Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective
Abstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UED...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-04-01
|
Series: | IET Communications |
Subjects: | |
Online Access: | https://doi.org/10.1049/cmu2.12120 |
_version_ | 1811225727948816384 |
---|---|
author | Mengmeng Ren Jian Chen Yuchen Zhou Long Yang |
author_facet | Mengmeng Ren Jian Chen Yuchen Zhou Long Yang |
author_sort | Mengmeng Ren |
collection | DOAJ |
description | Abstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UEDs have a better chance to eavesdrop terrestrial communication systems compared with the conventional ground eavesdroppers. It indicates that the emerging of UEDs brings new challenges to secure transmissions in terrestrial communication systems. In this study, a UAV is recruited to wisely jam the UEDs by adopting a dynamic three‐dimensional (3D) trajectory, in order to protect the legitimate transmission. To maximally improve the average secrecy rate, the joint optimization of the 3D trajectory of the UAV jammer and legitimate user scheduling as a non‐convex mixed‐integer optimization problem is formulated. To efficiently solve such a challenging problem, a novel enhanced genetic algorithm (EGA), where a combined encoding method and a fitness‐based crossover method are developed to improve the convergence performance, is proposed. Simulation results demonstrate the superior performance of the proposed EGA in terms of the average secrecy rate. |
first_indexed | 2024-04-12T09:12:19Z |
format | Article |
id | doaj.art-1657d931516c49a1b7f8fb4341ce595d |
institution | Directory Open Access Journal |
issn | 1751-8628 1751-8636 |
language | English |
last_indexed | 2024-04-12T09:12:19Z |
publishDate | 2021-04-01 |
publisher | Wiley |
record_format | Article |
series | IET Communications |
spelling | doaj.art-1657d931516c49a1b7f8fb4341ce595d2022-12-22T03:38:56ZengWileyIET Communications1751-86281751-86362021-04-0115678078910.1049/cmu2.12120Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspectiveMengmeng Ren0Jian Chen1Yuchen Zhou2Long Yang3The State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaThe State Key Laboratory of Integrated Service Networks Xidian University Xi'an ChinaAbstract This study investigates the physical‐layer security of a terrestrial communication system in the presence of potential unmanned aerial vehicle (UAV) eavesdroppers (UEDs). Due to the line‐of‐sight channels of ground‐to‐air links and the broadcast characteristics of wireless channels, the UEDs have a better chance to eavesdrop terrestrial communication systems compared with the conventional ground eavesdroppers. It indicates that the emerging of UEDs brings new challenges to secure transmissions in terrestrial communication systems. In this study, a UAV is recruited to wisely jam the UEDs by adopting a dynamic three‐dimensional (3D) trajectory, in order to protect the legitimate transmission. To maximally improve the average secrecy rate, the joint optimization of the 3D trajectory of the UAV jammer and legitimate user scheduling as a non‐convex mixed‐integer optimization problem is formulated. To efficiently solve such a challenging problem, a novel enhanced genetic algorithm (EGA), where a combined encoding method and a fitness‐based crossover method are developed to improve the convergence performance, is proposed. Simulation results demonstrate the superior performance of the proposed EGA in terms of the average secrecy rate.https://doi.org/10.1049/cmu2.12120Electromagnetic compatibility and interferenceRadio links and equipmentOptimisation techniquesAerospace controlMobile robotsTelerobotics |
spellingShingle | Mengmeng Ren Jian Chen Yuchen Zhou Long Yang Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective IET Communications Electromagnetic compatibility and interference Radio links and equipment Optimisation techniques Aerospace control Mobile robots Telerobotics |
title | Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective |
title_full | Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective |
title_fullStr | Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective |
title_full_unstemmed | Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective |
title_short | Exploiting UAV‐emitted jamming to improve physical‐layer security: A 3D trajectory control perspective |
title_sort | exploiting uav emitted jamming to improve physical layer security a 3d trajectory control perspective |
topic | Electromagnetic compatibility and interference Radio links and equipment Optimisation techniques Aerospace control Mobile robots Telerobotics |
url | https://doi.org/10.1049/cmu2.12120 |
work_keys_str_mv | AT mengmengren exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective AT jianchen exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective AT yuchenzhou exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective AT longyang exploitinguavemittedjammingtoimprovephysicallayersecuritya3dtrajectorycontrolperspective |