共 50 条
Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
被引:12
|作者:
Wang, Xiaoming
[1
,2
,3
]
Li, Demin
[1
,2
]
Guo, Chang
[1
,2
]
Zhang, Xiaolu
[1
,2
]
Kanhere, Salil S.
[4
]
Li, Kai
[5
]
Tovar, Eduardo
[5
]
机构:
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
[2] Minist Educ, Engn Res Ctr Digitized Text & Apparel Technol, Shanghai 201620, Peoples R China
[3] Shanghai Earthquake Adm, Shanghai 200062, Peoples R China
[4] UNSW Sydney, Sch Comp Sci & Engn, Sydney, NSW 2052, Australia
[5] CISTER Res Unit, P-4200135 Porto, Portugal
来源:
关键词:
selection policy;
eavesdropping;
jamming;
fading channel;
UAV;
PHYSICAL LAYER SECURITY;
WIRELESS INFORMATION;
WIRETAP CHANNEL;
NETWORKS;
SURVEILLANCE;
ATTACKS;
DESIGN;
AREA;
D O I:
10.3390/s19051126
中图分类号:
O65 [分析化学];
学科分类号:
070302 ;
081704 ;
摘要:
Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV's eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.
引用
收藏
页数:18
相关论文