Next Article in Journal
Measurement of an Analyte Concentration in Test Solution by Using Helmholtz Resonator for Biosensor Applications
Next Article in Special Issue
Pattern-Based Decoding for Wi-Fi Backscatter Communication of Passive Sensors
Previous Article in Journal
Rapid SINS Two-Position Ground Alignment Scheme Based on Piecewise Combined Kalman Filter and Azimuth Constraint Information
Previous Article in Special Issue
An Energy-Efficient Two-Stage Cooperative Routing Scheme in Wireless Multi-Hop Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels

1
College of Information Science and Technology, Donghua University, Shanghai 201620, China
2
Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China
3
Shanghai Earthquake Administration, Shanghai 200062, China
4
School of Computer Science and Engineering, UNSW Sydney, Sydney, NSW 2052, Australia
5
CISTER Research Unit, 4200-135 Porto, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1126; https://doi.org/10.3390/s19051126
Submission received: 21 January 2019 / Revised: 20 February 2019 / Accepted: 28 February 2019 / Published: 5 March 2019

Abstract

:
Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.

1. Introduction

Recently, unmanned aerial vehicle (UAV) techniques have been widely applied to wireless communication systems such emergency rescue, homeland security, etc., owing to the flexible and quick deployment. Researchers from academia, industry, government agencies, etc., have paid lots of attractions to UAV communications. Game theory has been adopted to deal with a smart attacker from UAV [1]. Traditional UAV network security studies generally assume UAV communications are authorized and rightful, so researchers put great efforts to preventing existing UAV communications form malicious attacks such as jamming and eavesdropping [2,3,4,5]. However, the paradigm has changed with the development of UAV technologies. Terrorists or criminals may use UAVs to establish wireless communications for committing crimes and terrorism [6,7]. For instance, the eavesdroppers in the UAV communication networks can overhear the secure message, thus improving the capacity of communication network by reporting faked channel state information on the basis of the continuously changing channel environments [8,9]. More seriously, criminals can use UAV communication networks to commit bombing activities, and business spies may use them to filch trade secrets.
In traditional UAV surveillance works, eavesdropping and jamming UAVs are usually static during their tasks, while in this paper, we consider the UAV’s dynamic motion, which can reflect the performance of jamming selection on power consumption. The policy can provide the optimal results of eavesdropping and jamming selection based on power consumption in different locations. As shown in Figure 1, authorized UAVs share information through an existing UAV network, which may change topology occasionally because of UAV’s unpredictable trajectory. The new infrastructure-free mobile communication can be easily used by malicious UAVs (marked as red ones), e.g., criminals, terrorists, and business spies, to commit crimes, jeopardize public safety, invade the secret database of other companies, etc., thus imposing new challenges on the public security [1]. Therefore, there is a growing need for government agencies to legitimately monitor and eavesdrop wireless communications of suspicious UAVs [8].
In particular, we consider four surveillance scenarios as shown in Figure 2, where a legitimate UAV, i.e., UAVL, aims to monitor a suspicious communication link from a suspicious UAV transmitter (UAVST) to a UAV receiver (UAVSR) over fading channels. It is seldom to have significant multipath links in the sky. However, flying UAVs are strictly restricted according to policies. It is allowed for flying UAVs freely under some low altitudes, which are even lower than tall buildings, and what is more, extreme weather conditions may also influence the state of communication links for UAVs, so there are still scenarios for UAVs communication in multipath links. In reality, UAV transmitter and UAV receiver are relative, since communication links are bi-directional, using a pair of transmitter and receiver for simultaneous transmission in both directions.
In this scenario, we assume that the suspicious pair of UAVs (known as UAVST and UAVSR) has been detected by authorized agencies at the beginning, and they are eavesdropped by a legitimate UAV monitor (UAVL). Suspicious users’ detection and association can be referred to in Reference [9].
We use the eavesdropping model proposed by Jie Xu, et al. [10] which proactively generate jamming signals to interfere with the suspicious communication link through a full-duplex mode, so as to decrease the achievable data rate at the suspicious transmitter or receiver for overhearing more efficiently.
In order to initialize investigation, we assume that no advanced anti-eavesdropping schemes for security are employed by suspicious UAVs. Based on such assumptions, UAVL can overhear information successfully from the suspicious UAVs only when the received signal-to-noise ratio (SNR) (and accordingly the achievable data rate) at UAVL is no smaller than that at UAVSR, since in this case UAVL can decode the data that can be decoded at UAVSR [10]. Let RL and RS denote the achievable data rate of the legitimate eavesdropping link form UAVST to UAVL and the communication rate of the suspicious link form UAVST to UAVSR, respectively. Then, UAVL can decode transmitted signal correctly (with arbitrarily small error) if, and only if, RL is no smaller than RS. We define the eavesdropping rate RE as the suspicious data rate that UAVL can successfully decode, which is given as RE = RS if RLRS, and RE = 0 if RL < RS. UAVST and UAVSR are assumed to fly following a collision-free formation, where they keep a prescribed relative distance and angle. There are four cases for UAVL to successfully eavesdrop suspicious communication link. Case 1, as shown in Figure 2a, UAVL eavesdrops suspicious UAVST by sending jamming signals to UAVSR. In this case, UAVST increases transmission power in order to sustain RS at its original level, thus increasing RL inevitably in the eavesdropping link. When RL is no smaller than RS, UAVL is able to decode the whole information that can be decoded at UAVSR to fulfill eavesdropping missions. Case 2, as shown in Figure 2b, UAVL eavesdrops suspicious UAVST by sending jamming signals to UAVSR. Take the time-division-duplex (TDD) multi-antenna transmission scheme as an example, where UAVST designs its transmit beamforming vectors based on the reverse-link channel estimation from UAVSR. In that case, UAVST can spoof the reverse-link transmit signals received by UAVST, such that UAVST estimates a fake channel, and changes its beamforming direction towards UAVL and away from UAVSR [11]. This approach increases RL and decreases RS, and accordingly improves RE. Case 3, as shown in Figure 2c, UAVL eavesdrops suspicious UAVSR by sending jamming signals to UAVSR. In that case, UAVSR increases transmission power in order to sustain RS at its original level, thus increasing RL inevitably in the eavesdropping link. When RL is no smaller than RS, UAVL is able to decode the whole information that can be decoded at UAVST to fulfill eavesdropping missions. Case 4, as shown in Figure 2d, UAVL eavesdrops suspicious UAVSR by sending jamming signals to UAVST. Take the time-division-duplex (TDD) multi-antenna transmission scheme as an example, where UAVSR designs it’s transmit beamforming vectors based on the reverse-link channel estimation from UAVST. In that case, UAVSR can spoof the reverse-link transmit signals received by UAVSR, such that UAVSR estimates a suspicious channel, and changes its beamforming direction towards UAVL and away from UAVST [12]. This approach increases RL and decreases RS, and accordingly improves RE.
We have previously discussed the first approach to eavesdrop suspicious communication link by jamming UAVSR, as shown in Figure 2a [13], so this paper mainly focuses on the other three eavesdropping and jamming cases, as shown in Figure 2b–d. In practice, UAV’s trajectory period depends on the battery charge. Low power consumption can make sure the UAV fly in a relative long period. In this paper, we aim to (1) minimize the power consumption at UAVL, and to (2) maximize the eavesdropping rate at UAVL. Specifically, when the constraint of suspicious data rate is given, we formulate an optimization problem to find the most efficient jamming power allocation at UAVL to maximize the eavesdropping rate, which is polynomially solvable. Moreover, we propose a selection policy to facilitate the simultaneous eavesdropping and jamming for UAVL on the flight, which also derives the optimal jamming power by using linear programming. In particular, the proposed policy allocates the jamming power over the fading channel according to the limited jamming power constraint, as well as the position of UAVL. The impacts of fading states on the performance of our policy are analyzed by applying the proposed policy to four common fading models, i.e., Rayleigh, Ricean, Weibull, and Nakagami.
In our paper, we considered the topology between the legitimate UAV and two suspicious UAVs is a semi-circle with a diameter D. We mainly consider an optimal policy strategy for the legitimate UAV to obtain a good performance on monitoring. From the analysis, it is clear that the distance between UAVs is the key to the problem. Thus, considering UAVs’ distance is much more meaningful compared to the trajectory design in our model. In fact, the change of trajectories causes the change of distances between legitimate UAV and suspicious UAV, so we can apply our results in various trajectories. The main contributions of this work can be summarized as follows:
(1)
Traditional works focused on achieving secure UAV-ground (U2G) communications in the presence of terrestrial eavesdroppers/jammers, while in our paper, we considered UAV-UAV (U2U) communications in the air, so we formulated suspicious UAVs’ distance model, which considered the dynamic mobility of suspicious UAVs in sequence time slots;
(2)
Traditional works usually consider one case for eavesdropping and jamming, while in our paper, we proposed four cases of eavesdropping and jamming over fading channels, and then formulated an optimization problem to find the most efficient jamming power allocation at UAVL to maximize the eavesdropping rate;
(3)
Traditional works focus on improving power consumptions or data receive rate respectively, while in our paper, we proposed a selection policy to facilitate the simultaneous eavesdropping and jamming for UAVL on the flight, which allocated the jamming power over the fading channel according to the limited jamming power constraint as well as the position of UAVL.
The rest of the paper is organized as follows: Section 2 introduces related works on security techniques in UAV networks. In Section 3, we design the system model on legitimate eavesdropping and jamming. Section 4 proposes the problem formulation and selection policy, as well as the complexity and feasible solution analysis. Simulation results are shown in Section 5, followed by a conclusion in Section 6.

2. Related Works

In the literature, there have been a handful of methods for preventing existing wireless networks (e.g., cellular networks) from malicious attacking since wireless networks are prone to malicious attacks such as eavesdropping attack [12], DoS attack [14], spoofing attack [15], MITM attack [16], message falsification/injection attack [17], etc. For instance, authorized devices in a wireless network can, by interference, be illegal devices in the same network in terms of information stealing or virus attacking. Moreover, malicious device may overhear wireless communications sessions, as long as it is within the transmit coverage area of the transmitting device. Generally speaking, the requirements of confidentiality, availability, integrity, and authenticity should be satisfied by secure wireless communications [18]. Cryptographic techniques for preventing eavesdroppers from intercepting data transmissions between legitimate users are typically employed by existing communication systems, thus maintaining confidential transmission in wireless networks [19,20]. For example, passive eavesdropping is applicable to intercept infrastructure-free wireless communications (e.g., UAV networks) [21].
Recently, physical-layer security has emerged as a promising solution to secure UAV communications against eavesdropping attacks [22,23,24,25]. The authors in Reference [22] proposed an algorithm to adaptively control the UAV’s location over time to optimize UAV’s average secrecy rate basing on a secure single-UAV communication system. In Reference [23], authors regarded UAVs as friendly jammers to protect the ground wireless communication, while authors in References [24,25] employed UAVs as mobile relays to facilitate secure or reliable wireless communications. Authors in [26] introduced a power allocation strategy which was regarded as a zero-sum game between the transmitter and the eavesdropper. In Reference [27], authors considered a power control strategy based on Q-learning for the transmitter to enhance the secure capacity via preventing from smart attacks in the dynamic game, however, authors in Reference [27] did not consider the practical channel estimation error, which should not be ignored in the practical communication scenarios, since it will give a significant impact on the network performance. The authors in Reference [28] proposed the optimal power allocation strategies by studying the impact of channel estimation error on the capacity of specific channels. Authors in Reference [29] proposed a theoretical communication scheme, which use multiple antennas to generate artificial noise to degrade the channel quality of eavesdroppers. In Reference [30], authors proposed a low-density parity-check protocol, which used a four-step procedure to ensure wireless information-theoretic security, to achieve communication rates close to the fundamental security limits in wireless communications. However, none of these works [22,23,24,25,26,27,28,29,30] consider the use of proactive eavesdropping to enhance network security.
In order to enhance the quality of secure wireless transmissions, jamming the eavesdropper is an effective approach [31,32,33]. Authors in Reference [31] presented a cooperative jamming scheme, which help a legitimate user improve its data rate via sending a jamming signal to the eavesdropper. The authors in Reference [32] presented a hybrid artificial fast fading scheme, which achieved better performance for eavesdropper. In Reference [33], authors proposed a full-duplex scheme, which transmitted the jamming signal to degrade the channel of eavesdropper. Under this scheme, the system was no longer interference-limited, compared with the half-duplex case. Reference [34] formulated a stochastic game, and provided insights for secret and reliable communication against both jamming and eavesdropping. However, authors in References [31,32,33,34] considered eavesdropping as an illegitimate attack and targeted on decreasing the eavesdropping performance. Authors in References [35,36,37] focused on achieving secure UAV-ground (U2G) communications in the presence of terrestrial eavesdroppers/jammers, they did not consider UAV-UAV (U2U) communications in the air. Reference [12] discussed how an active eavesdropper can attack the training phase in wireless communication to improve its eavesdropping performance, however, Reference [12] did not consider the mobility of UAVs in their communications, and Reference [12] just considered the case of eavesdropping and jamming. In general, there is a lack of researches on power consumption controlling, legitimately eavesdropping and selection policy towards suspicious UAV communications.

3. System Model

3.1. Assumptions

We consider that the distance between suspicious UAV transmitter (UAVST) and receiver (UAVSR) is denoted as D meters. The distance can be calculated in the subsequent time slot, considering the dynamic mobility of the two UAVs. Without loss of generality, we consider legitimate eavesdropper (UAVL) patrols in a predetermined circular trajectory between UAVST and UAVSR with a diameter D, particularly, the wireless link dynamics that are affected by the distance between UAVL and the suspicious UAVs are identical on a semi-circle of the trajectory. As a result, we consider the trajectory of UAVL as a semi-circle, even though the distance between UAVL is dynamic with time-depend.
The suspicious communication between UAVST and UAVSR consists of m number of time slots, and each time slot is denoted as x. We assume that UAVST communicates with UAVSR in a TDMA fashion, however, it should be noted that our method is generalized and thus agnostic of the MAC protocol in use. In our proposed model, we assume that the suspicious UAVs consider the UAVL’s eavesdropping signal as interference during the wireless communication.
In fact, our policy proposed in Section IV is general and can support other shapes of flight trajectory since we have considered different fading channels with path loss that is affected by the distance between hostile UAV pairs, regardless of trajectories of UAVs. Moreover, Table 1 lists the fundamental variables that have been used in our system model.

3.2. Suspicious UAVs’ Distance Model

The distance between UAVL and UAVST, and the distance between UAVL and UAVSR relate to the performance of eavesdropping and jamming. Therefore, we will discuss the suspicious UAVs’ distance model in this part, which is based on the position of UAVL and the suspicious UAVs’ dynamic mobility.
As shown in Figure 3, the distance between UAVL and UAVST at time slot x , which was denoted as d 1 ( x ) , can be described as:
d 1 ( x ) = ( D 2 D 2 cos θ ( x ) ) 2 + ( D 2 sin θ ( x ) ) 2 = 2 D 2 1 cos θ ( x )
Additionally, the distance between UAVL and UAVSR, d 2 ( x ) , is given by d 2 ( x ) = D 2 d 1 2 ( x ) . Note that d 1 ( x ) and d 2 ( x ) can be also estimated by other ways, e.g., measuring receiving signal strength, or signal angle of arrival of UAVST or UAVSR.
The angle variation θ ( x ) depends on the real-time position of UAVL. However, as shown in Figure 4, the results of d 1 ( x ) is the same as Equation (1), because the expression of variations a and b can be transformed under the condition of θ < π / 2 , which means that
a = D 2 sin ( π θ ( x ) ) = D 2 sin θ ( x ) , b = D 2 + D 2 cos ( π θ ( x ) ) = D 2 D 2 c o s θ ( x )
The model is two-dimensional, and considers the dynamic mobility of suspicious UAVs in sequence time slots, as shown in Figure 5. The distance variation D is improved as a dynamic variation that relates to the time slot,
D ( x ) = D ( x 1 ) + φ v
Here, φ is the duration of each time slot, and v is a vertex that presents the speeds’ difference value of UAVST and UAVSR. We do not include three-dimensional degrees of freedom for improving the security, but that will be our future works.

3.3. Eavesdropping and Jamming Model

Based on the power constraint of UAVs, the suspicious UAVs’ selection for eavesdropping and jamming is an important parameter to be considered in the following algorithm. The optimal selection depends on the UAVL’s position at time slot x . There are four cases as follows:
Case 1:UAVL eavesdrops and jams UAVST.
As shown in Figure 2a, UAVL only chooses UAVST for eavesdropping and jamming. According to References [19,38], at time slot xth, the channel gain from UAVST to UAVSR, which was denoted as H s ( x ) , is expressed as:
H s ( x ) = λ H s ( x 1 ) + n 1 λ 2 D α 2
where α 2 denotes the path-loss exponent in the suspicious link and λ presents the coefficient which adjusts two components: the weights of the auto-correlated and the independent. n is a Gaussian random number generated by Additive White Gaussian Noise (AWGN). For the suspicious communication link, we define Signal to Interference plus Noise Ratio (SINR) at UAVST at time slot x as γ s ( x ) , which is given by
γ s ( x ) = H s ( x ) · K 2 1 ln K 1 ϵ · ( 2 ρ ( x ) 1 ) N 0 + P L ( x )
where ρ ( x ) denotes the adaptive modulation and coding (AMC) rate of the UAVST at time slot x, and the highest mode is denoted by ρ M . K 1 and K 2 are two constants related to the channel. N 0 denotes the power of white Gaussian noise. ϵ is the required instantaneous bit error rate. As elaborated in the assumption part, the suspicious UAVs consider the UAVL’s eavesdropping signal as interference during the wireless communication. Hence, the eavesdropping power at time slot x is a part of interference in suspicious communication. Another part of interference is the jamming power from UAVL. Therefore, the interference power at time slot x is denoted as P E ( x ) + P J ( x ) . Likewise, at time slot x, the channel gain in the eavesdropping and jamming links, i.e., from UAVST to UAVL, is given by
H e ( x ) = H j ( x ) = λ H e ( x 1 ) + n 1 λ 2 d 1 α 1 ( x )
where n is a Gaussian random number generated by AWGN. α 1 denotes the path-loss exponent. d 1 ( x ) is the distance between UAVL and UAVST at time slot x, which can be acquired by Equation (1).
As the relative position of UAVL to UAVST/UAVSR changes from time to time, there are two components in the eavesdropping link, which named as auto-correlated component and independent component. The former relies on the previous channel condition and the latter is independent of previous channels. The two components are adjusted by a coefficient λ . Moreover, λ decreases with the growth of the speed of UAVL. We define Signal to Noise Ratio (SNR) of the eavesdropping and jamming links at time slot x as γ e ( x ) , which is
γ e ( x ) = γ j ( x ) = H e ( x ) · K 2 1 ln K 1 ϵ · ( 2 ρ ( x ) 1 ) N 0
According to the regression model proposed in Reference [20], the PRR of suspicious data packets eavesdropped by UAVL, which was denoted as R ( x ) , is given by
R ( x ) = ( 1 1 2 e x p β 0 γ e ( x ) + β 1 ) 8 ( 2 f l )
where β 0 and β 1 are two constants in the regression model. Moreover, β 0 controls the shape of the regression curve and β 1 induces horizontal shifts of the curve. f and l denote frame size and preamble size of the data packet, respectively.
Case 2:UAVL eavesdrops UAVST by jamming UAVSR.
As shown in Figure 2b, UAVL chooses UAVST for eavesdropping and UAVSR for jamming. In this case, the channel gain in the eavesdropping link is the same as in Equation (6), and because of the jamming object selection of UAVSR, the channel gain in the jamming link is changed as:
H j ( x ) = λ H j ( x 1 ) + n 1 λ 2 d 2 α 1 ( x )
where d 2 ( x ) = D ( x ) 2 d 1 2 ( x ) . Accordingly, the Signal to Noise Ratio (SNR) in the jamming link denotes as:
γ j ( x ) = H j ( x ) · K 2 1 ln K 1 ϵ · ( 2 ρ ( x ) 1 ) N 0
Case 3:UAVL eavesdrops and jams UAVSR.
As shown in Figure 2c, UAVL only chooses UAVST for eavesdropping and jamming. The channel gains for eavesdropping and jamming links are denoted as:
H e ( x ) = H j ( x ) = λ H e ( x 1 ) + n 1 λ 2 d 2 α 1 ( x )
where d 2 ( x ) = D ( x ) 2 d 1 2 ( x ) . Accordingly, the Signal to Noise Ratio (SNR) in the jamming link is the same as in Equation (7).
Case 4:UAVL eavesdrops UAVSR by jamming UAVST.
As shown in Figure 2d, UAVL chooses UAVST for jamming and UAVSR for eavesdropping. In this case, the channel gain in the eavesdropping link is the same as in Equation (11), and the channel gain in the jamming link is the same as in Equation (6).

