283 research outputs found
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Unmanned aerial vehicles (UAVs) can provide wireless access services to
terrestrial users without geographical limitations and will become an essential
part of the future communication system. However, the openness of wireless
channels and the mobility of UAVs make the security of UAV-based communication
systems particularly challenging. This work investigates the security of aerial
cognitive radio networks (CRNs) with multiple uncertainties colluding
eavesdroppers. A cognitive aerial base station transmits messages to cognitive
terrestrial users using the spectrum resource of the primary users. All
secondary terrestrial users and illegitimate receivers jointly decode the
received message. The average secrecy rate of the aerial CRNs is maximized by
jointly optimizing the UAV's trajectory and transmission power. An iterative
algorithm based on block coordinate descent and successive convex approximation
is proposed to solve the non-convex mixed-variable optimization problem.
Numerical results verify the effectiveness of our proposed algorithm and show
that our scheme improves the secrecy performance of airborne CRNs.Comment: 10 pages, 7 figures.submitted to the IEEE journal for revie
Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems
rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been
thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying
nature, is expected to be an integral part of future wireless communications and Internet of drones
(IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems
including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate
receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such
scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated)
and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches
very challenging and inefficient for such systems. This motives the utilization of alternative approaches
enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based
on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there
is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest
advances and state of art researches on the field of applying PLS to UAV systems in a unified and
structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and
use cases of UAVs, which are categorized based on how the drone is utilized and employed in the
communication system setup. The main classified categories include the deployment of the flying, mobile
UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations
and future open research issues are stated and discussed.No sponso
- …