Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.
Authors and Affiliations
Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei
Energy Aware Routing in the Internet of Things using improved Grasshopper Metaheuristic Algorithm
In most Internet of Things (IoT) applications, network nodes are limited in terms of energy source. Therefore, the need for innovative methods to eliminate energy loss which shortens the life of networks is fully felt in...
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...
A novel way to identify effective test-case in software testing
Test data generation is one of the costly parts of the software testing, which is performed according to the designed test cases. The problem of designing test cases and then generating optimized test data is one of the...
Recognition Chaff from target by determining the optimal waveform in the radar detector using artificial neural network
Deflecting missile’s radar guidance or missile’s seeker by chaff is a common and effective defensive method which is used in military vessels. To counter this defensive measure, methods for recognition targets from chaff...
Distributed Solving of Weapon Target Assignment Problem using Learning Automata
This article presents a method to solve the weapon target assignment problem, which is one of the problems of distributed constraint optimization. The previous methods do not guarantee the convergence problem properly an...