1,716 research outputs found

    Improving PHY-Security of UAV-Enabled Transmission with Wireless Energy Harvesting: Robust Trajectory Design and Communications Resource Allocation

    Full text link
    In this paper, we consider an unmanned aerial vehicle (UAV) assisted communications system, including two cooperative UAVs, a wireless-powered ground destination node leveraging simultaneous wireless information and power transfer (SWIPT) technique, and a terrestrial passive eavesdropper. One UAV delivers confidential information to destination and the other sends jamming signals to against eavesdropping and assist destination with energy harvesting. Assuming UAVs have partial information about eavesdropper's location, we propose two transmission schemes: friendly UAV jamming (FUJ) and Gaussian jamming transmission (GJT) for the cases when jamming signals are known and unknown a priori at destination, respectively. Then, we formulate an average secrecy rate maximization problem to jointly optimize the transmission power and trajectory of UAVs, and the power splitting ratio of destination. Being non-convex and hence difficult to solve the formulated problem, we propose a computationally efficient iterative algorithm based on block coordinate descent and successive convex approximation to obtain a suboptimal solution. Finally, numerical results are provided to substantiate the effectiveness of our proposed multiple-UAV schemes, compared to other existing benchmarks. Specifically, we find that the FUJ demonstrates significant secrecy performance improvement in terms of the optimal instantaneous and average secrecy rate compared to the GJT and the conventional single-UAV counterpart.Comment: This paper has been accepted by IEEE Transactions on Vehicular Technolog

    Optimal Secure Multi-Layer IoT Network Design

    Full text link
    With the remarkable growth of the Internet and communication technologies over the past few decades, Internet of Things (IoTs) is enabling the ubiquitous connectivity of heterogeneous physical devices with software, sensors, and actuators. IoT networks are naturally two-layer with the cloud and cellular networks coexisting with the underlaid device-to-device (D2D) communications. The connectivity of IoTs plays an important role in information dissemination for mission-critical and civilian applications. However, IoT communication networks are vulnerable to cyber attacks including the denial-of-service (DoS) and jamming attacks, resulting in link removals in IoT network. In this work, we develop a heterogeneous IoT network design framework in which a network designer can add links to provide additional communication paths between two nodes or secure links against attacks by investing resources. By anticipating the strategic cyber attacks, we characterize the optimal design of secure IoT network by first providing a lower bound on the number of links a secure network requires for a given budget of protected links, and then developing a method to construct networks that satisfy the heterogeneous network design specifications. Therefore, each layer of the designed heterogeneous IoT network is resistant to a predefined level of malicious attacks with minimum resources. Finally, we provide case studies on the Internet of Battlefield Things (IoBT) to corroborate and illustrate our obtained results.Comment: 12 pages, to appear in IEEE Transactions on Control of Network System

    Secure UAV Communication with Cooperative Jamming and Trajectory Control

    Full text link
    This paper presents a new cooperative jamming approach to secure the unmanned aerial vehicle (UAV) communication by leveraging jamming from other nearby UAVs to defend against the eavesdropping. In particular, we consider a two-UAV scenario when one UAV transmitter delivers the confidential information to a ground node (GN), and the other UAV jammer cooperatively sends artificial noise (AN) to confuse the ground eavesdropper for protecting the confidentiality of the data transmission. By exploiting the fully-controllable mobility, the two UAVs can adaptively adjust their locations over time (a.k.a. trajectories) to facilitate the secure communication and cooperative jamming. We assume that the two UAVs perfectly know the GN's location and partially know the eavesdropper's location {\emph{a-priori}}. Under this setup, we maximize the average secrecy rate from the UAV transmitter to the GN over one particular time period, by optimizing the UAVs' trajectories, jointly with their communicating/jamming power allocations. Although the formulated problem is non-convex, we propose an efficient solution by applying the techniques of alternating optimization and successive convex approximation (SCA).Comment: 5 pages, 2 figures, accepted for publication at the IEEE Communications Lette

    UAV-Aided Cellular Communications with Deep Reinforcement Learning Against Jamming

    Full text link
    Cellular systems are vulnerable to jamming attacks, especially smart jammers that choose their jamming policies such as the jamming channel frequencies and power based on the ongoing communication policies and network states. In this article, we present an unmanned aerial vehicle (UAV) aided cellular communication framework against jamming. In this scheme, UAVs use reinforcement learning methods to choose the relay policy for mobile users in cellular systems, if the serving base station is heavily jammed. More specifically, we propose a deep reinforcement learning based UAV relay scheme to help cellular systems resist smart jamming without being aware of the jamming model and the network model in the dynamic game based on the previous anti-jamming relay experiences and the observed current network status. This scheme can achieve the optimal performance after enough interactions with the jammer. Simulation results show that this scheme can reduce the bit error rate of the messages and save energy for the cellular system compared with the existing scheme

    Amateur Drone Monitoring: State-of-the-Art Architectures, Key Enabling Technologies, and Future Research Directions

    Full text link
    The unmanned air-vehicle (UAV) or mini-drones equipped with sensors are becoming increasingly popular for various commercial, industrial, and public-safety applications. However, drones with uncontrolled deployment poses challenges for highly security-sensitive areas such as President house, nuclear plants, and commercial areas because they can be used unlawfully. In this article, to cope with security-sensitive challenges, we propose point-to-point and flying ad-hoc network (FANET) architectures to assist the efficient deployment of monitoring drones (MDr). To capture amateur drone (ADr), MDr must have the capability to efficiently and timely detect, track, jam, and hunt the ADr. We discuss the capabilities of the existing detection, tracking, localization, and routing schemes and also present the limitations in these schemes as further research challenges. Moreover, the future challenges related to co-channel interference, channel model design, and cooperative schemes are discussed. Our findings indicate that MDr deployment is necessary for caring of ADr, and intensive research and development is required to fill the gaps in the existing technologies.Comment: arXiv admin note: text overlap with arXiv:1510.07390 by other author

    Optimal Power Allocation for Secure Directional Modulation Networks with a Full-duplex UAV User

    Full text link
    This paper make an investigation of a secure unmanned aerial vehicle (UAV)-aided communication network based on directional modulation(DM), in which one ground base station (Alice), one legitimate full-duplex (FD) user (Bob) and one illegal receiver (Eve) are involved. In this network, Alice acts as a control center to transmit confidential message and artificial noise (AN). The UAV user, moving along a linear flight trajectory, is intended to receive the useful information from Alice. At the same time, it also sends AN signals to further interference Eve's channel. Aiming at maximizing secrecy rate during the UAV flight process, a joint optimization problem is formulated corresponding to power allocation (PA) factors, beamforming vector, AN projection matrices. For simplicity, maximum ratio transmission, null-space projection and the leakage-based method are applied to form the transmit beamforming vector, AN projection matrix at Alice, and AN projection vector at Bob, respectively. Following this, the optimization problem reduces into a bivariate optimization programme with two PA factors. We put forward an alternating iterative algorithm to optimize the two PA factors. Simulation results demonstrate that the proposed strategy for FD mode achieves a higher SR than the half-duplex (HD) mode, and outperforms the FD mode with fixed PA strategy

    Applications of Deep Reinforcement Learning in Communications and Networking: A Survey

    Full text link
    This paper presents a comprehensive literature review on applications of deep reinforcement learning in communications and networking. Modern networks, e.g., Internet of Things (IoT) and Unmanned Aerial Vehicle (UAV) networks, become more decentralized and autonomous. In such networks, network entities need to make decisions locally to maximize the network performance under uncertainty of network environment. Reinforcement learning has been efficiently used to enable the network entities to obtain the optimal policy including, e.g., decisions or actions, given their states when the state and action spaces are small. However, in complex and large-scale networks, the state and action spaces are usually large, and the reinforcement learning may not be able to find the optimal policy in reasonable time. Therefore, deep reinforcement learning, a combination of reinforcement learning with deep learning, has been developed to overcome the shortcomings. In this survey, we first give a tutorial of deep reinforcement learning from fundamental concepts to advanced models. Then, we review deep reinforcement learning approaches proposed to address emerging issues in communications and networking. The issues include dynamic network access, data rate control, wireless caching, data offloading, network security, and connectivity preservation which are all important to next generation networks such as 5G and beyond. Furthermore, we present applications of deep reinforcement learning for traffic routing, resource sharing, and data collection. Finally, we highlight important challenges, open issues, and future research directions of applying deep reinforcement learning.Comment: 37 pages, 13 figures, 6 tables, 174 reference paper

    Intelligent Physical Layer Security Approach for V2X Communication

    Full text link
    Intelligent transportation systems (ITS) with advanced sensing and computing technologies are expected to support a whole new set of services including pedestrian and vehicular safety, internet access for vehicles, and eventually, driverless cars. Wireless communication is a major driving factor behind ITS, enabling reliable communication between vehicles, infrastructure, pedestrians and network, generally referred to as vehicle to everything (V2X) communication. However, the broadcast nature of wireless communication renders it prone to jamming, eavesdropping and spoofing attacks which can adversely affect ITS. Keeping in view this issue, we suggest the use of an intelligent security framework for V2X communication security, referred to as intelligent V2X security (IV2XS), to provide a reliable and robust solution capable of adapting to different conditions, scenarios and user requirements. We also identify the conditions that impact the security and describe the open challenges in achieving a realistic IV2XS system

    3D Trajectory Optimization for Secure UAV Communication with CoMP Reception

    Full text link
    This paper studies a secrecy unmanned aerial vehicle (UAV) communication system with coordinated multi-point (CoMP) reception, in which one UAV sends confidential messages to a set of distributed ground nodes (GNs) that can cooperate in signal detection, in the presence of several colluding suspicious eavesdroppers. Different from prior works considering the two-dimensional (2D) horizontal trajectory design in the non-CoMP scenario, this paper additionally exploits the UAV's vertical trajectory (or altitude) control for further improving the secrecy communication performance with CoMP. In particular, we jointly optimize the three dimensional (3D) trajectory and transmit power allocation of the UAV to maximize the average secrecy rate at GNs over a particular flight period, subject to the UAV's maximum flight speed and maximum transmit power constraints. To solve the non-convex optimization problem, we propose an alternating-optimization-based approach, which optimizes the transmit power allocation and trajectory design in an alternating manner, by convex optimization and successive convex approximation (SCA), respectively. Numerical results show that in the scenario with CoMP reception, our proposed 3D trajectory optimization significantly outperforms the conventional 2D horizontal trajectory design, by exploiting the additional degree of freedom in vertical trajectory.Comment: 6 pages, 5 figures, submitted to IEEE Conference for possible publicatio

    Robust Trajectory and Resource Allocation Design for Secure UAV-aided Communications

    Full text link
    This paper aims to enhance the physical layer security against potential internal eavesdroppings by exploiting the maneuverability of an unmanned aerial vehicle (UAV). We consider a scenario where two receivers with different security clearance levels require to be served by a legitimate transmitter with the aid of the UAV. We jointly design the trajectory and resource allocation to maximize the accumulated system confidential data rate. The design is formulated as a mixed-integer non-convex optimization problem which takes into account the partial position information of a potential eavesdropper. To circumvent the problem non-convexity, a series of transformations and approximations are proposed which facilitates the design of a computationally efficient suboptimal solution. Simulation results are presented to provide important system design insights and demonstrate the advantages brought by the robust joint design for enhancing the physical layer security.Comment: 6 pages, 3 figures. This work has been accepted by IEEE ICC 201
    • …
    corecore