امنیت در‌ شبکه‌های پهپاد رله مبتنی بر مخابره‌ی پنهان با حضور پهپاد شنودگر

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی دکترا، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران

2 مربی، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران

3 استاد، دانشگاه جامع امام حسین(ع)، تهران، ایران

4 استادیار، مدیر پژوهش و فناوری، دانشگاه تخصصی فناوری های نوین آمل، آمل، ایران

5 کارشناسی ارشد، دانشگاه تخصصی فناوری های نوین آمل، آمل، ایران

چکیده

در این مقاله استفاده از یک پهپاد رله قابل‌اعتماد کدگشا و انتقال‌دهنده (DF ) به‌منظور برقراری مخابره پنهان می آن‌یک فرستنده (آلیس) و یک گیرنده‌ای (باب) که در منطقه‌ای دورافتاده و خارج از شعاع مجاز ارسالی آلیس قرار دارد، پیشنهاد شده است. فرستنده‌ی زمینی از فن حداکثر نسبت انتقال (MRT ) و چندین آنتن برای ارسال سیگنال پیام استفاده می‌کند و همچنین پهپاد رله‌ در حالت کاملاً دوطرفه کار می‌کند، به‌گونه‌ای که در کنار رله کردن سیگنال پیام آلیس به سمت باب، به‌منظور افزایش خطای آشکارسازی مخابره‌ی پنهان توسط پهپاد شنودگر، سیگنال اختلال نیز ارسال می‌نماید. در این مقاله طرح جمینگ مبتنی بر منبع (SBJ ) به کار گرفته‌شده است تا نیاز به استفاده یک اخلال‌گر (جَمر) جداگانه در شبکه جلوگیری شود. ابتدا شرایط مخابره‌ی پنهان در شبکه‌ی مذکور موردبررسی قرار گرفته است و حد آستانه‌های بهینه‌ی آشکارسازی پهپاد شنودگر با توجه به فرستنده‌ی زمینی و همچنین پهپاد رله به دست آمده است. در شبیه‌سازی‌ها تأثیرات به‌کارگیری چندین آنتن در فرستنده و همچنین مکان پهپاد شنودگر موردبررسی قرار گرفته است تا بیان‌گر اثربخشی طرح ارائه‌شده‌ی رله‌ی مخابره‌ پنهان با کمک پهپاد رله باشد.

