A Secure UAV Cooperative Communication Framework: Prospect Theory Based Approach

被引:2
|
作者
Xie, Liang [1 ]
Su, Zhou [1 ]
Xu, Qichao [2 ]
Chen, Nan [3 ]
Fan, Yixin [4 ]
Benslimane, Abderrahim [5 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci, Engn, Xian 710049, Peoples R China
[2] Shanghai Univ, Sch Mechatron Engn, Automat, Shanghai 200444, Peoples R China
[3] Tennessee Technol Univ, Dept Elect, Comp Engn, Cookeville, TN 38505 USA
[4] Xidian Univ, Sch Commun Engn, Xian 710126, Peoples R China
[5] Univ Avignon, Comp Sci, Engn, Avignon, France
关键词
Autonomous aerial vehicles; Security; Law; Resists; Eavesdropping; Games; Interference; Unmanned aerial vehicles; eavesdropping attack; prospect theory; game theory; RESOURCE-ALLOCATION; TRANSMISSION; SYSTEMS; DESIGN; GAME;
D O I
10.1109/TMC.2024.3367124
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs) have attracted extensive attention from both industry and academia owing to their high mobility, line-of-sight (LoS) characteristics of air-to-ground (A2G) channels, and low cost. However, the broadcast nature of wireless transmission and the LoS characteristics of A2G channels are vulnerable to eavesdropping attacks, which leads to severe security issues. To enhance the security of UAV communication, we propose a framework that multiple UAVs cooperate to resist attacks (MURA). Specifically, we first introduce an efficient incentive scheme based on the coalition game to motivate UAVs to participate in a coalition. By forming a grand coalition, we demonstrate that each individual UAV can maximize its utility. Additionally, we propose a secure UAV communication scheme designed to counter eavesdropping attacks. Two distinct types of scenarios are considered in UAV communication. In a completely rational scenario, in which participants make decisions aiming to maximize their utility, we utilize the Stackelberg game to model the interactions between UAVs and attacker. The existence and uniqueness of the equilibrium solution are proved, and the equilibrium solution is obtained. In the context of an imperfectly rational scenario, we employ the prospect theory (PT) to effectively capture the underlying rationality exhibited by the players. The PT valuations of the players, i.e., UAV and attacker, are deduced in detail. Meanwhile, the convergence of the PT valuations of UAV and attacker is proved. Finally, extensive simulation results show that the proposed scheme can effectively improve the utility of legal UAVs and ensure the security of the UAV networks compared with benchmarks.
引用
收藏
页码:10219 / 10234
页数:16
相关论文
共 50 条
  • [41] Reinforcement Learning Based Dual-UAV Trajectory Optimization for Secure Communication
    Qian, Zhouyi
    Deng, Zhixiang
    Cai, Changchun
    Li, Haochen
    ELECTRONICS, 2023, 12 (09)
  • [42] Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication
    Zhang, Yiwen
    Cheng, Ruixia
    TELECOMMUNICATION SYSTEMS, 2023, 82 (04) : 487 - 498
  • [43] Dynamic Role Switching Scheme With Joint Trajectory and Power Control for Multi-UAV Cooperative Secure Communication
    Gao, Ang
    Wang, Qinyu
    Hu, Yansu
    Liang, Wei
    Zhang, Jiankang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (02) : 1260 - 1275
  • [44] Joint trajectory and power design for UAV-enabled cooperative jamming in two-way secure communication
    Yiwen Zhang
    Ruixia Cheng
    Telecommunication Systems, 2023, 82 : 487 - 498
  • [45] Cooperative Jamming via Spectrum Sharing for Secure UAV Communications
    Li, Yupeng
    Zhang, Rongqing
    Zhang, Jianhua
    Yang, Liuqing
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (03) : 326 - 330
  • [46] Cooperative navigation control method for UAV swarm based on communication power adaptation
    Liu, Xingyu
    Jiang, Zhibiao
    Jiang, Tianrui
    Guo, Ronghua
    Chang, Yuan
    Yan, Chao
    Zhou, Han
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2024, 46 (10): : 3536 - 3546
  • [47] A Clustering Based Steganographic Approach for Secure Data Communication
    SaiKrishna, A.
    Parimi, Shankar
    Manikandan, G.
    Sriram, N.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [48] A secure mobile communication approach based on information hiding
    Chen, Yun-Feng
    Li, Tao
    Gao, Dong-Ni
    Hu, Xiao-Qin
    Zhang, Xiao-Ping
    Liu, Jin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (03) : 134 - 139
  • [49] Cooperative Jamming for Secure UAV Communications With Partial Eavesdropper Information
    Li, Yupeng
    Zhang, Rongqing
    Zhang, Jianhua
    Gao, Shijian
    Yang, Liuqing
    IEEE ACCESS, 2019, 7 : 94593 - 94603
  • [50] CHAOS THEORY IN SECURE COMMUNICATION
    Dung, Nguyen Thanh
    Ivan, Zelinka
    MENDELL 2009, 2009, : 147 - 153