A Secure UAV Cooperative Communication Framework: Prospect Theory Based Approach

被引:2
|
作者
Xie, Liang [1 ]
Su, Zhou [1 ]
Xu, Qichao [2 ]
Chen, Nan [3 ]
Fan, Yixin [4 ]
Benslimane, Abderrahim [5 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci, Engn, Xian 710049, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn, Automat, Shanghai 200444, Peoples R China
[3] Tennessee Technol Univ, Dept Elect, Comp Engn, Cookeville, TN 38505 USA
[4] Xidian Univ, Sch Commun Engn, Xian 710126, Peoples R China
[5] Univ Avignon, Comp Sci, Engn, Avignon, France
关键词
Autonomous aerial vehicles; Security; Law; Resists; Eavesdropping; Games; Interference; Unmanned aerial vehicles; eavesdropping attack; prospect theory; game theory; RESOURCE-ALLOCATION; TRANSMISSION; SYSTEMS; DESIGN; GAME;
D O I
10.1109/TMC.2024.3367124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs) have attracted extensive attention from both industry and academia owing to their high mobility, line-of-sight (LoS) characteristics of air-to-ground (A2G) channels, and low cost. However, the broadcast nature of wireless transmission and the LoS characteristics of A2G channels are vulnerable to eavesdropping attacks, which leads to severe security issues. To enhance the security of UAV communication, we propose a framework that multiple UAVs cooperate to resist attacks (MURA). Specifically, we first introduce an efficient incentive scheme based on the coalition game to motivate UAVs to participate in a coalition. By forming a grand coalition, we demonstrate that each individual UAV can maximize its utility. Additionally, we propose a secure UAV communication scheme designed to counter eavesdropping attacks. Two distinct types of scenarios are considered in UAV communication. In a completely rational scenario, in which participants make decisions aiming to maximize their utility, we utilize the Stackelberg game to model the interactions between UAVs and attacker. The existence and uniqueness of the equilibrium solution are proved, and the equilibrium solution is obtained. In the context of an imperfectly rational scenario, we employ the prospect theory (PT) to effectively capture the underlying rationality exhibited by the players. The PT valuations of the players, i.e., UAV and attacker, are deduced in detail. Meanwhile, the convergence of the PT valuations of UAV and attacker is proved. Finally, extensive simulation results show that the proposed scheme can effectively improve the utility of legal UAVs and ensure the security of the UAV networks compared with benchmarks.
引用
收藏
页码:10219 / 10234
页数:16
相关论文
共 50 条
  • [31] Secure UAV Communication in the Presence of Active Eavesdropper
    Liu, Chenxi
    Quek, Tony Q. S.
    Lee, Jemin
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [32] A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)
    Haque, Md Samsul
    Chowdhury, Morshed U.
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 113 - 122
  • [33] A rational framework for secure communication
    Tian, Youliang
    Ma, Jianfeng
    Peng, Changgen
    Wang, Yichuan
    Zhang, Liumei
    INFORMATION SCIENCES, 2013, 250 : 215 - 226
  • [34] Hierarchical Q-Learning Based UAV Secure Communication against Multiple UAV Adaptive Eavesdroppers
    Liu, Jue
    Sha, Nan
    Yang, Weiwei
    Tu, Jia
    Yang, Lianxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [35] Secure Formation Communication Method Based on the Opportunity Theory
    Jiang, Bo
    Du, Xinjun
    Yang, Yuxiao
    PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2019, : 144 - 148
  • [36] Friendship-based cooperative jamming for secure communication in Poisson networks
    Yuanyu Zhang
    Yulong Shen
    Xiaohong Jiang
    Wireless Networks, 2019, 25 : 4077 - 4095
  • [37] Friendship-based cooperative jamming for secure communication in Poisson networks
    Zhang, Yuanyu
    Shen, Yulong
    Jiang, Xiaohong
    WIRELESS NETWORKS, 2019, 25 (07) : 4077 - 4095
  • [38] OFDMA-Based DF Secure Cooperative Communication With Untrusted Users
    Saini, Ravikant
    Mishra, Deepak
    De, Swades
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (04) : 716 - 719
  • [39] Secure and covert communication strategy of UAV based on hybrid RF/FSO system
    Song, Xinkang
    Wang, Xiang
    Zhao, Shanghong
    Li, Yongjun
    Li, Xin
    Zhang, Xiwen
    OPTICS COMMUNICATIONS, 2025, 574
  • [40] An Optimal Partner Selection Approach Based on Prospect Theory
    Li, Xiaohui
    Wang, Jie
    Yu, Yang
    2008 IEEE SYMPOSIUM ON ADVANCED MANAGEMENT OF INFORMATION FOR GLOBALIZED ENTERPRISES, PROCEEDINGS, 2008, : 116 - 120