کلیدواژه‌ها


Smiley face

[1]    F. Samsami Khodadad, P. Baee, M. Forouzesh, and S. M. J. Asgari Tabatabaie, “Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security needs based on Covert Communication and Secure Transmission of Information Theory in presence of Friendly Jammer,” Sci. J. Electron. Cyber Def., vol. 9, no. 4, pp. 67–76, 2022. [in Persian]
[2]    J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May. doi: 10.1109/ICC.2018.8422941.
[3]    X. Jiang et al., “Covert Communication in UAV-Assisted Air-Ground Networks,” IEEE Wirel. Commun., vol. 28, no. 4, 2021, doi: 10.1109/MWC.001.2000454.
[4]    S. Yan, S. V. Hanly, I. B. Collings, and D. L. Goeckel, “Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications,” in IEEE International Conference on Communications, 2019, vol. 2019-May. doi: 10.1109/ICC.2019.8761271.
[5]    X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications,” IEEE Trans. Signal Process., vol. 67, no. 16, 2019, doi: 10.1109/TSP.2019.2928949.
[6]    J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication in wireless relay networks,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, vol. 2018-Janua. doi: 10.1109/GLOCOM.2017.8254008.
[7]    J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wirel. Commun., vol. 17, no. 7, 2018, doi: 10.1109/TWC.2018.2831217.
[8]    Q. Wang, Z. Chen, W. Mei, and J. Fang, “Improving Physical Layer Security Using UAV-Enabled Mobile Relaying,” IEEE Wirel. Commun. Lett., vol. 6, no. 3, 2017, doi: 10.1109/LWC.2017.2680449.
[9]    C. Zhong, J. Yao, and J. Xu, “Secure UAV Communication With Cooperative Jamming and Trajectory Control,” IEEE Commun. Lett., vol. 23, no. 2, 2019, doi: 10.1109/LCOMM.2018.2889062.
[10] T. Nuradha, K. T. Hemachandra, T. Samarasinghe, and S. Atapattu, “Physical-layer security for untrusted UAV-Assisted full-duplex wireless networks,” 2019. doi: 10.1109/GCWkshps45667.2019.9024575.
[11] H. Wang, J. Wang, G. Ding, J. Chen, Y. Li, and Z. Han, “Spectrum sharing planning for full-duplex UAV relaying systems with underlaid D2D Communications,” IEEE J. Sel. Areas Commun., vol. 36, no. 9, 2018, doi: 10.1109/JSAC.2018.2864375.
[12] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” 2013. doi: 10.1109/ISIT.2013.6620765.
[13] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-Enabled secure communications: Joint trajectory design and user scheduling,” IEEE J. Sel. Areas,  Vol. 87, 73-82, 2019. doi:10.2528/PIERM19092802 
[14] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., p. 1, 2022, doi: 10.1109/TVT.2022.3164051.
[15] W. Liang, J. Shi, Z. Tie, and F. Yang, “Performance Analysis for UAV-Jammer Aided Covert Communication,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3001069.
[16] X. Yu, S. Wei, and Y. Luo, “Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels under Covert Constraint,” IEEE Trans. Inf. Forensics Secur., vol. 16, 2021, doi: 10.1109/TIFS.2020.3032292.
[17] V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with m-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3 PART 1, 2011, doi: 10.1109/TIFS.2011.2159491.
[18] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., 2022, doi: 10.1109/TVT.2022.3164051.
[19] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9. doi: 10.1109/TWC.2017.2720736.
[20] X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “UAV-Relayed Covert Communication Towards a Flying Warden,” IEEE Trans. Commun., 2021, doi: 10.1109/TCOMM.2021.3106354.
[21] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,” in IEEE Vehicular Technology Conference, 2017. doi: 10.1109/VTCSpring.2017.8108525. 
[22] S. Talati, M.R, Hassani Ahangar; “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, vol. 9, no. 2, pp. 1-7, 2021.
[23] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. 
[24] S. Hashemi, S. Barati, S. Talati, H. Noori; “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. vol. 11, pp. 1395-1400, 2016.
[25] S. Hashemi, M. Abyari, S. Barati, T. Tahmasebi, S. Talati; “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016.
[26] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019.
[27] S. Talati, S.M. Alavi; “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 3, pp. 19-21. 2020.
[28] S. Talati, M.R Hasani Ahangar; “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, 2020.
[29] S. Talati, M.R. Hassani Ahangar; “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 65-69, 2020.
[30] M.R. Hassani Ahangar, S. Talati, A. Rahmati, H. Heidari; “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 93-97, 2020.
[31] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. 
[32] M. Aslinezhad, O. Mahmoudi, S. Talati; “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 4, pp. 59-67, 2020.
[33] S. Talati, A. Amjadi; “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 2, pp. 23-28, 2020.
[34] S. Talati, S.M. Alavi, H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 2, 2021. 
[35] P. Etezadifar, S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, vol. 10, no. 2, pp. 55-59, 2021.
[36] S. Talati, B. Ebadi, H. Akbarzade; “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID, pp. 1806-1812, Special Issue No.1-. April 2017. ISSN: 1692-343X, Medellín-Colombia.
[37] S. Talati, M. Akbari-Thani, M.R Hassani Ahangar; “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8, no. 1, pp. 65-74, 2020.
[38] S. Talati, R. Abdollahi, V.R. Soltaninia, M. Ayat; “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 4, pp. 5-16, 2021.
[39] V. Soltaninia, S. Talati, S.M. Khatmi, Ghaffari; Presenting a New Steganography Method Based on Wavelet Transform in Gray Image. Majlesi Journal of Telecommunication Devices, vol. 12, no. 2, pp. 105-111,2023.doi: 10.30486/mjtd.2023.1983555.1031.
[40] S. Talati, P. EtezadiFar, M.R. Hassani Ahangar, M. Molazade; Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP. Majlesi Journal of Telecommunication Devices, vol. 12, no. 1, pp. 7-15, 2023. doi: 10.30486/mjtd.2022.695928.
[41] S. Talati, S.M. Ghazali, V.R. SoltaniNia; “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Vol. 56, no. 17, 2023. DOI 10.1088/1361-6463/acb8c7.
[42]  S.M. Ghazali. J. Mazloum, Y. Balaghi; “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection” Biomedical Signal Processing and Control. vol. 78,  2022.
دوره 11، شماره 2 - شماره پیاپی 42
شماره پیاپی 42، فصلنامه تابستان
تیر 1402
صفحه 45-56
  • تاریخ دریافت: 08 تیر 1401
  • تاریخ بازنگری: 10 شهریور 1401
  • تاریخ پذیرش: 03 دی 1401
  • تاریخ انتشار: 01 تیر 1402