تعداد نشریات | 38 |
تعداد شمارهها | 1,240 |
تعداد مقالات | 8,994 |
تعداد مشاهده مقاله | 7,844,011 |
تعداد دریافت فایل اصل مقاله | 4,705,456 |
امنیت در شبکههای پهپاد رله مبتنی بر مخابرهی پنهان با حضور پهپاد شنودگر | ||
پدافند الکترونیکی و سایبری | ||
دوره 11، شماره 2 - شماره پیاپی 42، تیر 1402، صفحه 45-56 اصل مقاله (1.31 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
وحیدرضا سلطانی نیا1؛ سعید طلعتی* 2؛ محمد رضا حسنی آهنگر3؛ فرید صمصامی4؛ پویا بائی5 | ||
1دانشجوی دکترا، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران | ||
2مربی، دانشگاه علوم و فنون هوایی شهید ستاری، تهران، ایران | ||
3استاد، دانشگاه جامع امام حسین(ع)، تهران، ایران | ||
4استادیار، مدیر پژوهش و فناوری، دانشگاه تخصصی فناوری های نوین آمل، آمل، ایران | ||
5کارشناسی ارشد، دانشگاه تخصصی فناوری های نوین آمل، آمل، ایران | ||
تاریخ دریافت: 08 تیر 1401، تاریخ بازنگری: 10 شهریور 1401، تاریخ پذیرش: 03 دی 1401 | ||
چکیده | ||
در این مقاله استفاده از یک پهپاد رله قابلاعتماد کدگشا و انتقالدهنده (DF ) بهمنظور برقراری مخابره پنهان می آنیک فرستنده (آلیس) و یک گیرندهای (باب) که در منطقهای دورافتاده و خارج از شعاع مجاز ارسالی آلیس قرار دارد، پیشنهاد شده است. فرستندهی زمینی از فن حداکثر نسبت انتقال (MRT ) و چندین آنتن برای ارسال سیگنال پیام استفاده میکند و همچنین پهپاد رله در حالت کاملاً دوطرفه کار میکند، بهگونهای که در کنار رله کردن سیگنال پیام آلیس به سمت باب، بهمنظور افزایش خطای آشکارسازی مخابرهی پنهان توسط پهپاد شنودگر، سیگنال اختلال نیز ارسال مینماید. در این مقاله طرح جمینگ مبتنی بر منبع (SBJ ) به کار گرفتهشده است تا نیاز به استفاده یک اخلالگر (جَمر) جداگانه در شبکه جلوگیری شود. ابتدا شرایط مخابرهی پنهان در شبکهی مذکور موردبررسی قرار گرفته است و حد آستانههای بهینهی آشکارسازی پهپاد شنودگر با توجه به فرستندهی زمینی و همچنین پهپاد رله به دست آمده است. در شبیهسازیها تأثیرات بهکارگیری چندین آنتن در فرستنده و همچنین مکان پهپاد شنودگر موردبررسی قرار گرفته است تا بیانگر اثربخشی طرح ارائهشدهی رلهی مخابره پنهان با کمک پهپاد رله باشد. | ||
کلیدواژهها | ||
شبکههای بیسیم؛ پهپاد رله؛ شبکههای ad-hoc؛ مخابرهی پنهان؛ چندین آنتن | ||
عنوان مقاله [English] | ||
Security of UAV Relay Networks based on Covert Communication in the Presence of an Eavesdropping UAV | ||
نویسندگان [English] | ||
Vahidreza Soltaninia1؛ saeed Talati2؛ MohammadReza Hasani Ahangar3؛ Farid Samsami Khodadad4؛ Pooya Baei5 | ||
1PhD student, Shahid Sattari University of Aeronautical Sciences and Technology, Tehran, Iran | ||
2Instructor, Shahid Sattari University of Aviation Sciences and Technology, Tehran, Iran | ||
3Professor, Imam Hossein University, Tehran, Iran | ||
4Assistant Professor, Director of Research and Technology, Amol University of New Technologies, Amol, Iran | ||
5Master's degree, Amol Specialized University of New Technologies, Amol, Iran | ||
چکیده [English] | ||
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter (Alice) and a receiver (Bob), which is located in a remote area outside the allowable transmitting radius of Alice. The terrestrial transmitter uses the Maximum Ratio Transmission (MRT) technique and several antennas to send the covert signal, and also the UAV relay operates in a Full-Duplex frequency band so that in addition to relaying Alice’s signal message to Bob, it also sends disturbance signals to increase the covert transmission detection error by the eavesdropping UAV. In this paper, the source-based jamming scheme (SBJ) is used to avoid the need of using an external jammer in the network. First, the covert transmission conditions in the mentioned network have been investigated and the optimal detection thresholds of the eavesdropping UAV have been obtained with respect to the terrestrial transmitter and the UAV relay. In the simulations, the effects of using multiple antennas at the transmitter as well as the location of the eavesdropping UAV have been investigated to indicate the effectiveness of the proposed covert communication relay scheme with the help of a UAV relay. | ||