4. Formulation and Policy

4.1. Problem Formulation

Without loss of generality, we consider the wireless communication, as shown in Figure 2b for the problem formulation, where UAVL aims to eavesdrop data packets from UAVST via jamming UAVSR. Note that our algorithm is common in the other three cases because channel gains for eavesdropping links are associated with D ( x ) according to Equation (11). D ( x ) is the only parameter that influences eavesdropped data packets. Based on the notations in the system model, we formulate the optimization problem to maximize the eavesdropped data packets via optimizing jamming power. Assume that each suspicious data packet has b bytes and then successfully eavesdropped data (in bytes) can be calculated as x = 1 m b · R ( x ) in m time slots. To prevent legitimate jamming and eavesdropping being detected by suspicious UAVs, SINR of the suspicious link has to be maintained at a certain threshold δ , which presents γ s ( x ) = δ . Specifically, the modulation of UAVST that is used to transmit data to UAVSR is 2 ρ ( x ) Quadrature Amplitude Modulation (QAM), where ρ ( x ) = { 1 , , ρ m a x } . ρ m a x indicates the number of modulation levels available for rate adaptation. Constraint 0 x = 1 m P L ( x ) P L t o t a l specifies that the total consuming power (eavesdropping plus jamming) of UAVL during the eavesdropping period is required to be less than the total obtained power of the UAVL, P L t o t a l . Constraint P L ( x ) P L m a x   ( x ,   x = 1 , 2 , , m ) specifies that, in each eavesdropping period, UAVL consumes no more than P L m a x power. Then, the formulation of the problem is presented as follows.
max P L ( x ) , ρ ( x ) x = 1 m b · R ( x )
Subject to:
γ s ( x ) = δ
0 x = 1 m P L ( x ) P L t o t a l
P L ( x ) P L m a x   ( x ,   x = 1 , 2 , , m )
1 ρ ( x ) ρ m a x
Furthermore, in terms of Equation (13), we have
ρ ( x ) = log 2 ( δ 2 ( N 0 + P L ( x ) ) H s ( x ) · K 2 1 ln K 1 ϵ + 1 )
which indicates that the modulation level is adapted by UAVST in terms of the consuming power P L ( x ) of UAVL. Specifically, UAVST increases ρ ( x ) to transmit data with an increasing P L ( x ) so that SINR of the suspicious link at time slot x is maintained at δ . Moreover, considering Equation (5) and Equation (13), the upper bound and the lower bound of the consuming power P L ( x ) can be obtained by
P L ( x ) = { H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0   i f   ρ ( x ) = 1 ( 2 ρ m a x 1 ) H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0   i f   ρ ( x ) = ρ m a x
Consequently, by substituting Equations (6), (7), (8), (9), (10), and (11) into (13), (14), (15), and (16) the optimization problem is reformulated as follows:
Optimal Eavesdropping and Jamming Problem:
max P L ( x ) b · x = 1 m ( 1 1 2 e x p β 1 β 0 δ H e ( x ) + H j ( x ) H s ( x ) · ( 1 + P L ( x ) N 0 ) ) 8 ( 2 f l )
Subject to:
0 x = 1 m P L ( x ) P L t o t a l P L ( x ) P L m a x   ( x ,   x = 1 , 2 , , m ) P L ( x ) H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0 P L ( x ) ( 2 ρ m a x 1 ) H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0

4.2. Selection Policy For Eavesdropping and Jamming

First, the optimal consuming power, P L * ( x ) in the optimization problem is able to be derived by linear optimization techniques, e.g., linear programming. Next, we propose the selection policy to allocate jamming power for UAVL in real time, as shown in Policy 1. According to Reference [10], UAVL overhears the channels of suspicious and eavesdropping link via channel probing, so the channel gains H s ( x ) , H e ( x ) , H j ( x ) and N 0 are known by UAVL at the beginning of time slot x. Since γ s ( x ) = δ is required by UAVL to successfully eavesdrop the suspicious transmission, we have
P L ( x ) N 0 · ( H s ( x ) H e ( x ) H j ( x ) ) H e ( x ) + H j ( x )
where ρ ( x ) is given by Equation (11). Therefore, the jamming power at x = k is initialized as
P L 0 ( k ) = N 0 · ( H s ( x ) H e ( x ) H j ( x ) ) H e ( x ) + H j ( x )
Next, initialized jamming and eavesdropping power P L 0 ( k ) is examined by UAVL if the four constraints in the optimization problem are satisfied. Specifically, if one of the constraints does not hold, it indicates that the required jamming power is much higher than the optimal solution, i.e., the link quality of the eavesdropping link is too low to decode the suspicious packet. In this case, UAVL does not send the jamming signal to suspicious UAVs for the purpose of power efficiency. Moreover, if x = 1 k 1 P L ( x ) + P L 0 ( k ) P L m a x and constraints (14), (15), and (16) hold, the optimization problem is derived by UAVL, and the optimal consuming power P L * ( x ) is obtained.
Policy 1 Selection Policy
1:BEGIN:
2: k : denotes the current time slot, x : denotes the duration of time slot.
3:INPUT: D ( 0 ) ,   n ,   λ , α ,   α 2 , Δ v
4:If v = 0 then
5: D = D ( 0 )
6:Else
7: D ( k ) = D ( k 1 ) = k x v
8:End if
9:Acquire: H s ( k ) ,   γ s ( k ) via D ( k )
10:Acquire: UAVL’s position: d 1 ( k ) ,   d 2 ( k )
11:While
     E ( k ) = [ 0 , 1 ] T | | E ( k ) = [ 1 , 0 ] T | | J ( k ) = [ 0 , 1 ] T | | J ( k ) = [ 1 , 0 ] T
do
12:  Acquire: P L ( k ) = P L e ( k ) + P L j ( k )
13:  power set in all cases: { P L i ( k ) } ,   i = 1 , 2 , 3 , 4 .
14:End while
15:For i = 1 : 4 ,   i + + do
16: If the Equations (13) (14) (15) then
17:   derive Power-efficient package rate maximum problem
18:   Acquire P L i * ( k )
19: else
20: P L i * ( k ) = 0 ,   E ( k ) = [ 0 , 0 ] T ,   J ( k ) = [ 0 , 0 ] T
21: Endif
22:endfor
23: P L * ( k ) = min { P L i * ( k ) } ,   i * = arg min { P L i * ( k ) }
24:Output: E ( k ) = E i * ( k ) ,   J ( k ) = J i * ( k )
25:If E ( k ) = E ( k 1 ) & & J ( k ) = J ( k 1 ) then
26: UAVL doesn’t shift the eavesdropping-jamming model.
27:else
28: UAVL shifts the eavesdropping-jamming model from E ( k 1 ) ,   J ( k 1 )   t o   E ( k ) ,   J ( k )
29:endif
30: k = k + 1
31:Go back to line 6 until k = m + 1
32:END

