ترغب بنشر مسار تعليمي؟ اضغط هنا

Securing Mobile Multiuser Transmissions with UAVs in the Presence of Multiple Eavesdroppers

136   0   0.0 ( 0 )
 نشر من قبل Aly Sabri Abdalla
 تاريخ النشر 2020
  مجال البحث هندسة إلكترونية
والبحث باللغة English




اسأل ChatGPT حول البحث

This paper discusses the problem of securing the transmissions of multiple ground users against eavesdropping attacks. We propose and optimize the deployment of a single unmanned aerial vehicle (UAV), which serves as an aerial relay between the user cluster and the base station. The focus is on maximizing the secrecy energy efficiency by jointly optimizing the uplink transmission powers of the ground users and the position of the UAV. The joint optimization problem is nonconvex; therefore we split it into two subproblems and solve them using an iterative algorithm.



قيم البحث

اقرأ أيضاً

This paper investigates the problem of detection and classification of unmanned aerial vehicles (UAVs) in the presence of wireless interference signals using a passive radio frequency (RF) surveillance system. The system uses a multistage detector to distinguish signals transmitted by a UAV controller from the background noise and interference signals. First, RF signals from any source are detected using a Markov models-based naive Bayes decision mechanism. When the receiver operates at a signal-to-noise ratio (SNR) of 10 dB, and the threshold, which defines the states of the models, is set at a level 3.5 times the standard deviation of the preprocessed noise data, a detection accuracy of 99.8% with a false alarm rate of 2.8% is achieved. Second, signals from Wi-Fi and Bluetooth emitters, if present, are detected based on the bandwidth and modulation features of the detected RF signal. Once the input signal is identified as a UAV controller signal, it is classified using machine learning (ML) techniques. Fifteen statistical features extracted from the energy transients of the UAV controller signals are fed to neighborhood component analysis (NCA), and the three most significant features are selected. The performance of the NCA and five different ML classifiers are studied for 15 different types of UAV controllers. A classification accuracy of 98.13% is achieved by k-nearest neighbor classifier at 25 dB SNR. Classification performance is also investigated at different SNR levels and for a set of 17 UAV controllers which includes two pairs from the same UAV controller models.
209 - Yujie Liu , Xu Zhu , Eng Gee Lim 2020
In this paper, we investigate an open topic of a multiuser single-input-multiple-output (SIMO) generalized frequency division multiplexing (GFDM) system in the presence of carrier frequency offsets (CFOs) and in-phase/quadrature-phase (IQ) imbalances . A low-complexity semi-blind joint estimation scheme of multiple channels, CFOs and IQ imbalances is proposed. By utilizing the subspace approach, CFOs and channels corresponding to U users are first separated into U groups. For each individual user, CFO is extracted by minimizing the smallest eigenvalue whose corresponding eigenvector is utilized to estimate channel blindly. The IQ imbalance parameters are estimated jointly with channel ambiguities by very few pilots. The proposed scheme is feasible for a wider range of receive antennas number and has no constraints on the assignment scheme of subsymbols and subcarriers, modulation type, cyclic prefix length and the number of subsymbols per GFDM symbol. Simulation results show that the proposed scheme significantly outperforms the existing methods in terms of bit error rate, outage probability, mean-square-errors of CFO estimation, channel and IQ imbalance estimation, while at much higher spectral efficiency and lower computational complexity. The Cramer-Rao lower bound is derived to verify the effectiveness of the proposed scheme, which is shown to be close to simulation results.
The Internet of Things (IoT) will soon be omnipresent and billions of sensors and actuators will support our industries and well-being. IoT devices are embedded systems that are connected using wireless technology for most of the cases. The availabil ity of the wireless network serving the IoT, the privacy, integrity, and trustworthiness of the data are of critical importance, since IoT will drive businesses and personal decisions. This paper proposes a new approach in the wireless security domain that leverages advanced wireless technology and the emergence of the unmanned aerial system or vehicle (UAS or UAV). We consider the problem of eavesdropping and analyze how UAVs can aid in reducing, or overcoming this threat in the mobile IoT context. The results show that huge improvements in terms of channel secrecy rate can be achieved when UAVs assist base stations for relaying the information to the desired IoT nodes. Our approach is technology agnostic and can be expanded to address other communications security aspects.
Rate-Splitting Multiple Access (RSMA), relying on multi-antenna Rate-Splitting (RS) techniques, has emerged as a powerful strategy for multi-user multi-antenna systems. In this paper, RSMA is introduced as a unified multiple access for multi-antenna radar-communication (RadCom) system, where the base station has a dual communication and radar capability to simultaneously communicate with downlink users and probe detection signals to azimuth angles of interests. Using RS, messages are split into common and private parts, then encoded into common and private streams before being precoded and transmitted. We design the message split and the precoders for this RadCom system such that the Weighted Sum Rate (WSR) is maximized and the transmit beampattern is approximated to the desired radar beampattern under an average transmit power constraint at each antenna. We then propose a framework based on Alternating Direction Method of Multipliers (ADMM) to solve the complicated non-convex optimization problem. Results highlight the benefits of RSMA to unify RadCom transmissions and to manage the interference among radar and communications, over the conventional Space-Division Multiple Access (SDMA) technique.
In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimat e users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effects of both fading and path loss. Under these assumptions, a power efficient cooperative scheme, named emph{stochastic virtual beamforming}, is proposed. Applying this scheme, an unbounded secure rate with any desired outage level is achieved, provided that the density of the legitimate users tends to infinity. In addition, by tending the legitimate users density to the infinity, the tolerable density of eavesdroppers will become unbounded too.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا