Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2

Abstract

This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.

Authors and Affiliations

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei

Keywords

Related Articles

Analysis of exchange market disruptors using graph-based social network analysis

Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture a...

Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks

Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...

Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...

A method for quantitative evaluation of security risk in cyber-physical systems

Cyber-physical systems were introduced with the introduction of the cyber sector into physical systems and the emergence of Industry 4.0. Although the main purpose of this combination has been to increase the efficiency,...

A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks

During the very last decade, people have been spending lots of time working with social networks to interact with friends and to share information, thoughts, news, and etc. These social networks comprise a very important...

Download PDF file
  • EP ID EP730059
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei (2023). Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV. Electronic and Cyber Defense, 11(2), -. https://europub.co.uk/articles/-A-730059