4.3. Policy Analysis

4.3.1. Computing Complexity

Note that the power consumption of executing selection policy is much smaller than the jamming power of UAVL, which is negligible. The time complexity of selection policy is denoted as O ( n 2 m + n m ) . Based on [13], the time complexity of Power Efficient Legitimate Eavesdropping (PELE) that calculate the optimal power result is O ( m ) which depends on the number of time slots. Considering the number of cases used in eavesdropping and jamming models, which are denoted as n , the selection policy’s time consumption in finding optimal power solutions is O ( n m ) . After calculating optimal power consumptions in all cases in each time slot, the algorithm uses the Bubble method [39] to acquire the minimum power in all cases, which are denoted as O ( n 2 ) in each time slot and O ( m n 2 ) in the whole eavesdropping and jamming process.
Therefore, the selection policy’s time complexity can be denoted as O ( n 2 m + n m ) , where n denotes the number of cases and m denotes the number of time slots.
In our research, we find that it is a challenging problem to solve the optimal number of time slots for accurate resolution of the optimization problem. As the complexity increases, it is really difficult to obtain the optimal number of slots for accurate resolution of our problem. Due to the limitations on laboratory equipment, we only discuss the algorithm performance with six time slots in our simulations. Our further research is to design an algorithm to research the optimal number of slots for accurate resolution of the optimization problem.

4.3.2. Feasible Solution

Regarding the proposed Optimal Eavesdropping and Jamming Problem, we will discuss whether it has the feasible solution or not. Based on Reference [40], the optimization model that has the feasible solution should satisfy three constraints: (a) The variable is effective collection based on the constraints in the optimization model, (b) the objective of the optimization model is the continuous function, and (c) the objective of the optimization model is a convex function. We will prove these three properties in this part.
First, we will discuss the variable’s effective collection under the constraints in our proposed optimization model. The constraints 0 x = 1 m P L ( x ) P L t o t a l and P L ( x ) P L m a x   ( x ,   x = 1 , 2 , , m ) relates to the practice in the reality, which defines P L ( x ) ’s maximums of upper and lower bound. The last two constraints should be proved, satisfying the effective collection. They make further definition of P L ( x ) ’s upper and lower bound, furthermore, the relationship between H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0 and ( 2 ρ m a x 1 ) H s ( x ) · K 2 1 ln K 1 ϵ δ 2 N 0 should be considered. In fact, the parameters H s ( x ) , K 2 1 , and δ 2 are larger than zero. K 1 is larger than ϵ , which means that ln K 1 ϵ > 0 , then the last two constraints can be transformed into:
1 δ 2 P L ( x ) H s ( x )   K 2 1 ln K 1 ϵ 2 ρ m a x 1
ρ m a x is a parameter that is larger than 1. Therefore, the variable P L ( x ) has the effective collection under the four constraints in the optimization model.
Second, we will discuss the objective’s consecutiveness in the optimization model. Obviously, the objective is a composite function, which uses the constant function, power function, exponential function and the logarithmic function based on P L ( x ) , H s ( x ) , H e ( x ) , and H j ( x ) . It is easy to prove that the functions of P L ( x ) , H s ( x ) , H e ( x ) , and H j ( x ) are all continuous functions. Moreover, the sum function does not affect the function’s consecutiveness. Therefore, the objective in our proposed Optimal Eavesdropping and Jamming Problem is a continuous function.
Finally, we will discuss whether the objective in our proposed Optimal Eavesdropping and Jamming Problem is a convex function or not. In order to simplify, we define the objective function as G ( x ) , where
G ( x ) = ( 1 1 2 e x p β 1 β 0 δ H e ( x ) + H j ( x ) H s ( x ) · ( 1 + P L ( x ) N 0 ) ) 8 ( 2 f l )
We have proved that the objective is a continuous function in the above paragraph, and then the convex property can be proved by the second derivation, which is denoted as:
G ( x ) = b l n [ 8 ( 2 f l ) ] · 1 2 exp ( β 1 β 0 δ H e ( x ) + H j ( x ) H s ( x ) · ( 1 + P L ( x ) N 0 ) ) · l n 1 2 [ ( H e ( x ) + H j ( x ) H s ( x ) ) + ( P L ( x ) N 0 H e ( x ) + H j ( x ) H s ( x ) ) ]
According to the non-negativity of exponential function, the second term of G ( x ) will be larger than zero. Regarding the first term of G ( x ) , the preamble size l is always smaller than the frame size f in the practice, then the result of 8 ( 2 f l ) will be larger than 1, thus the first term is smaller than 0. Regarding the third term of G ( x ) , which is denoted as:
( H e ( x ) + H j ( x ) H s ( x ) ) 1 N 0 [ 2 P L ( x ) ( H e ( x ) + H j ( x ) H s ( x ) ) + P L ( x ) ( H e ( x ) + H j ( x ) H s ( x ) ) + P L ( x ) ( H e ( x ) + H j ( x ) H s ( x ) ) ] 0
Therefore, the first term G ( x ) is smaller than zero, and the second and the third terms are larger than zero. The second derivate result is smaller than zero. The objective of our proposed Optimal Eavesdropping and Jamming Problem is a convex function.
Finally, from the discussions above, we have the conclusions that: (1) The time complexity of selection policy is O ( n 2 m + n m ) , and (2) our proposed Optimal Eavesdropping and Jamming Problem has the feasible solution.

5. Numerical Results

In this section, we provide simulation results to verify the performance of our proposed selection policy. Furthermore, we choose four normal fading channels, e.g., Rayleigh, Ricean, Weibull, and Nakagami, to investigate the impacts on our proposed selection policy.

5.1. Simulation Configurations

The distance between the two suspicious UAVs is D, which various from 500 m to 2000 m, and the path length of UAVL is π D / 2 . The patrolling speed of UAVL is set to 10 m/s. In fact, we do realize the policies for using UAVs in our country. It is allowed for flying UAVs freely under altitudes of 120 m. In our research, the distance variation (from 500 m to 2000 m) is mainly in the same altitude, which can be within the permission of policies. We use MATLAB to conduct the experiments instead of an actual simulator, however, the experiments can be legally carried if there are enough equipped UAVs. The detailed system-level simulation parameters are shown in Table 2.
UAVST communicates with UAVSR in a TDMA fashion for suspicious collision-free transmission. Especially, we consider that a TDMA frame contains 6 time slots, and each of which is 10 s long. In one time slot, UAVST transmits its data to UAVSR, where UAVL eavesdrops and decides to jam the suspicious communication according to the selection policy. In addition, the suspicious link, eavesdropping link, and jamming link are assumed to be block-fading, i.e., the channels remain unchanged during each transmission block, and may change from block to block.

5.2. Eavesdropping Rate and Power Consumption

For comparison, we consider other two legitimate eavesdropping strategies: proactive eavesdropping with constant jamming power and zero jamming power. For the former scheme, we set the constant jamming power to 10−8 W (in fact, the constant jamming power can be set to any value below P L m a x , which has little effects on simulation results as observed in the performance). For the latter scheme, we set the constant jamming power to 0, which means UAVL passively overhears the packets transmitted by suspicious UAVs without sending jamming signal to the suspicious link [17,18,21].
Figure 6 shows that selection policy saves 65.79%, 52.66%, 78.12%, and 13.92% more power than the constant-Jamming scheme, when D = 500 m, 1000 m, 1500 m, and 2000 m, respectively. Selection policy saves 74.73%, 39.02%, 74.35%, and 8.40% more power than the No-Jamming scheme, when D = 500 m, 1000 m, 1500 m, and 2000 m, respectively. The power consumption of selection policy increases as time goes on in each simulation. The reason is that UAVL consumes power to eavesdrop suspicious UAVs either by jamming or not, thus the power consumption increases as time goes on. Power consumptions are not compared with each other under different distances, because in each simulation, UAVs fly at random speeds (e.g., random v ), thus causing different power consumptions that cannot simply be compared with each other.
Figure 7 presents the other two methods with optimal solutions in terms of the eavesdropped packets. Selection policy outperforms No-Jamming and Constant-Jamming schemes under different distances in the simulations. The reason is that selection policy purposely adapts the jamming power of UAVL to change the suspicious communication (e.g., to a smaller data rate) for overhearing more packets. In each eavesdropping time slot, UAVL selects proper eavesdropping case according to the selection policy, thus eavesdropping more information. When D = 500 m, selection policy outperforms the other two schemes by nearly 1.2 times. However, the divisions between the selection policy and the other two methods are narrowed when distances increase. That is because in such long-distance cases, channel conditions dominate the data rate rather than eavesdropping methods, so UAVL can receive almost the same number of eavesdropped packets regardless which algorithm UAVL has chosen.

5.3. Impact of Typical Fading Models

We apply selection policy into four typical fading channel models, i.e., Rayleigh, Ricean, Weibull and Nakagami, to study the impacts. Each fading channel is characterized with a specific coefficient component. In particular, the coefficient component of Rayleigh, Rician, Weibull, and Nakagami is set to 2, 1, 2, and 0.5, respectively [30].
In Figure 8, total power consumption increases with time going on regardless of distances. However, power consumption increases more sharply in short-distance cases (D = 500 m). That is because in short-distance cases, eavesdropping algorithms dominate eavesdropping performances, while in long-distance cases, fading channels dominate power consumptions rather than eavesdropping algorithms. This can also be interpreted by the eavesdropped packets in regards to the time slots, which is shown in Figure 9.
Figure 9 shows that eavesdropped packets under selection policy linearly grows with time in the four typical fading channels. Selection policy performs best in Weibull fading channel, but not obviously. Total eavesdropped packets are less in Nakagami fading channel than in other three channels with different time slots. This is because Weibull distribution is typically descriptive of channel fading with a dominant line-of-sight (LOS) propagation [41,42], which leads to a small amount of time the channel remains in a fade. For Nakagami channel with the coefficient component of 0.5, the received signal consists of a large number of noise waves with randomly distributed amplitudes, phase, and angles of arrival, which causes distortion and fading of the received signal.

6. Conclusions

In this paper, we investigated a proactive eavesdropping and jamming scenario which include four cases for UAVL to fulfil surveillance tasks. In such a surveillance paradigm, we formulated a power-efficient eavesdropping and jamming problem which has acceptable computing complexity and can be solved. Then, we proposed a selection policy for UAVL to allocate eavesdropping and jamming power efficiently. Particularly, UAVL selects the most efficient case for eavesdropping and jamming suspicious UAVs according to the selection policy in each time slot. With such policy, UAVL can eavesdrop more data by consuming less power. Simulation results showed that selection policy outperformed No-Jamming and Constant-Jamming schemes in both power consumption and data reception. Moreover, we applied selection policy into four typical fading channels to validate the performance, results showed that selection policy performs better in Weibull fading channels in terms of the package received rate (PRR). For future works, we plan to study the problems about jamming and eavesdropping towards suspicious UAV groups, which is a challenge for eavesdropping and jamming policy selection.

Author Contributions

Methodology, X.W.; software, X.Z.; validation, S.S.K., K.L. and E.T.; formal analysis, C.G.; writing—review and editing, X.W.; supervision, D.L.

