244 research outputs found

    UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective

    Get PDF
    Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important. This paper considers the power allocation strategy for a UAV swarm-enabled aerial network to enhance the physical layer security of the downlink transmission, where an eavesdropper moves following the trajectory of the swarm for better eavesdropping. Unlike existing works, we use only the large-scale channel state information (CSI) and maximize the secrecy throughput in a whole-trajectory-oriented manner. The overall transmission energy constraint on each UAV and the total transmission duration for all the legitimate users are considered. The non-convexity of the formulated problem is solved by using max-min optimization with iteration. Both the transmission power of desired signals and artificial noise (AN) are derived iteratively. Simulation results are presented to validate the effectiveness of our proposed power allocation algorithm and to show the advantage of aerial CoMP by using only the large-scale CSI

    Secrecy performance analysis on spatial modeling of wireless communications with unmanned aerial vehicle and ground devices

    Get PDF
    In this paper, the secrecy performance of the spatial modeling for ground devices with randomly placed eavesdroppers when an unmanned aerial vehicle (UAV) acted as two hops decode and forward (DF) was investigated. We characterize the secrecy outage probability (SOP) and intercept probability (IP) expressions. Our capacity performance analysis is based on the Rayleigh fading distributions. After analytical results by Monte Carlo simulation, and the Gauss-Chebyshev parameter was selected to yield a close approximation, the results demonstrate the SOP with the average signal-to-noise ratio (SNR) between UAV and ground users among the eavesdroppers and the IP relationship with the ability to intercept the information of the ground users successfully

    Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances

    Full text link
    Sixth-generation (6G) networks pose substantial security risks because confidential information is transmitted over wireless channels with a broadcast nature, and various attack vectors emerge. Physical layer security (PLS) exploits the dynamic characteristics of wireless environments to provide secure communications, while reconfigurable intelligent surfaces (RISs) can facilitate PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight security solution can be designed for low-end Internet of Things (IoT) devices, depending on the design scenario and communication objective. This article discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and jamming attacks. The theoretical background and literature review of RIS-aided PLS are discussed, and design solutions related to resource allocation, beamforming, artificial noise, and cooperative communication are presented. We provide simulation results to show the effectiveness of RIS in terms of PLS. In addition, we examine the research issues and possible solutions for RIS modeling, channel modeling and estimation, optimization, and machine learning. Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa

    UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location

    Get PDF
    This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demonstrate that the optimal flight path obtains better secrecy rate performance compared to that using direct UAV flight path encasing the transmitter and the legitimate receiver. Most importantly, even with the unknown eavesdropper location, we obtained a secrecy rate that is comparable to a scenario when the eavesdropper's location is known. However, the average secrecy rate with the unknown eavesdropper location varies depending on the proximity of the eavesdropper to the known location of the transmitter. We also observe that due to the UAV-aided jamming, the average secrecy rate stabilizes at some point even though the average received envelope power of the eavesdropper increases. This essentially demonstrates the effectiveness of the proposed scheme.Comment: Submitted to IEEE Access. Contents may be subject to copyright to IEE

    Characterization of UAV-based Wireless Channels With Diverse Antenna Configurations

    Get PDF
    In the next wave of swarm-based applications, unmanned aerial vehicles (UAVs) need to communicate with peer drones in any direction of a three-dimensional (3D) space. On a given drone and across drones, various antenna positions and orientations are possible. We know that, in free space, high levels of signal loss are expected if the transmitting and receiving antennas are cross polarized. However, increasing the reflective and scattering objects in the channel between a transmitter and receiver can cause the received polarization to become completely independent from the transmitted polarization, making the cross-polarization of antennas insignificant. Usually, these effects are studied in the context of cellular and terrestrial networks and have not been analyzed when those objects are the actual bodies of the communicating drones that can take different relative directions or move at various elevations. In this work, we show that the body of the drone can affect the received power across various antenna orientations and positions and act as a local scatterer that increases channel depolarization, reducing the cross-polarization discrimination (XPD). In addition to communicating with other UAVs in a swarm, UAVs can also serve users on the ground. For example, at ultra-low altitudes, an unmanned aerial vehicle (UAV) can act as a personal base station where it communicates only with one or two users on the ground. The communication device used by a user can be in their pocket, held by hand, or attached to their bodies. In these scenarios, the wireless channel can go through different fading levels, depending on the UAV’s location, user orientation, the location of the UE near the user’s body, and the frequency of the transmitted signal. The extent to which these factors can affect Air-to-Ground channels at ultra-low altitudes is studied in this work. We answer questions regarding how the human body and different use-cases of holding a communication device on the ground can affect the quality of the wireless channel and the optimal UAV hovering location. Furthermore, we demonstrate how the observed effects can be leveraged to our advantage and increase the physical layer security of UAV-assisted networks relying on the human-induced effects. Finally, in situations where a UAV swarm needs to communicate with a target that is far or surrounded by undesired receivers, beamforming can be an attractive solution. With beamforming, the transmitted signal becomes shaped towards a certain direction confining its spatial signature and increasing the received signal-to-noise-ratio (SNR) at the receiver. However, phase synchronization across the swarm is difficult to achieve and there will always exist some degree of phase incoherency across the transmitted signals from the distributed UAVs. Phase differences between the distributed nodes would result in signals arriving at different times and their phases might not align with each other resulting in reductions in beamforming gain. Hence, a method to increase phase coherency at the receiver with limited channel overhead is desired. To this end, we propose a UAV rotation-based method through which the UAV, relying on its heterogeneous body structure, can alter the phase of the incoming signals and increase the beamformed signal level

    Secrecy Performance Analysis of RIS-aided Communication System with Randomly Flying Eavesdroppers

    Get PDF
    In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface (RIS)-aided communication system with spatially random unmanned aerial vehicles (UAVs) acting as eavesdroppers. We consider the scenarios where the base station (BS) is equipped with single and multiple antennas. The signal-to-noise ratios (SNRs) of the legitimate user and the eavesdroppers are derived analytically and approximated through a computationally effective method. The ergodic secrecy capacity is approximated and derived in closed-form expressions. Simulation results validate the accuracy of the analytical and approximate expressions and show the security-enhanced effect of the deployment of the RIS
    • …
    corecore