Next Article in Journal
Measurement of an Analyte Concentration in Test Solution by Using Helmholtz Resonator for Biosensor Applications
Next Article in Special Issue
Pattern-Based Decoding for Wi-Fi Backscatter Communication of Passive Sensors
Previous Article in Journal
Rapid SINS Two-Position Ground Alignment Scheme Based on Piecewise Combined Kalman Filter and Azimuth Constraint Information
Previous Article in Special Issue
An Energy-Efficient Two-Stage Cooperative Routing Scheme in Wireless Multi-Hop Networks
Open AccessArticle

Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels

1
College of Information Science and Technology, Donghua University, Shanghai 201620, China
2
Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Shanghai 201620, China
3
Shanghai Earthquake Administration, Shanghai 200062, China
4
School of Computer Science and Engineering, UNSW Sydney, Sydney, NSW 2052, Australia
5
CISTER Research Unit, 4200-135 Porto, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(5), 1126; https://doi.org/10.3390/s19051126
Received: 21 January 2019 / Revised: 20 February 2019 / Accepted: 28 February 2019 / Published: 5 March 2019
Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets. View Full-Text
Keywords: selection policy; eavesdropping; jamming; fading channel; UAV selection policy; eavesdropping; jamming; fading channel; UAV
Show Figures

Figure 1

MDPI and ACS Style

Wang, X.; Li, D.; Guo, C.; Zhang, X.; Kanhere, S.S.; Li, K.; Tovar, E. Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels. Sensors 2019, 19, 1126.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop