2019
DOI: 10.3390/s19051126
|View full text |Cite
|
Sign up to set email alerts
|

Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels

Abstract: Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 40 publications
0
7
0
Order By: Relevance
“…Hence, depending upon these situation, different RF jamming techniques will be more efficient for effectively introducing interference at the RF re- ceiver. The different types of RF jamming techniques available in literature [109] , [110] , [111] are discussed in this section . In addition to these, GNSS jamming has been discussed as a subsection due to its relevance to the subject (although it is not a different type of jamming and a specific case of the preceding types).…”
Section: Uav Neutralizing Techniquesmentioning
confidence: 99%
“…Hence, depending upon these situation, different RF jamming techniques will be more efficient for effectively introducing interference at the RF re- ceiver. The different types of RF jamming techniques available in literature [109] , [110] , [111] are discussed in this section . In addition to these, GNSS jamming has been discussed as a subsection due to its relevance to the subject (although it is not a different type of jamming and a specific case of the preceding types).…”
Section: Uav Neutralizing Techniquesmentioning
confidence: 99%
“…There is no doubt that energy consumption is an important metric in mobile rescue issue. In our previous work, we have analyzed the energy consumption during the communication and mobility [23].…”
Section: Energy Consumptionmentioning
confidence: 99%
“…The authors in [21] examined the surveillance paradigm, which tracks dubious high-attitude communications. The authors introduced jammers to monitor suspicious communication.…”
Section: Introductionmentioning
confidence: 99%
“…They investigated how to achieve the dubious flight information UAVs. As [21], they have also introduced a friendly jammer who can jam the dubious receiver to reduce the suspicious UAV data rate. Eventually, they proposed a model that can maximize eavesdropping success.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation