59 research outputs found

    Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems

    Get PDF
    rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying nature, is expected to be an integral part of future wireless communications and Internet of drones (IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated) and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches very challenging and inefficient for such systems. This motives the utilization of alternative approaches enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest advances and state of art researches on the field of applying PLS to UAV systems in a unified and structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and use cases of UAVs, which are categorized based on how the drone is utilized and employed in the communication system setup. The main classified categories include the deployment of the flying, mobile UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations and future open research issues are stated and discussed.No sponso

    Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances

    Full text link
    Sixth-generation (6G) networks pose substantial security risks because confidential information is transmitted over wireless channels with a broadcast nature, and various attack vectors emerge. Physical layer security (PLS) exploits the dynamic characteristics of wireless environments to provide secure communications, while reconfigurable intelligent surfaces (RISs) can facilitate PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight security solution can be designed for low-end Internet of Things (IoT) devices, depending on the design scenario and communication objective. This article discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and jamming attacks. The theoretical background and literature review of RIS-aided PLS are discussed, and design solutions related to resource allocation, beamforming, artificial noise, and cooperative communication are presented. We provide simulation results to show the effectiveness of RIS in terms of PLS. In addition, we examine the research issues and possible solutions for RIS modeling, channel modeling and estimation, optimization, and machine learning. Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa

    Secrecy analysis of UAV-based mmWave relaying network

    Get PDF
    Employing unmanned aerial vehicles (UAVs) in millimeter-wave (mmWave) networks as relays has emerged as an appealing solution to assist remote or blocked communication nodes. In this case, the network security becomes a great challenge due to the presence of malicious eavesdroppers. In this paper, we perform a secrecy analysis for a UAV-based mmWave relaying network. We first investigate the relaying scheme without jamming where the UAV decodes and forwards the information from the source to the destination with malicious eavesdropping. Furthermore, to enhance the secrecy performance, we propose a cooperative jamming scheme via utilizing the destination and an external UAV to cooperatively disrupt the eavesdroppers at the two stages of relaying, respectively. Using the probability of line-of-sight (LoS) between the UAV and ground nodes, the three-dimensional (3D) antenna gain, and the Nakagami-m small-scale fading model, the secrecy outage probability (SOP) of the two schemes with and without jamming is analyzed. Closed-form expressions for the SOP of the two schemes are obtained by employing the Gauss-Chebyshev quadrature. Simulation results are presented to validate the theoretical expressions of SOP and to show the effectiveness of the proposed schemes

    On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT

    Full text link
    This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source (Alice) sends confidential information to a destination (Bob) via an energy-constrained UAV-mounted amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve). We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous wireless information and power transfer (SWIPT) at the UAV-mounted relay to enhance physical-layer security (PLS) and transmission reliability. Assuming a low altitude UAV, we derive connection probability (CP), secrecy outage probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR) of the proposed protocol over Air-Ground (AG) channels, which are modeled as Rician fading with elevation-angel dependent parameters. By simulations, we verify our theoretical results and demonstrate significant performance improvement of our protocol, when compared to conventional transmission protocol with ground relaying and UAV-based transmission protocol without destination-assisted jamming. Finally, we evaluate the impacts of different system parameters and different UAV's locations on the proposed protocol in terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio

    Secrecy rate analysis of UAV-enabled mmWave networks using matern hardcore point processes

    Get PDF
    IEEE Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave (mmWave) band and takes into account unique features of air-toground channels and practical constraints of UAV deployment. To be specific, it explores the 3D antenna gain in the air-toground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks

    Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes

    Get PDF
    © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave band and takes into account unique features of air-to-ground channels and practical constraints of UAV deployment. To be specific, it explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdropper

    Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matern Hardcore Point Processes

    Get PDF
    Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave band and takes into account unique features of air-to-ground channels and practical constraints of UAV deployment. To be specific, it explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks
    • …
    corecore