59 research outputs found

    Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems

    Get PDF
    Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes

    PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications

    Get PDF
    13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017). 26 to 30, Jun, 2017, Vehicular Communications Symposium. Valencia, Spain.We consider a wireless information surveillance in UAV network, where a legitimate unmanned aerial vehicle (UAV) proactively eavesdrops communication between two suspicious UAVs. However, challenges arise due to lossy airborne channels and limited power of the UAV. In this paper, we study an emerging legitimate eavesdropping paradigm that the legitimate UAV improves the eavesdropping performance via jamming the suspicious communication. Moreover, a power efficient legitimate eavesdropping scheme, PELE, is proposed to maximize the number of eavesdropped packets from the legitimate UAV while maintaining a target signal to interference plus noise ratio at the suspicious link. Numerical results are shown to validate the performance of PELE. Additionally, four typical fading channel models are applied to the network so as to investigate their impact on PELE.info:eu-repo/semantics/publishedVersio

    Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function

    Full text link
    Integrated sensing and communication (ISAC) has recently been considered as a promising approach to save spectrum resources and reduce hardware cost. Meanwhile, as information security becomes increasingly more critical issue, government agencies urgently need to legitimately monitor suspicious communications via proactive eavesdropping. Thus, in this paper, we investigate a wireless legitimate surveillance system with radar function. We seek to jointly optimize the receive and transmit beamforming vectors to maximize the eavesdropping success probability which is transformed into the difference of signal-to-interference-plus-noise ratios (SINRs) subject to the performance requirements of radar and surveillance. The formulated problem is challenging to solve. By employing the Rayleigh quotient and fully exploiting the structure of the problem, we apply the divide-and-conquer principle to divide the formulated problem into two subproblems for two different cases. For the first case, we aim at minimizing the total transmit power, and for the second case we focus on maximizing the jamming power. For both subproblems, with the aid of orthogonal decomposition, we obtain the optimal solution of the receive and transmit beamforming vectors in closed-form. Performance analysis and discussion of some insightful results are also carried out. Finally, extensive simulation results demonstrate the effectiveness of our proposed algorithm in terms of eavesdropping success probability

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Design, Analysis and Evaluation of Unmanned Aerial Vehicle Ad hoc Network for Emergency Response Communications

    Get PDF
    In any emergency situation, it is paramount that communication be established between those affected by an emergency and the emergency responders. This communication is typically initiated by contacting an emergency service number such as 9-1-1 which will then notify the appropriate responders. The communication link relies heavily on the use of the public telephone network. If an emergency situation causes damage to, or otherwise interrupts, the public telephone network then those affected by the emergency are unable to call for help or warn others. A backup emergency response communication system is required to restore communication in areas where the public telephone network is inoperable. The use of unmanned aerial vehicles is proposed to act as mobile base stations and route wireless communication to the nearest working public telephone network access point. This thesis performs an analysis based on wireless attributes associated with communication in this type of network such as channel capacity, network density and propagation delay
    corecore