61 research outputs found

    Decentralized Navigation of a UAV Team for Collaborative Covert Eavesdropping on a Group of Mobile Ground Nodes

    Full text link
    Unmanned aerial vehicles (UAVs) are increasingly applied to surveillance tasks, thanks to their excellent mobility and flexibility. Different from existing works using UAVs for video surveillance, this paper employs a UAV team to carry out collaborative radio surveillance on ground moving nodes and disguise the purpose of surveillance. We consider two aspects of disguise. The first is that the UAVs do not communicate with each other (or the ground nodes can notice), and each UAV plans its trajectory in a decentralized way. The other aspect of disguise is that the UAVs avoid being noticed by the nodes for which a metric quantifying the disguising performance is adopted. We present a new decentralized method for the online trajectory planning of the UAVs, which maximizes the disguising metric while maintaining uninterrupted surveillance and avoiding UAV collisions. Based on the model predictive control (MPC) technique, our method allows each UAV to separately estimate the locations of the UAVs and the ground nodes, and decide its trajectory accordingly. The impact of potential estimation errors is mitigated by incorporating the error bounds into the online trajectory planning, hence achieving a robust control of the trajectories. Computer-based simulation results demonstrate that the developed strategy ensures the surveillance requirement without losing disguising performance, and outperforms existing alternatives. Note to Practitioners - The paper is motivated by the covertness requirement in the radio surveillance (also called eavesdropping) by UAVs. In some situations, the UAV user (such as the police department) wishes to disguise the surveillance intention from the targets, and the trajectories of UAVs play a significant role in the disguising. However, the typical UAV trajectories such as standoff tracking and orbiting can easily be noticed by the targets. Considering this gap, we focus on how to plan the UAVs' trajectories so that they are less noticeable while conducting effective eavesdropping. We formulate a path planning problem aiming at maximizing a disguising metric, which measures the magnitude of the relative position change between a UAV and a target. A decentralized method is proposed for the online trajectory planning of the UAVs based on MPC, and its robust version is also presented to account for the uncertainty in the estimation and prediction of the nodes' states

    Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

    Full text link
    Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures. Following this requirement, the present study thoroughly examines the security considerations about UAVs in relation to the architectural framework of the 5G/6G system, the technologies that facilitate its operation, and the concerns surrounding privacy. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAV-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAV-based systems, along with the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table

    Design and Performance Analysis of Wireless Legitimate Surveillance Systems with Radar Function

    Full text link
    Integrated sensing and communication (ISAC) has recently been considered as a promising approach to save spectrum resources and reduce hardware cost. Meanwhile, as information security becomes increasingly more critical issue, government agencies urgently need to legitimately monitor suspicious communications via proactive eavesdropping. Thus, in this paper, we investigate a wireless legitimate surveillance system with radar function. We seek to jointly optimize the receive and transmit beamforming vectors to maximize the eavesdropping success probability which is transformed into the difference of signal-to-interference-plus-noise ratios (SINRs) subject to the performance requirements of radar and surveillance. The formulated problem is challenging to solve. By employing the Rayleigh quotient and fully exploiting the structure of the problem, we apply the divide-and-conquer principle to divide the formulated problem into two subproblems for two different cases. For the first case, we aim at minimizing the total transmit power, and for the second case we focus on maximizing the jamming power. For both subproblems, with the aid of orthogonal decomposition, we obtain the optimal solution of the receive and transmit beamforming vectors in closed-form. Performance analysis and discussion of some insightful results are also carried out. Finally, extensive simulation results demonstrate the effectiveness of our proposed algorithm in terms of eavesdropping success probability

    Energy-efficient 3D navigation of a solar-powered UAV for secure communication in the presence of eavesdroppers and no-fly zones

    Get PDF
    © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Unmanned Aerial Vehicles (UAVs) have been regarded as a promising means to reshape future wireless communication systems. In this paper, we consider how to plan the trajectory of a solar-powered UAV under a cloudy condition to secure the communication between the UAV and a target ground node against multiple eavesdroppers. We propose a new 3D UAV trajectory optimization model by taking into account the UAV energy consumption, solar power harvesting, eavesdropping and no-fly zone avoidance. A Rapidly-exploring Random Tree (RRT) method is developed to construct the UAV trajectory. Computer simulations and comparisons with a baseline method demonstrate that the proposed method is able to produce trajectories to ensure the valid wireless communication link with the ground node and prevent eavesdropping

    Blockchain-assisted UAV communication systems: a comprehensive survey

    Get PDF
    Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective and credible solutions for various real-world scenarios. UAVs provide an immense variety of services due to their autonomy, mobility, adaptability, and communications interoperability. Despite the expansive use of UAVs to support ground communications, data exchanges in those networks are susceptible to security threats because most communication is through radio or Wi-Fi signals, which are easy to hack. While several techniques exist to protect against cyberattacks. Recently emerging technology blockchain could be one of promising ways to enhance data security and user privacy in peer-to-peer UAV networks. Borrowing the superiorities of blockchain, multiple entities can communicate securely, decentralized, and equitably. This article comprehensively overviews privacy and security integration in blockchain-assisted UAV communication. For this goal, we present a set of fundamental analyses and critical requirements that can help build privacy and security models for blockchain and help manage and support decentralized data storage systems. The UAV communication system's security requirements and objectives, including availability, authentication, authorization, confidentiality, integrity, privacy, and non-repudiation, are thoroughly examined to provide a deeper insight. We wrap up with a discussion of open research challenges, the constraints of current UAV standards, and potential future research directions

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    Unmanned Aerial Vehicle for Internet of Everything: Opportunities and Challenges

    Get PDF
    The recent advances in information and communication technology (ICT) have further extended Internet of Things (IoT) from the sole "things" aspect to the omnipotent role of "intelligent connection of things". Meanwhile, the concept of internet of everything (IoE) is presented as such an omnipotent extension of IoT. However, the IoE realization meets critical challenges including the restricted network coverage and the limited resource of existing network technologies. Recently, Unmanned Aerial Vehicles (UAVs) have attracted significant attentions attributed to their high mobility, low cost, and flexible deployment. Thus, UAVs may potentially overcome the challenges of IoE. This article presents a comprehensive survey on opportunities and challenges of UAV-enabled IoE. We first present three critical expectations of IoE: 1) scalability requiring a scalable network architecture with ubiquitous coverage, 2) intelligence requiring a global computing plane enabling intelligent things, 3) diversity requiring provisions of diverse applications. Thereafter, we review the enabling technologies to achieve these expectations and discuss four intrinsic constraints of IoE (i.e., coverage constraint, battery constraint, computing constraint, and security issues). We then present an overview of UAVs. We next discuss the opportunities brought by UAV to IoE. Additionally, we introduce a UAV-enabled IoE (Ue-IoE) solution by exploiting UAVs's mobility, in which we show that Ue-IoE can greatly enhance the scalability, intelligence and diversity of IoE. Finally, we outline the future directions in Ue-IoE.Comment: 21 pages, 9 figure
    • …
    corecore