Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV

Document Type : Original Article

Authors

1 PhD student, Shahid Sattari University of Aeronautical Sciences and Technology, Tehran, Iran

2 Instructor, Shahid Sattari University of Aviation Sciences and Technology, Tehran, Iran

3 Professor, Imam Hossein University, Tehran, Iran

4 Assistant Professor, Director of Research and Technology, Amol University of New Technologies, Amol, Iran

5 Master's degree, Amol Specialized University of New Technologies, Amol, Iran

Abstract

This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay.

Keywords


Smiley face

[1]    F. Samsami Khodadad, P. Baee, M. Forouzesh, and S. M. J. Asgari Tabatabaie, “Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security needs based on Covert Communication and Secure Transmission of Information Theory in presence of Friendly Jammer,” Sci. J. Electron. Cyber Def., vol. 9, no. 4, pp. 67–76, 2022. [in Persian]
[2]    J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May. doi: 10.1109/ICC.2018.8422941.
[3]    X. Jiang et al., “Covert Communication in UAV-Assisted Air-Ground Networks,” IEEE Wirel. Commun., vol. 28, no. 4, 2021, doi: 10.1109/MWC.001.2000454.
[4]    S. Yan, S. V. Hanly, I. B. Collings, and D. L. Goeckel, “Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications,” in IEEE International Conference on Communications, 2019, vol. 2019-May. doi: 10.1109/ICC.2019.8761271.
[5]    X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications,” IEEE Trans. Signal Process., vol. 67, no. 16, 2019, doi: 10.1109/TSP.2019.2928949.
[6]    J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication in wireless relay networks,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, vol. 2018-Janua. doi: 10.1109/GLOCOM.2017.8254008.
[7]    J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wirel. Commun., vol. 17, no. 7, 2018, doi: 10.1109/TWC.2018.2831217.
[8]    Q. Wang, Z. Chen, W. Mei, and J. Fang, “Improving Physical Layer Security Using UAV-Enabled Mobile Relaying,” IEEE Wirel. Commun. Lett., vol. 6, no. 3, 2017, doi: 10.1109/LWC.2017.2680449.
[9]    C. Zhong, J. Yao, and J. Xu, “Secure UAV Communication With Cooperative Jamming and Trajectory Control,” IEEE Commun. Lett., vol. 23, no. 2, 2019, doi: 10.1109/LCOMM.2018.2889062.
[10] T. Nuradha, K. T. Hemachandra, T. Samarasinghe, and S. Atapattu, “Physical-layer security for untrusted UAV-Assisted full-duplex wireless networks,” 2019. doi: 10.1109/GCWkshps45667.2019.9024575.
[11] H. Wang, J. Wang, G. Ding, J. Chen, Y. Li, and Z. Han, “Spectrum sharing planning for full-duplex UAV relaying systems with underlaid D2D Communications,” IEEE J. Sel. Areas Commun., vol. 36, no. 9, 2018, doi: 10.1109/JSAC.2018.2864375.
[12] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” 2013. doi: 10.1109/ISIT.2013.6620765.
[13] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-Enabled secure communications: Joint trajectory design and user scheduling,” IEEE J. Sel. Areas,  Vol. 87, 73-82, 2019. doi:10.2528/PIERM19092802 
[14] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., p. 1, 2022, doi: 10.1109/TVT.2022.3164051.
[15] W. Liang, J. Shi, Z. Tie, and F. Yang, “Performance Analysis for UAV-Jammer Aided Covert Communication,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3001069.
[16] X. Yu, S. Wei, and Y. Luo, “Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels under Covert Constraint,” IEEE Trans. Inf. Forensics Secur., vol. 16, 2021, doi: 10.1109/TIFS.2020.3032292.
[17] V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with m-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3 PART 1, 2011, doi: 10.1109/TIFS.2011.2159491.
[18] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., 2022, doi: 10.1109/TVT.2022.3164051.
[19] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9. doi: 10.1109/TWC.2017.2720736.
[20] X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “UAV-Relayed Covert Communication Towards a Flying Warden,” IEEE Trans. Commun., 2021, doi: 10.1109/TCOMM.2021.3106354.
[21] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,” in IEEE Vehicular Technology Conference, 2017. doi: 10.1109/VTCSpring.2017.8108525. 
[22] S. Talati, M.R, Hassani Ahangar; “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, vol. 9, no. 2, pp. 1-7, 2021.
[23] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. 
[24] S. Hashemi, S. Barati, S. Talati, H. Noori; “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. vol. 11, pp. 1395-1400, 2016.
[25] S. Hashemi, M. Abyari, S. Barati, T. Tahmasebi, S. Talati; “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016.
[26] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019.
[27] S. Talati, S.M. Alavi; “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 3, pp. 19-21. 2020.
[28] S. Talati, M.R Hasani Ahangar; “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, 2020.
[29] S. Talati, M.R. Hassani Ahangar; “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 65-69, 2020.
[30] M.R. Hassani Ahangar, S. Talati, A. Rahmati, H. Heidari; “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 93-97, 2020.
[31] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. 
[32] M. Aslinezhad, O. Mahmoudi, S. Talati; “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 4, pp. 59-67, 2020.
[33] S. Talati, A. Amjadi; “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 2, pp. 23-28, 2020.
[34] S. Talati, S.M. Alavi, H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 2, 2021. 
[35] P. Etezadifar, S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, vol. 10, no. 2, pp. 55-59, 2021.
[36] S. Talati, B. Ebadi, H. Akbarzade; “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID, pp. 1806-1812, Special Issue No.1-. April 2017. ISSN: 1692-343X, Medellín-Colombia.
[37] S. Talati, M. Akbari-Thani, M.R Hassani Ahangar; “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8, no. 1, pp. 65-74, 2020.
[38] S. Talati, R. Abdollahi, V.R. Soltaninia, M. Ayat; “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 4, pp. 5-16, 2021.
[39] V. Soltaninia, S. Talati, S.M. Khatmi, Ghaffari; Presenting a New Steganography Method Based on Wavelet Transform in Gray Image. Majlesi Journal of Telecommunication Devices, vol. 12, no. 2, pp. 105-111,2023.doi: 10.30486/mjtd.2023.1983555.1031.
[40] S. Talati, P. EtezadiFar, M.R. Hassani Ahangar, M. Molazade; Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP. Majlesi Journal of Telecommunication Devices, vol. 12, no. 1, pp. 7-15, 2023. doi: 10.30486/mjtd.2022.695928.
[41] S. Talati, S.M. Ghazali, V.R. SoltaniNia; “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Vol. 56, no. 17, 2023. DOI 10.1088/1361-6463/acb8c7.
[42]  S.M. Ghazali. J. Mazloum, Y. Balaghi; “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection” Biomedical Signal Processing and Control. vol. 78,  2022.
Volume 11, Issue 2 - Serial Number 42
No. 42, Summer
July 2023
Pages 45-56
  • Receive Date: 29 June 2022
  • Revise Date: 01 September 2022
  • Accept Date: 24 December 2022
  • Publish Date: 22 June 2023