Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective

Abstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UED...

Full description

Bibliographic Details
Main Authors: Mengmeng Ren, Jian Chen, Yuchen Zhou, Long Yang
Format: Article
Language:English
Published: Wiley 2021-04-01
Series:IET Communications
Subjects:
Online Access:https://doi.org/10.1049/cmu2.12120
_version_ 1811225727948816384
author Mengmeng Ren
Jian Chen
Yuchen Zhou
Long Yang
author_facet Mengmeng Ren
Jian Chen
Yuchen Zhou
Long Yang
author_sort Mengmeng Ren
collection DOAJ
description Abstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UEDs have a better chance to eavesdrop terrestrial communication systems compared with the conventional ground eavesdroppers. It indicates that the emerging of UEDs brings new challenges to secure transmissions in terrestrial communication systems. In this study, a UAV is recruited to wisely jam the UEDs by adopting a dynamic three‐dimensional (3D) trajectory, in order to protect the legitimate transmission. To maximally improve the average secrecy rate, the joint optimization of the 3D trajectory of the UAV jammer and legitimate user scheduling as a non‐convex mixed‐integer optimization problem is formulated. To efficiently solve such a challenging problem, a novel enhanced genetic algorithm (EGA), where a combined encoding method and a fitness‐based crossover method are developed to improve the convergence performance, is proposed. Simulation results demonstrate the superior performance of the proposed EGA in terms of the average secrecy rate.
first_indexed 2024-04-12T09:12:19Z
format Article
id doaj.art-1657d931516c49a1b7f8fb4341ce595d
institution Directory Open Access Journal
issn 1751-8628
1751-8636
language English
last_indexed 2024-04-12T09:12:19Z
publishDate 2021-04-01
publisher Wiley
record_format Article
series IET Communications
spelling doaj.art-1657d931516c49a1b7f8fb4341ce595d2022-12-22T03:38:56ZengWileyIET Communications1751-86281751-86362021-04-0115678078910.1049/cmu2.12120Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspectiveMengmeng Ren0Jian Chen1Yuchen Zhou2Long Yang3The State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaAbstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UEDs have a better chance to eavesdrop terrestrial communication systems compared with the conventional ground eavesdroppers. It indicates that the emerging of UEDs brings new challenges to secure transmissions in terrestrial communication systems. In this study, a UAV is recruited to wisely jam the UEDs by adopting a dynamic three‐dimensional (3D) trajectory, in order to protect the legitimate transmission. To maximally improve the average secrecy rate, the joint optimization of the 3D trajectory of the UAV jammer and legitimate user scheduling as a non‐convex mixed‐integer optimization problem is formulated. To efficiently solve such a challenging problem, a novel enhanced genetic algorithm (EGA), where a combined encoding method and a fitness‐based crossover method are developed to improve the convergence performance, is proposed. Simulation results demonstrate the superior performance of the proposed EGA in terms of the average secrecy rate.https://doi.org/10.1049/cmu2.12120Electromagnetic compatibility and interferenceRadio links and equipmentOptimisation techniquesAerospace controlMobile robotsTelerobotics
spellingShingle Mengmeng Ren
Jian Chen
Yuchen Zhou
Long Yang
Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
IET Communications
Electromagnetic compatibility and interference
Radio links and equipment
Optimisation techniques
Aerospace control
Mobile robots
Telerobotics
title Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
title_full Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
title_fullStr Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
title_full_unstemmed Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
title_short Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
title_sort exploiting uav emitted jamming to improve physical layer security a 3d trajectory control perspective
topic Electromagnetic compatibility and interference
Radio links and equipment
Optimisation techniques
Aerospace control
Mobile robots
Telerobotics
url https://doi.org/10.1049/cmu2.12120
work_keys_str_mv AT mengmengren exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective
AT jianchen exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective
AT yuchenzhou exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective
AT longyang exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective