2019 15th International Wireless Communications &Amp; Mobile Computing Conference (IWCMC) 2019
DOI: 10.1109/iwcmc.2019.8766696
|View full text |Cite
|
Sign up to set email alerts
|

Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Hence, depending upon these situation, different RF jamming techniques will be more efficient for effectively introducing interference at the RF re- ceiver. The different types of RF jamming techniques available in literature [109] , [110] , [111] are discussed in this section . In addition to these, GNSS jamming has been discussed as a subsection due to its relevance to the subject (although it is not a different type of jamming and a specific case of the preceding types).…”
Section: Uav Neutralizing Techniquesmentioning
confidence: 99%
“…Hence, depending upon these situation, different RF jamming techniques will be more efficient for effectively introducing interference at the RF re- ceiver. The different types of RF jamming techniques available in literature [109] , [110] , [111] are discussed in this section . In addition to these, GNSS jamming has been discussed as a subsection due to its relevance to the subject (although it is not a different type of jamming and a specific case of the preceding types).…”
Section: Uav Neutralizing Techniquesmentioning
confidence: 99%
“…On the other hand, the legitimate receiver applies self-interference cancellation to filter out noise and interference signals. Table 9 summarizes research works on the legitimate eavesdropping approach [123], [124], [125], [126], [127], [128], [129], [130], [131], [132]. The authors in [123] have considered wireless surveillance in a UAV-assisted information transmission network, in which a proactive UAV legitimately intervenes the suspicious UAVs.…”
Section: Legitimate Eavesdropping Aided Phy-securitymentioning
confidence: 99%
“…They have explored a power-efficient legitimate eavesdropping scheme to jam the suspicious link by maximizing the legitimate eavesdrop packets and maintaining the SINR at the suspect node. For protection against cyber attacks, the authors in [124] have adopted a proactive UAV legitimate tracking and jamming model for suspicious eavesdroppers. Key system parameters, like eavesdropping packets, receiver's signal strength, and angle of eavesdropper's signal arrival, were estimated using the developed algorithm.…”
Section: Legitimate Eavesdropping Aided Phy-securitymentioning
confidence: 99%
“…Several related works have been proposed in recent years. The authors of [36] considered a scenario where a legitimate UAV tracks suspicious UAV flights for preventing intended crimes. To enhance tracking accuracy, the legitimate UAV employing proactive eavesdropping and a tracking algorithm rather than radar sensing has been developed by utilizing eavesdropped information and channel state information (CSI).…”
mentioning
confidence: 99%