Physical Layer Encryption for UAV-to-Ground Communications

Ahmed Maksud, Y. Hua
{"title":"Physical Layer Encryption for UAV-to-Ground Communications","authors":"Ahmed Maksud, Y. Hua","doi":"10.1109/iccworkshops53468.2022.9814512","DOIUrl":null,"url":null,"abstract":"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccworkshops53468.2022.9814512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无人机对地通信的物理层加密
确保安全可靠的无线通信对于无人机(UAV)应用至关重要。之前关于安全无人机对地(U2G)通信的大部分工作都集中在轨迹和/或功率优化上,以确保所需的U2G信道比窃听信道更强。在本文中,我们提出了一种新的物理层加密方法,该方法执行符号和/或星座隐藏,用于安全的U2G通信。与之前针对对手特定检测算法的符号和/或星座隐藏工作不同,我们的方法利用了无人机和所需地面站(GS)之间互惠通道中固有的机密性,因此原则上对包括深度机器学习在内的任何窃听攻击算法都具有鲁棒性。该方法首先利用连续加密函数(CEF)将无人机和GS处的两个估计的互反信道向量(ercv)分别转换为任意维数的两个拟连续伪随机数序列(qcprn)。这些qcprn对ercv的一系列统计分布具有鲁棒性,大致遵循已知的统计分布,因此可以进一步转化为两个均匀分布(UD) qcprn序列。在UAV上生成的UD-QCPRNs被UAV以模方式叠加到其传输符号上,在GS上生成的UD-QCPRNs用于在GS上解密。本文还研究了两种ercv之间的差异以及其他噪声对所需U2G信道性能的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Performance Analysis of a Bistatic Joint Sensing and Communication System An Upgraded Object Detection Model for Enhanced Perception and Decision Making in Autonomous Vehicles Demo: Low-power Communications Based on RIS and AI for 6G Demo: Deterministic Radio Propagation Simulation for Integrated Communication Systems in Multimodal Intelligent Transportation Scenarios Energy Efficient Distributed Learning in Integrated Fog-Cloud Computing Enabled IoT Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1