Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2

Abstract

This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.

Authors and Affiliations

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei

Keywords

Related Articles

The New Algorithm for The Blind Extraction of The Radio Frequency Fingerprint Using the Specific Features of High-Power Amplifier and Local Oscillator

Recently, the radio frequency fingerprint (RFF) has received attention in applications such as specific emiiter identification, detection of deception in navigation signals and detection of intrusion in wireless networks...

A way to predict the stock price of the Tehran Stock Exchange in relation to knowledge

In recent years, due to the profitability of the stock market in Iran, small and large investments were attracted to this market, but unfortunately, due to their lack of knowledge of the stock market and price forecastin...

Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver

The spoofing attack is one of the most serious interferences in the Global Positioning System (GPS). By propagating a signal structurally similar to the original GPS signal, the spoofers try to influence the function of...

Speeding up the execution-time of Crystals-Kyber PQC Algorithm on FPGA

Quantum computers have much more computing power than classical computers and this has created a challenge in the field of public-key cryptography algorithms, which is predicted quantum computers will reach the computati...

Motion-encoded Gravitational Search Algorithm for moving target search using UAVs

In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...

Download PDF file
  • EP ID EP730059
  • DOI -
  • Views 53
  • Downloads 0

How To Cite

Vahidreza Soltaninia, saeed Talati, MohammadReza Hasani Ahangar, Farid Samsami Khodadad, Pooya Baei (2023). Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV. Electronic and Cyber Defense, 11(2), -. https://europub.co.uk/articles/-A-730059