Do you want to publish a course? Click here

Securing Mobile IoT with Unmanned Aerial Systems

228   0   0.0 ( 0 )
 Added by Aly Sabri Abdalla
 Publication date 2020
and research's language is English




Ask ChatGPT about the research

The Internet of Things (IoT) will soon be omnipresent and billions of sensors and actuators will support our industries and well-being. IoT devices are embedded systems that are connected using wireless technology for most of the cases. The availability of the wireless network serving the IoT, the privacy, integrity, and trustworthiness of the data are of critical importance, since IoT will drive businesses and personal decisions. This paper proposes a new approach in the wireless security domain that leverages advanced wireless technology and the emergence of the unmanned aerial system or vehicle (UAS or UAV). We consider the problem of eavesdropping and analyze how UAVs can aid in reducing, or overcoming this threat in the mobile IoT context. The results show that huge improvements in terms of channel secrecy rate can be achieved when UAVs assist base stations for relaying the information to the desired IoT nodes. Our approach is technology agnostic and can be expanded to address other communications security aspects.



rate research

Read More

In modern networks, the use of drones as mobile base stations (MBSs) has been discussed for coverage flexibility. However, the realization of drone-based networks raises several issues. One of the critical issues is drones are extremely power-hungry. To overcome this, we need to characterize a new type of drones, so-called charging drones, which can deliver energy to MBS drones. Motivated by the fact that the charging drones also need to be charged, we deploy ground-mounted charging towers for delivering energy to the charging drones. We introduce a new energy-efficiency maximization problem, which is partitioned into two independently separable tasks. More specifically, as our first optimization task, two-stage charging matching is proposed due to the inherent nature of our network model, where the first matching aims to schedule between charging towers and charging drones while the second matching solves the scheduling between charging drones and MBS drones. We analyze how to convert the formulation containing non-convex terms to another one only with convex terms. As our second optimization task, each MBS drone conducts energy-aware time-average transmit power allocation minimization subject to stability via Lyapunov optimization. Our solutions enable the MBS drones to extend their lifetimes; in turn, network coverage-time can be extended.
A system of cooperative unmanned aerial vehicles (UAVs) is a group of agents interacting with each other and the surrounding environment to achieve a specific task. In contrast with a single UAV, UAV swarms are expected to benefit efficiency, flexibility, accuracy, robustness, and reliability. However, the provision of external communications potentially exposes them to an additional layer of faults, failures, uncertainties, and cyber-attacks and can contribute to the propagation of error from one component to other components in a network. Also, other challenges such as complex nonlinear dynamic of UAVs, collision avoidance, velocity matching, and cohesion should be addressed adequately. The main applications of cooperative UAVs are border patrol; search and rescue; surveillance; mapping; military. Challenges to be addressed in decision and control in cooperative systems may include the complex nonlinear dynamic of UAVs, collision avoidance, velocity matching, and cohesion. In this paper, emerging topics in the field of cooperative UAVs control and their associated practical approaches are reviewed.
124 - Shoma Matsui , Kai Cai 2019
In this paper we study a security problem of protecting secrets with multiple protections and minimum costs. The target system is modeled as a discrete-event system (DES) in which a few states are secrets, and there are multiple subsets of protectable events with different cost levels. We formulate the problem as to ensure that every string that reaches a secret state (from the initial state) contains a specified number of protectable events and the highest cost level of these events is minimum. We first provide a necessary and sufficient condition under which this security problem is solvable, and then propose an algorithm to solve the problem based on the supervisory control theory of DES. The resulting solution is a protection policy which specifies at each state which events to protect and the highest cost level of protecting these events is minimum. Finally, we demonstrate the effectiveness of our solution with a network security example.
164 - Yang Li , Meng Han , Zhen Yang 2021
A community integrated energy system (CIES) with an electric vehicle charging station (EVCS) provides a new way for tackling growing concerns of energy efficiency and environmental pollution, it is a critical task to coordinate flexible demand response and multiple renewable uncertainties. To this end, a novel bi-level optimal dispatching model for the CIES with an EVCS in multi-stakeholder scenarios is established in this paper. In this model, an integrated demand response program is designed to promote a balance between energy supply and demand while maintaining a user comprehensive satisfaction within an acceptable range. To further tap the potential of demand response through flexibly guiding users energy consumption and electric vehicles behaviors (charging, discharging and providing spinning reserves), a dynamic pricing mechanism combining time-of-use and real-time pricing is put forward. In the solution phase, by using sequence operation theory (SOT), the original chance-constrained programming (CCP) model is converted into a readily solvable mixed-integer linear programming (MILP) formulation and finally solved by CPLEX solver. The simulation results on a practical CIES located in North China demonstrate that the presented method manages to balance the interests between CIES and EVCS via the coordination of flexible demand response and uncertain renewables.
116 - Rui Sun , Weidong Wang , Li Chen 2021
Intelligent reflecting surface (IRS) is a promising technology for enhancing wireless communication systems. It adaptively configures massive passive reflecting elements to control wireless channel in a desirable way. Due to hardware characteristics and deploying environments, an IRS may be subject to reflecting element blockages and failures, and hence developing diagnostic techniques is of great significance to system monitoring and maintenance. In this paper, we develop diagnostic techniques for IRS systems to locate faulty reflecting elements and retrieve failure parameters. Three cases of channel state information (CSI) availability are considered. In the first case where full CSI is available, a compressed sensing based diagnostic technique is proposed, which significantly reduces the required number of measurements. In the second case where only partial CSI is available, we jointly exploit the sparsity of the millimeter-wave channel and the failure, and adopt compressed sparse and low-rank matrix recovery algorithm to decouple channel and failure. In the third case where no CSI is available, a novel atomic norm is introduced as the sparsity-inducing norm of the cascaded channel, and the diagnosis problem is formulated as a joint sparse recovery problem. Finally, the proposed diagnostic techniques are validated through numerical simulations.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا