135 research outputs found
Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems
Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes
Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function
Integrated sensing and communication (ISAC) has recently been considered as a
promising approach to save spectrum resources and reduce hardware cost.
Meanwhile, as information security becomes increasingly more critical issue,
government agencies urgently need to legitimately monitor suspicious
communications via proactive eavesdropping. Thus, in this paper, we investigate
a wireless legitimate surveillance system with radar function. We seek to
jointly optimize the receive and transmit beamforming vectors to maximize the
eavesdropping success probability which is transformed into the difference of
signal-to-interference-plus-noise ratios (SINRs) subject to the performance
requirements of radar and surveillance. The formulated problem is challenging
to solve. By employing the Rayleigh quotient and fully exploiting the structure
of the problem, we apply the divide-and-conquer principle to divide the
formulated problem into two subproblems for two different cases. For the first
case, we aim at minimizing the total transmit power, and for the second case we
focus on maximizing the jamming power. For both subproblems, with the aid of
orthogonal decomposition, we obtain the optimal solution of the receive and
transmit beamforming vectors in closed-form. Performance analysis and
discussion of some insightful results are also carried out. Finally, extensive
simulation results demonstrate the effectiveness of our proposed algorithm in
terms of eavesdropping success probability
PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications
13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017). 26 to 30, Jun, 2017, Vehicular Communications Symposium. Valencia, Spain.We consider a wireless information surveillance in
UAV network, where a legitimate unmanned aerial vehicle (UAV)
proactively eavesdrops communication between two suspicious
UAVs. However, challenges arise due to lossy airborne channels
and limited power of the UAV. In this paper, we study an
emerging legitimate eavesdropping paradigm that the legitimate
UAV improves the eavesdropping performance via jamming the
suspicious communication. Moreover, a power efficient legitimate
eavesdropping scheme, PELE, is proposed to maximize the
number of eavesdropped packets from the legitimate UAV while
maintaining a target signal to interference plus noise ratio at
the suspicious link. Numerical results are shown to validate the
performance of PELE. Additionally, four typical fading channel
models are applied to the network so as to investigate their impact
on PELE.info:eu-repo/semantics/publishedVersio
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have
evolved into indispensable tools for effectively managing disasters and
responding to emergencies. For example, one of their most critical applications
is to provide seamless wireless communication services in remote rural areas.
Thus, it is substantial to identify and consider the different security
challenges in the research and development associated with advanced UAV-based
B5G/6G architectures. Following this requirement, the present study thoroughly
examines the security considerations about UAVs in relation to the
architectural framework of the 5G/6G system, the technologies that facilitate
its operation, and the concerns surrounding privacy. It exhibits security
integration at all the protocol stack layers and analyzes the existing
mechanisms to secure UAV-based B5G/6G communications and its energy and power
optimization factors. Last, this article also summarizes modern technological
trends for establishing security and protecting UAV-based systems, along with
the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table
Decentralized Navigation of a UAV Team for Collaborative Covert Eavesdropping on a Group of Mobile Ground Nodes
Unmanned aerial vehicles (UAVs) are increasingly applied to surveillance tasks, thanks to their excellent mobility and flexibility. Different from existing works using UAVs for video surveillance, this paper employs a UAV team to carry out collaborative radio surveillance on ground moving nodes and disguise the purpose of surveillance. We consider two aspects of disguise. The first is that the UAVs do not communicate with each other (or the ground nodes can notice), and each UAV plans its trajectory in a decentralized way. The other aspect of disguise is that the UAVs avoid being noticed by the nodes for which a metric quantifying the disguising performance is adopted. We present a new decentralized method for the online trajectory planning of the UAVs, which maximizes the disguising metric while maintaining uninterrupted surveillance and avoiding UAV collisions. Based on the model predictive control (MPC) technique, our method allows each UAV to separately estimate the locations of the UAVs and the ground nodes, and decide its trajectory accordingly. The impact of potential estimation errors is mitigated by incorporating the error bounds into the online trajectory planning, hence achieving a robust control of the trajectories. Computer-based simulation results demonstrate that the developed strategy ensures the surveillance requirement without losing disguising performance, and outperforms existing alternatives. Note to Practitioners - The paper is motivated by the covertness requirement in the radio surveillance (also called eavesdropping) by UAVs. In some situations, the UAV user (such as the police department) wishes to disguise the surveillance intention from the targets, and the trajectories of UAVs play a significant role in the disguising. However, the typical UAV trajectories such as standoff tracking and orbiting can easily be noticed by the targets. Considering this gap, we focus on how to plan the UAVs' trajectories so that they are less noticeable while conducting effective eavesdropping. We formulate a path planning problem aiming at maximizing a disguising metric, which measures the magnitude of the relative position change between a UAV and a target. A decentralized method is proposed for the online trajectory planning of the UAVs based on MPC, and its robust version is also presented to account for the uncertainty in the estimation and prediction of the nodes' states
Recommended from our members
Caching and UAV Friendly Jamming for Secure Communications With Active Eavesdropping Attacks
Natural Science Foundation of Sichuan under Grant 2022NSFSC0887; Fundamental Research Funds for the Central Universities under Grant 2682021ZTPY117 and 2682022CX020; ARC under Grant DP190100770; ARC Laureate Fellowship under Grant FL160100032; ARC under Grant DP190101988 and DP210103410
- …