کلیدواژهها [English] | ||
Wireless Networks, UAV relay, Ad-hoc Networks, Covert Communication, Multiple Antennas | ||
مراجع | ||
[1] F. Samsami Khodadad, P. Baee, M. Forouzesh, and S. M. J. Asgari Tabatabaie, “Analysis and Design of Secure Wireless Networks in the Presence of Users with Different Security needs based on Covert Communication and Secure Transmission of Information Theory in presence of Friendly Jammer,” Sci. J. Electron. Cyber Def., vol. 9, no. 4, pp. 67–76, 2022. [in Persian] [2] J. Hu, K. Shahzad, S. Yan, X. Zhou, F. Shu, and J. Li, “Covert Communications with a Full-Duplex Receiver over Wireless Fading Channels,” in IEEE International Conference on Communications, 2018, vol. 2018-May. doi: 10.1109/ICC.2018.8422941. [3] X. Jiang et al., “Covert Communication in UAV-Assisted Air-Ground Networks,” IEEE Wirel. Commun., vol. 28, no. 4, 2021, doi: 10.1109/MWC.001.2000454. [4] S. Yan, S. V. Hanly, I. B. Collings, and D. L. Goeckel, “Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications,” in IEEE International Conference on Communications, 2019, vol. 2019-May. doi: 10.1109/ICC.2019.8761271. [5] X. Zhou, S. Yan, J. Hu, J. Sun, J. Li, and F. Shu, “Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications,” IEEE Trans. Signal Process., vol. 67, no. 16, 2019, doi: 10.1109/TSP.2019.2928949. [6] J. Hu, S. Yan, X. Zhou, F. Shu, and J. Wang, “Covert communication in wireless relay networks,” in 2017 IEEE Global Communications Conference, GLOBECOM 2017 - Proceedings, 2017, vol. 2018-Janua. doi: 10.1109/GLOCOM.2017.8254008. [7] J. Hu, S. Yan, X. Zhou, F. Shu, J. Li, and J. Wang, “Covert communication achieved by a greedy relay in wireless networks,” IEEE Trans. Wirel. Commun., vol. 17, no. 7, 2018, doi: 10.1109/TWC.2018.2831217. [8] Q. Wang, Z. Chen, W. Mei, and J. Fang, “Improving Physical Layer Security Using UAV-Enabled Mobile Relaying,” IEEE Wirel. Commun. Lett., vol. 6, no. 3, 2017, doi: 10.1109/LWC.2017.2680449. [9] C. Zhong, J. Yao, and J. Xu, “Secure UAV Communication With Cooperative Jamming and Trajectory Control,” IEEE Commun. Lett., vol. 23, no. 2, 2019, doi: 10.1109/LCOMM.2018.2889062. [10] T. Nuradha, K. T. Hemachandra, T. Samarasinghe, and S. Atapattu, “Physical-layer security for untrusted UAV-Assisted full-duplex wireless networks,” 2019. doi: 10.1109/GCWkshps45667.2019.9024575. [11] H. Wang, J. Wang, G. Ding, J. Chen, Y. Li, and Z. Han, “Spectrum sharing planning for full-duplex UAV relaying systems with underlaid D2D Communications,” IEEE J. Sel. Areas Commun., vol. 36, no. 9, 2018, doi: 10.1109/JSAC.2018.2864375. [12] P. H. Che, M. Bakshi, and S. Jaggi, “Reliable deniable communication: Hiding messages in noise,” 2013. doi: 10.1109/ISIT.2013.6620765. [13] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-Enabled secure communications: Joint trajectory design and user scheduling,” IEEE J. Sel. Areas, Vol. 87, 73-82, 2019. doi:10.2528/PIERM19092802 [14] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., p. 1, 2022, doi: 10.1109/TVT.2022.3164051. [15] W. Liang, J. Shi, Z. Tie, and F. Yang, “Performance Analysis for UAV-Jammer Aided Covert Communication,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.3001069. [16] X. Yu, S. Wei, and Y. Luo, “Finite Blocklength Analysis of Gaussian Random Coding in AWGN Channels under Covert Constraint,” IEEE Trans. Inf. Forensics Secur., vol. 16, 2021, doi: 10.1109/TIFS.2020.3032292. [17] V. U. Prabhu and M. R. D. Rodrigues, “On wireless channels with m-antenna eavesdroppers: Characterization of the outage probability and ε-outage secrecy capacity,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3 PART 1, 2011, doi: 10.1109/TIFS.2011.2159491. [18] R. Zhang, X. Chen, M. Liu, N. Zhao, X. Wang, and A. Nallanathan, “UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading,” IEEE Trans. Veh. Technol., 2022, doi: 10.1109/TVT.2022.3164051. [19] T. V. Sobers, B. A. Bash, S. Guha, D. Towsley, and