135 research outputs found

    Power Allocation for Proactive Eavesdropping with Spoofing Relay in UAV Systems

    Get PDF
    Unmanned aerial vehicles (UAVs) are used in legitimate surveillance systems. In this paper, we consider a wireless monitor system that consists of three UAVs. One UAV acts as a legitimate eavesdropper that adopts 1) spoofing relaying and 2) proactive eavesdropping via jamming techniques. In particular, two scenarios are considered if the legitimate eavesdropper has enough power for successful eavesdropping throughout flight time. If the legitimate eavesdropper has enough power, the formulated problem is a convex optimization problem, which can be solved by standard convex optimization techniques. If not, we formulate a non-convex optimization problem and solve it by an iterative algorithm. Numerical results show that the proposed power allocation scheme outperforms the passive eavesdropping and equally distributed jamming power allocation schemes

    Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function

    Full text link
    Integrated sensing and communication (ISAC) has recently been considered as a promising approach to save spectrum resources and reduce hardware cost. Meanwhile, as information security becomes increasingly more critical issue, government agencies urgently need to legitimately monitor suspicious communications via proactive eavesdropping. Thus, in this paper, we investigate a wireless legitimate surveillance system with radar function. We seek to jointly optimize the receive and transmit beamforming vectors to maximize the eavesdropping success probability which is transformed into the difference of signal-to-interference-plus-noise ratios (SINRs) subject to the performance requirements of radar and surveillance. The formulated problem is challenging to solve. By employing the Rayleigh quotient and fully exploiting the structure of the problem, we apply the divide-and-conquer principle to divide the formulated problem into two subproblems for two different cases. For the first case, we aim at minimizing the total transmit power, and for the second case we focus on maximizing the jamming power. For both subproblems, with the aid of orthogonal decomposition, we obtain the optimal solution of the receive and transmit beamforming vectors in closed-form. Performance analysis and discussion of some insightful results are also carried out. Finally, extensive simulation results demonstrate the effectiveness of our proposed algorithm in terms of eavesdropping success probability

    PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications

    Get PDF
    13th International Wireless Communications and Mobile Computing Conference (IWCMC 2017). 26 to 30, Jun, 2017, Vehicular Communications Symposium. Valencia, Spain.We consider a wireless information surveillance in UAV network, where a legitimate unmanned aerial vehicle (UAV) proactively eavesdrops communication between two suspicious UAVs. However, challenges arise due to lossy airborne channels and limited power of the UAV. In this paper, we study an emerging legitimate eavesdropping paradigm that the legitimate UAV improves the eavesdropping performance via jamming the suspicious communication. Moreover, a power efficient legitimate eavesdropping scheme, PELE, is proposed to maximize the number of eavesdropped packets from the legitimate UAV while maintaining a target signal to interference plus noise ratio at the suspicious link. Numerical results are shown to validate the performance of PELE. Additionally, four typical fading channel models are applied to the network so as to investigate their impact on PELE.info:eu-repo/semantics/publishedVersio

    Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

    Full text link
    Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures. Following this requirement, the present study thoroughly examines the security considerations about UAVs in relation to the architectural framework of the 5G/6G system, the technologies that facilitate its operation, and the concerns surrounding privacy. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAV-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAV-based systems, along with the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table

    Decentralized Navigation of a UAV Team for Collaborative Covert Eavesdropping on a Group of Mobile Ground Nodes

    Full text link
    Unmanned aerial vehicles (UAVs) are increasingly applied to surveillance tasks, thanks to their excellent mobility and flexibility. Different from existing works using UAVs for video surveillance, this paper employs a UAV team to carry out collaborative radio surveillance on ground moving nodes and disguise the purpose of surveillance. We consider two aspects of disguise. The first is that the UAVs do not communicate with each other (or the ground nodes can notice), and each UAV plans its trajectory in a decentralized way. The other aspect of disguise is that the UAVs avoid being noticed by the nodes for which a metric quantifying the disguising performance is adopted. We present a new decentralized method for the online trajectory planning of the UAVs, which maximizes the disguising metric while maintaining uninterrupted surveillance and avoiding UAV collisions. Based on the model predictive control (MPC) technique, our method allows each UAV to separately estimate the locations of the UAVs and the ground nodes, and decide its trajectory accordingly. The impact of potential estimation errors is mitigated by incorporating the error bounds into the online trajectory planning, hence achieving a robust control of the trajectories. Computer-based simulation results demonstrate that the developed strategy ensures the surveillance requirement without losing disguising performance, and outperforms existing alternatives. Note to Practitioners - The paper is motivated by the covertness requirement in the radio surveillance (also called eavesdropping) by UAVs. In some situations, the UAV user (such as the police department) wishes to disguise the surveillance intention from the targets, and the trajectories of UAVs play a significant role in the disguising. However, the typical UAV trajectories such as standoff tracking and orbiting can easily be noticed by the targets. Considering this gap, we focus on how to plan the UAVs' trajectories so that they are less noticeable while conducting effective eavesdropping. We formulate a path planning problem aiming at maximizing a disguising metric, which measures the magnitude of the relative position change between a UAV and a target. A decentralized method is proposed for the online trajectory planning of the UAVs based on MPC, and its robust version is also presented to account for the uncertainty in the estimation and prediction of the nodes' states
    corecore