Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.
Authors and Affiliations
Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei
Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver
The spoofing attack is one of the most serious interferences in the Global Positioning System (GPS). By propagating a signal structurally similar to the original GPS signal, the spoofers try to influence the function of...
A Trust Evaluation Model for Cloud Computing Using Bayesian Network
In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud...
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning
The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...
Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density
Satellite communication is considered a significant part of the enemy's communication information in electronic warfare due to its unique features and widespread use in communication systems. Therefore, from the electron...
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...