{"title":"Physical Layer Encryption for UAV-to-Ground Communications","authors":"Ahmed Maksud, Y. Hua","doi":"10.1109/iccworkshops53468.2022.9814512","DOIUrl":null,"url":null,"abstract":"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccworkshops53468.2022.9814512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.