Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2

Abstract

This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.

Authors and Affiliations

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei

Keywords

Related Articles

An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks

In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...

Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm

In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in...

Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches

Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of danger...

A novel way to identify effective test-case in software testing

Test data generation is one of the costly parts of the software testing, which is performed according to the designed test cases. The problem of designing test cases and then generating optimized test data is one of the...

Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network

Deflecting missile’s radar guidance or missile’s seeker by chaff is a common and effective defensive method which is used in military vessels. To counter this defensive measure, methods for recognition targets from chaff...

Download PDF file
  • EP ID EP730059
  • DOI -
  • Views 46
  • Downloads 0

How To Cite

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei (2023). Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV. Electronic and Cyber Defense, 11(2), -. https://europub.co.uk/articles/-A-730059