D. Goeckel, “Covert Communication in the Presence of an Uninformed Jammer,” in IEEE Transactions on Wireless Communications, 2017, vol. 16, no. 9. doi: 10.1109/TWC.2017.2720736. [20] X. Chen, M. Sheng, N. Zhao, W. Xu, and D. Niyato, “UAV-Relayed Covert Communication Towards a Flying Warden,” IEEE Trans. Commun., 2021, doi: 10.1109/TCOMM.2021.3106354. [21] K. Shahzad, X. Zhou, and S. Yan, “Covert Communication in Fading Channels under Channel Uncertainty,” in IEEE Vehicular Technology Conference, 2017. doi: 10.1109/VTCSpring.2017.8108525. [22] S. Talati, M.R, Hassani Ahangar; “Radar Data Processing Using a Combination of Principal Component Analysis Methods and Self-Organized and Digitizing Learning Vector Neural Networks”, Electronic and Cyber Defense, vol. 9, no. 2, pp. 1-7, 2021. [23] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. [24] S. Hashemi, S. Barati, S. Talati, H. Noori; “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network”. Journal of Engineering and Applied Sciences. vol. 11, pp. 1395-1400, 2016. [25] S. Hashemi, M. Abyari, S. Barati, T. Tahmasebi, S. Talati; “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI”. Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016. [26] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019. [27] S. Talati, S.M. Alavi; “Radar Systems Deception using Cross-eye Technique”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 3, pp. 19-21. 2020. [28] S. Talati, M.R Hasani Ahangar; “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, MJTD, vol. 10, no. 1, 2020. [29] S. Talati, M.R. Hassani Ahangar; “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 65-69, 2020. [30] M.R. Hassani Ahangar, S. Talati, A. Rahmati, H. Heidari; “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9, no. 2, pp. 93-97, 2020. [31] S. Talati, P. Etezadifar; “Providing an Optimal Way to Increase the Security of Data Transfer Using Watermarking in Digital Audio Signals”, MJTD, vol. 10, no. 1, 2020. [32] M. Aslinezhad, O. Mahmoudi, S. Talati; “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 4, pp. 59-67, 2020. [33] S. Talati, A. Amjadi; “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9, no. 2, pp. 23-28, 2020. [34] S. Talati, S.M. Alavi, H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 2, 2021. [35] P. Etezadifar, S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack”. Majlesi Journal of Telecommunication Devices, vol. 10, no. 2, pp. 55-59, 2021. [36] S. Talati, B. Ebadi, H. Akbarzade; “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors”. QUID, pp. 1806-1812, Special Issue No.1-. April 2017. ISSN: 1692-343X, Medellín-Colombia. [37] S. Talati, M. Akbari-Thani, M.R Hassani Ahangar; “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8, no. 1, pp. 65-74, 2020. [38] S. Talati, R. Abdollahi, V.R. Soltaninia, M. Ayat; “A New Emitter Localization Technique Using Airborne Direction Finder Sensor”. Majlesi Journal of Mechatronic Systems, vol. 10, no. 4, pp. 5-16, 2021. [39] V. Soltaninia, S. Talati, S.M. Khatmi, Ghaffari; Presenting a New Steganography Method Based on Wavelet Transform in Gray Image. Majlesi Journal of Telecommunication Devices, vol. 12, no. 2, pp. 105-111,2023.doi: 10.30486/mjtd.2023.1983555.1031. [40] S. Talati, P. EtezadiFar, M.R. Hassani Ahangar, M. Molazade; Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP. Majlesi Journal of Telecommunication Devices, vol. 12, no. 1, pp. 7-15, 2023. doi: 10.30486/mjtd.2022.695928. [41] S. Talati, S.M. Ghazali, V.R. SoltaniNia; “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz” Journal of Physics D: Applied Physics. Vol. 56, no. 17, 2023. DOI 10.1088/1361-6463/acb8c7. [42] S.M. Ghazali. J. Mazloum, Y. Balaghi; “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection” Biomedical Signal Processing and Control. vol. 78, 2022. | ||
آمار تعداد مشاهده مقاله: 269 تعداد دریافت فایل اصل مقاله: 306 |