59 research outputs found
Physical layer security against eavesdropping in the internet of drones (IoD) based communication systems
rones or unmanned aerial vehicles (UAVs) communication technology, which has recently been
thoroughly studied and adopted by 3GPP standard (Release 15) due to its dynamic, flexible, and flying
nature, is expected to be an integral part of future wireless communications and Internet of drones
(IoD) applications. However, due to the unique transmission characteristics and nature of UAV systems
including broadcasting, dominant line of site and poor scattering, providing confidentiality for legitimate
receivers against unintended ones (eavesdroppers) appears to be a challenging goal to achieve in such
scenarios. Besides, the special features of UAVs represented by having limited power (battery-operated)
and precessing (light RAM and CPU capabilities), makes applying complex cryptography approaches
very challenging and inefficient for such systems. This motives the utilization of alternative approaches
enabled by physical layer security (PLS) concept for securing UAV-based systems. Techniques based
on PLS are deemed to be promising due to their ability to provide inherent secrecy that is complexity independent, where no matter what computational processing power the eavesdropper may have, there
is no way to decrypt the PLS algorithms. This work is dedicated to highlight and overview the latest
advances and state of art researches on the field of applying PLS to UAV systems in a unified and
structured manner. Particularity, it discusses and explains the different, possible PLS scenarios and
use cases of UAVs, which are categorized based on how the drone is utilized and employed in the
communication system setup. The main classified categories include the deployment of the flying, mobile
UAV as a 1) base station (BS), 2) user equipment (UE), 2) relay, or 4) jammer. Then, recommendations
and future open research issues are stated and discussed.No sponso
Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances
Sixth-generation (6G) networks pose substantial security risks because
confidential information is transmitted over wireless channels with a broadcast
nature, and various attack vectors emerge. Physical layer security (PLS)
exploits the dynamic characteristics of wireless environments to provide secure
communications, while reconfigurable intelligent surfaces (RISs) can facilitate
PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight
security solution can be designed for low-end Internet of Things (IoT) devices,
depending on the design scenario and communication objective. This article
discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and
jamming attacks. The theoretical background and literature review of RIS-aided
PLS are discussed, and design solutions related to resource allocation,
beamforming, artificial noise, and cooperative communication are presented. We
provide simulation results to show the effectiveness of RIS in terms of PLS. In
addition, we examine the research issues and possible solutions for RIS
modeling, channel modeling and estimation, optimization, and machine learning.
Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa
Secrecy analysis of UAV-based mmWave relaying network
Employing unmanned aerial vehicles (UAVs) in millimeter-wave (mmWave) networks as relays has emerged as an appealing solution to assist remote or blocked communication nodes. In this case, the network security becomes a great challenge due to the presence of malicious eavesdroppers. In this paper, we perform a secrecy analysis for a UAV-based mmWave relaying network. We first investigate the relaying scheme without jamming where the UAV decodes and forwards the information from the source to the destination with malicious eavesdropping. Furthermore, to enhance the secrecy performance, we propose a cooperative jamming scheme via utilizing the destination and an external UAV to cooperatively disrupt the eavesdroppers at the two stages of relaying, respectively. Using the probability of line-of-sight (LoS) between the UAV and ground nodes, the three-dimensional (3D) antenna gain, and the Nakagami-m small-scale fading model, the secrecy outage probability (SOP) of the two schemes with and without jamming is analyzed. Closed-form expressions for the SOP of the two schemes are obtained by employing the Gauss-Chebyshev quadrature. Simulation results are presented to validate the theoretical expressions of SOP and to show the effectiveness of the proposed schemes
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV)
aided transmission protocol, where a source (Alice) sends confidential
information to a destination (Bob) via an energy-constrained UAV-mounted
amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve).
We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous
wireless information and power transfer (SWIPT) at the UAV-mounted relay to
enhance physical-layer security (PLS) and transmission reliability. Assuming a
low altitude UAV, we derive connection probability (CP), secrecy outage
probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR)
of the proposed protocol over Air-Ground (AG) channels, which are modeled as
Rician fading with elevation-angel dependent parameters. By simulations, we
verify our theoretical results and demonstrate significant performance
improvement of our protocol, when compared to conventional transmission
protocol with ground relaying and UAV-based transmission protocol without
destination-assisted jamming. Finally, we evaluate the impacts of different
system parameters and different UAV's locations on the proposed protocol in
terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio
Secrecy rate analysis of UAV-enabled mmWave networks using matern hardcore point processes
IEEE Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave (mmWave) band and takes into account unique features of air-toground channels and practical constraints of UAV deployment. To be specific, it explores the 3D antenna gain in the air-toground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks
Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes
© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave band and takes into account unique features of air-to-ground channels and practical constraints of UAV deployment. To be specific, it explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdropper
Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matern Hardcore Point Processes
Communications aided by low-altitude unmanned aerial vehicles (UAVs) have emerged as an effective solution to provide large coverage and dynamic capacity for both military and civilian applications, especially in unexpected scenarios. However, because of their broad coverage, UAV communications are prone to passive eavesdropping attacks. This paper analyzes the secrecy performance of UAVs networks at the millimeter wave band and takes into account unique features of air-to-ground channels and practical constraints of UAV deployment. To be specific, it explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations. In addition, we propose the transmit jamming strategy to improve the secrecy performance in which part of UAVs send jamming signals to confound the eavesdroppers. Simulation results verify our analysis and demonstrate the impact of different system parameters on the achievable secrecy rate. It is also revealed that optimizing the density of jamming UAVs will significantly improve security of UAV-enabled networks
- …