Cargando…

Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels

Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a...

Descripción completa

Detalles Bibliográficos
Autores principales: Wang, Xiaoming, Li, Demin, Guo, Chang, Zhang, Xiaolu, Kanhere, Salil S., Li, Kai, Tovar, Eduardo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427410/
https://www.ncbi.nlm.nih.gov/pubmed/30841645
http://dx.doi.org/10.3390/s19051126
_version_ 1783405204118437888
author Wang, Xiaoming
Li, Demin
Guo, Chang
Zhang, Xiaolu
Kanhere, Salil S.
Li, Kai
Tovar, Eduardo
author_facet Wang, Xiaoming
Li, Demin
Guo, Chang
Zhang, Xiaolu
Kanhere, Salil S.
Li, Kai
Tovar, Eduardo
author_sort Wang, Xiaoming
collection PubMed
description Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.
format Online
Article
Text
id pubmed-6427410
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-64274102019-04-15 Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels Wang, Xiaoming Li, Demin Guo, Chang Zhang, Xiaolu Kanhere, Salil S. Li, Kai Tovar, Eduardo Sensors (Basel) Article Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets. MDPI 2019-03-05 /pmc/articles/PMC6427410/ /pubmed/30841645 http://dx.doi.org/10.3390/s19051126 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Wang, Xiaoming
Li, Demin
Guo, Chang
Zhang, Xiaolu
Kanhere, Salil S.
Li, Kai
Tovar, Eduardo
Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title_full Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title_fullStr Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title_full_unstemmed Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title_short Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels
title_sort eavesdropping and jamming selection policy for suspicious uavs based on low power consumption over fading channels
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427410/
https://www.ncbi.nlm.nih.gov/pubmed/30841645
http://dx.doi.org/10.3390/s19051126
work_keys_str_mv AT wangxiaoming eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT lidemin eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT guochang eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT zhangxiaolu eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT kanheresalils eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT likai eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels
AT tovareduardo eavesdroppingandjammingselectionpolicyforsuspiciousuavsbasedonlowpowerconsumptionoverfadingchannels