Funding

This work is supported by Shanghai Science and Technology Committee under Grant No. 18DZ1200500; the NSF of China under Grant No. 71171045, No. 61772130 and No. 61301118; the Innovation Program of Shanghai Municipal Education Commission under Grant No. 14YZ130; and the International S&T Cooperation Program of Shanghai Science and Technology Commission under Grant No. 15220710600.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, C.; Xu, Y.; Xia, J.; Zhao, J. Protecting secure communication under UAV smart attack with imperfect channel estimation. IEEE Access 2018, 6, 76395–76401. [Google Scholar] [CrossRef]
  2. Zou, Y.; Zhu, J.; Wang, X.; Hanzo, L. A survey on wireless security: Technical challenges, recent advances and future trends. Proc. IEEE 2016, 104, 1727–1765. [Google Scholar] [CrossRef]
  3. Ju, H.; Zhang, R. Throughput maximization in wireless powered communication networks. IEEE Trans. Wirel. Commun. 2014, 13, 418–428. [Google Scholar] [CrossRef]
  4. Xu, J.; Zhang, R. Energy beamforming with one-bit feedback. IEEE Trans. Signal Process. 2014, 62, 5370–5381. [Google Scholar] [CrossRef]
  5. Xu, J.; Liu, L.; Zhang, R. Multiuser MISO beamforming for simultaneous wireless information and power transfer. IEEE Trans. Signal Process. 2014, 62, 4798–4810. [Google Scholar] [CrossRef]
  6. Xu, J.; Zhang, R. A general design framework for MIMO wireless energy transfer with limited feedback. IEEE Trans. Signal Process. 2016, 64, 2475–2488. [Google Scholar] [CrossRef]
  7. Tran, H.; Zepernick, H.J. Proactive attack: A strategy for legitimate eavesdropping. In Proceedings of the IEEE International Conference on Communications and Electronics (ICCE), Ha Long, Vietnam, 27–29 July 2016; pp. 457–461. [Google Scholar]
  8. Zeng, Y.; Zhang, R. Wireless information surveillance via proactive eavesdropping with spoofing relay. IEEE J. Sel. Top. Signal Process. 2016, 10, 1449–1461. [Google Scholar] [CrossRef]
  9. Ayub, M.F.; Ghawash, F.; Shabbir, M.A.; Kamran, M.; Butt, F.A. Next Generation Security and Surveillance System Using Autonomous Vehicles. In Proceedings of the 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS), Wuhan, China, 22–23 March 2018. [Google Scholar]
  10. Xu, J.; Duan, L.; Zhang, R. Surveillance and intervention of infrastructure-free mobile communications: A new wireless security paradigm. IEEE Wirel. Commun. 2017, 24, 152–159. [Google Scholar] [CrossRef]
  11. Xu, J.; Duan, L.; Zhang, R. Proactive eavesdropping via cognitive jamming in fading channels. IEEE Trans. Wirel. Commun. 2017, 16, 2790–2806. [Google Scholar] [CrossRef]
  12. Zhou, X.; Maham, B.; Hjorungnes, A. Pilot contamination for active eavesdropping. IEEE Trans. Wirel. Commun. 2012, 11, 903–907. [Google Scholar] [CrossRef]
  13. Wang, X.; Li, K.; Kanhere, S.S.; Li, D.; Zhang, X.; Tovar, E. PELE: Power efficient legitimate eavesdropping via jamming in UAV communications. In Proceedings of the Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 402–408. [Google Scholar]
  14. Lakshmanan, S.; Tsao, C.; Sivakumar, R.; Sundaresan, K. Securing wireless data networks against eavesdropping using smart antennas. In Proceedings of the 28th International Conference on Distributed Computing Systems, Beijing, China, 17–20 June 2008; pp. 19–27. [Google Scholar]
  15. Raymond, R.; Midkiff, S. Denial-ofservice in wireless sensor networks: Attacks and defenses. IEEE Perv. Comput. 2008, 7, 74–81. [Google Scholar] [CrossRef]
  16. Kannhavong, B.; Nakayama, H.; Nemoto, Y.; Kato, N.; Jamalipour, A. A survey of routing attacks in mobile ad hoc networks. IEEE Wirel. Commun. 2007, 14, 85–91. [Google Scholar] [CrossRef]
  17. Meyer, U.; Wetzel, S. A man-in-themiddle attack on UMTS. In Proceedings of the 3rd ACM Workshop Wireless Security, Philadelphia, PA, USA, 1 October 2004; pp. 90–97. [Google Scholar]
  18. Ohigashi, T.; Morii, M. A practical message falsification attack on WPA. In Proceedings of the Joint Workshop Inf. Security, Kaohsiung, Taiwan, 6–7 August 2009; pp. 1–12. [Google Scholar]
  19. Shiu, Y.-S.; Chang, S.Y.; Wu, H.-C.; Huang, S.C.-H.; Chen, H.-H. Physical layer security in wireless networks: A tutorial. IEEE Wirel. Commun. 2011, 18, 66–74. [Google Scholar] [CrossRef]
  20. Christof, P.; Pelzl, J.; Preneel, B. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  21. Elliott, C. Quantum cryptography. IEEE Secur. Priv. 2004, 2, 57–61. [Google Scholar] [CrossRef]
  22. Cui, M.; Zhang, G.; Wu, Q.; Ng, D.W.K. Robust trajectory and transmit power design for secure UAV communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef]
  23. Zhou, Y.; Yeoh, P.L.; Chen, H.; Li, Y.; Hardjawana, W.; Vucetic, B. Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer. In Proceedings of the 11th IEEE Australia International Conference on Signal Processing and Communication Systems (ICSPCS), Surfers Paradise, QLD, Australia, 13–15 December 2017; pp. 1–6. [Google Scholar]
  24. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving physical layer security using UAV-enabled mobile relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
  25. Zhang, S.; Zhang, H.; He, Q.; Bian, K.; Song, L. Joint trajectory and power optimization for UAV relay networks. IEEE Commun. Lett. 2018, 22, 161–164. [Google Scholar] [CrossRef]
  26. Mukherjee, A.; Swindlehurst, A.L. Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in mimo channels. In Proceedings of the Military Communications Conference, San Jose, CA, USA, 31 October–3 November 2010; pp. 1695–1700. [Google Scholar]
  27. Li, Y.; Xiao, L.; Dai, H.; Poor, H.V. Game theoretic study of protecting MIMO transmissions against smart attacks. In Proceedings of the IEEE International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
  28. Mukherjee, A.; Swindlehurst, A.L. Jamming games in the MIMO wiretap channel with an active eavesdropper. IEEE Trans. Signal Process. 2013, 61, 82–91. [Google Scholar] [CrossRef]
  29. Yoo, T.; Goldsmith, A. Capacity and power allocation for fading MIMO channels with channel estimation error. IEEE Trans. Inf. Theory 2006, 52, 2203–2214. [Google Scholar]
