an
emerging legitimate eavesdropping paradigm that the legitimate
UAV improves the eavesdropping performance via jamming the
suspicious communication. Moreover, a power efficient legitimate
eavesdropping scheme, PELE, is proposed to maximize the
number of eavesdropped packets from the legitimate UAV while
maintaining a target signal to interference plus noise ratio at
the suspicious link. Numerical results are shown to validate the
performance of PELE. Additionally, four typical fading channel
models are applied to the network so as to investigate their impact
on PELE.info:eu-repo/semantics/publishedVersio
Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function
Integrated sensing and communication (ISAC) has recently been considered as a
promising approach to save spectrum resources and reduce hardware cost.
Meanwhile, as information security becomes increasingly more critical issue,
government agencies urgently need to legitimately monitor suspicious
communications via proactive eavesdropping. Thus, in this paper, we investigate
a wireless legitimate surveillance system with radar function. We seek to
jointly optimize the receive and transmit beamforming vectors to maximize the
eavesdropping success probability which is transformed into the difference of
signal-to-interference-plus-noise ratios (SINRs) subject to the performance
requirements of radar and surveillance. The formulated problem is challenging
to solve. By employing the Rayleigh quotient and fully exploiting the structure
of the problem, we apply the divide-and-conquer principle to divide the
formulated problem into two subproblems for two different cases. For the first
case, we aim at minimizing the total transmit power, and for the second case we
focus on maximizing the jamming power. For both subproblems, with the aid of
orthogonal decomposition, we obtain the optimal solution of the receive and
transmit beamforming vectors in closed-form. Performance analysis and
discussion of some insightful results are also carried out. Finally, extensive
simulation results demonstrate the effectiveness of our proposed algorithm in
terms of eavesdropping success probability
A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
Design, Analysis and Evaluation of Unmanned Aerial Vehicle Ad hoc Network for Emergency Response Communications
In any emergency situation, it is paramount that communication be established between those affected by an emergency and the emergency responders. This communication is typically initiated by contacting an emergency service number such as 9-1-1 which will then notify the appropriate responders. The communication link relies heavily on the use of the public telephone network. If an emergency situation causes damage to, or otherwise interrupts, the public telephone network then those affected by the emergency are unable to call for help or warn others. A backup emergency response communication system is required to restore communication in areas where the public telephone network is inoperable. The use of unmanned aerial vehicles is proposed to act as mobile base stations and route wireless communication to the nearest working public telephone network access point. This thesis performs an analysis based on wireless attributes associated with communication in this type of network such as channel capacity, network density and propagation delay
- …