  30. Edman, M.; Kiayias, A.; Yener, B. On passive inference attacks against physical-layer key extraction? In Proceedings of the Fourth European Workshop on System Security, ACM, Salzburg, Austria, 10 April 2011; Volume 8. [Google Scholar]
  31. Mitrpant, C.; Vinck, A.; Luo, Y. An achievable region for the Gaussian wiretap channel with side information. IEEE Trans. Inf. Theory 2006, 52, 2181–2190. [Google Scholar] [CrossRef]
  32. Negi, R.; Goel, S. Secret communication using artificial noise. In Proceedings of the IEEE International Conference on Vehicular Technology (VTC), Dallas, TX, USA, 28 September 2005; Volume 3, pp. 1906–1910. [Google Scholar]
  33. Bloch, M.; Barros, J.; Rodrigues, M.R.D.; McLaughlin, S.W. Wireless information-theoretic security. IEEE Trans. Inf. Theory 2008, 54, 2515–2534. [Google Scholar] [CrossRef]
  34. Zheng, G.; Krikidis, I.; Li, J.; Petropulu, A.P.; Ottersten, B. Improving physical layer secrecy using fullduplex jamming receivers. IEEE Trans. Signal Process. 2013, 61, 4962–4974. [Google Scholar] [CrossRef]
  35. Wu, Q.; Mei, W.; Zhang, R. Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective. arXiv, 2019; arXiv:1902.02472.preprint. [Google Scholar]
  36. Li, A.; Wu, Q.; Zhang, R. UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wirel. Commun. Lett. 2018, 8, 181–184. [Google Scholar] [CrossRef]
  37. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 2019. [Google Scholar] [CrossRef]
  38. Li, K.; Ni, W.; Wang, X.; Liu, R.P.; Kanhere, S.S.; Jha, S. Energy-efficient cooperative relaying for unmanned aerial vehicles. IEEE Trans. Mobile Comput. 2016, 15, 1377–1386. [Google Scholar] [CrossRef]
  39. Schoel, W.M.; Schürch, S.; Goerke, J. The captive bubble method for the evaluation of pulmonary surfactant: Surface tension, area, and volume calculations. Biochim. Biophys. Acta (BBA)-Gen. Subj. 1994, 1200, 281–290. [Google Scholar] [CrossRef]
  40. Boyd, S.; Vandenberghe, L. Convex Optimization; Cambridge University Press: Cambridge, UK, 2004. [Google Scholar]
  41. Wu, Q.; Zhang, R. Common throughput maximization in UAV-enabled OFDMA systems with delay consideration. IEEE Trans. Commun. 2018, 66, 6614–6627. [Google Scholar] [CrossRef]
  42. Wu, Q.; Zeng, Y.; Zhang, R. Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Trans. Wirel. Commun. 2018, 17, 2109–2121. [Google Scholar] [CrossRef]
Figure 1. A malicious eavesdropping scenario where malicious unmanned aerial vehicles (UAV) attack authorized UAVs through the UAV network.
Figure 1. A malicious eavesdropping scenario where malicious unmanned aerial vehicles (UAV) attack authorized UAVs through the UAV network.
Sensors 19 01126 g001
Figure 2. Eavesdropping via jamming.
Figure 2. Eavesdropping via jamming.
Sensors 19 01126 g002
Figure 3. The illustration of distance when θ < π / 2 .
Figure 3. The illustration of distance when θ < π / 2 .
Sensors 19 01126 g003
Figure 4. The illustration of distance when θ > π / 2 .
Figure 4. The illustration of distance when θ > π / 2 .
Sensors 19 01126 g004
Figure 5. The illustration of dynamic mobility of suspicious UAVs.
Figure 5. The illustration of dynamic mobility of suspicious UAVs.
Sensors 19 01126 g005
Figure 6. Total power consumptions by UAVL in different Ds with different jamming methods.
Figure 6. Total power consumptions by UAVL in different Ds with different jamming methods.
Sensors 19 01126 g006
Figure 7. Eavesdropped packets by UAVL in different Ds with different jamming methods.
Figure 7. Eavesdropped packets by UAVL in different Ds with different jamming methods.
Sensors 19 01126 g007
Figure 8. Total power consumptions by UAVL in different Ds under different fading channels.
Figure 8. Total power consumptions by UAVL in different Ds under different fading channels.
Sensors 19 01126 g008
Figure 9. Eavesdropped packets by UAVL in different Ds under different fading channels.
Figure 9. Eavesdropped packets by UAVL in different Ds under different fading channels.
Sensors 19 01126 g009
Table 1. Notations and variables.
Table 1. Notations and variables.
VariablesDescriptions
P L ( x ) Legitimate monitor consuming power ( P E ( x ) + P J ( x ) ) at time slot x
P E ( x ) Legitimate monitor eavesdropping power at time slot x
P J ( x ) Legitimate monitor jamming power at time slot x
γ e ( x ) SNR of eavesdropping link at time slot x
γ s ( x ) SNR of suspicious link at time slot x
K 1 , K 2 Two constants relating to the channel
N 0 Power of white Gaussian noise
d 1 ( x ) Distance between UAVL and UAVST at time slot x
d 2 ( x ) Distance between UAVL and UAVSR at time slot x
P L m a x Maximum consuming power of UAVL
P L t o t a l Total jamming power of UAVL
n Gaussian random number
α 1 , α 2 Path-loss exponent of wireless channel
λ Coefficient considered to adjust the weights of the autocorrelated component and independent component
δ SINR/SNR threshold
ρ ( x ) Adaptive modulation and coding (AMC) rate at time slot x
ϵ The required instantaneous bit error rate
Table 2. Simulation Parameters.
Table 2. Simulation Parameters.
ParametersValues
K 1 0.2
K 2 3
β 0 2.6
β 1 1
φ 60
𝜑 v [−10, 10]
θ [0, π]
f 20
l 10
ϵ 0.05
N 0 3.98 × 10−12 W
b 100 bytes
δ 3
λ 0.3
n 0.005377
α 1 3
α 2 2.5
D 500 m, 1000 m, 1500 m, 2000 m
P L m a x 8 × 10−6 W
ρ 1, 2, 4, 8
Constant Jamming Power10−8 W

Share and Cite

MDPI and ACS Style

Wang, X.; Li, D.; Guo, C.; Zhang, X.; Kanhere, S.S.; Li, K.; Tovar, E. Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels. Sensors 2019, 19, 1126. https://doi.org/10.3390/s19051126

AMA Style

Wang X, Li D, Guo C, Zhang X, Kanhere SS, Li K, Tovar E. Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels. Sensors. 2019; 19(5):1126. https://doi.org/10.3390/s19051126

Chicago/Turabian Style

Wang, Xiaoming, Demin Li, Chang Guo, Xiaolu Zhang, Salil S. Kanhere, Kai Li, and Eduardo Tovar. 2019. "Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels" Sensors 19, no. 5: 1126. https://doi.org/10.3390/s19051126

APA Style

Wang, X., Li, D., Guo, C., Zhang, X., Kanhere, S. S., Li, K., & Tovar, E. (2019). Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels. Sensors, 19(5), 1126. https://doi.org/10.3390/s19051126

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop