无人机对地通信的物理层加密

Ahmed Maksud, Y. Hua
{"title":"无人机对地通信的物理层加密","authors":"Ahmed Maksud, Y. Hua","doi":"10.1109/iccworkshops53468.2022.9814512","DOIUrl":null,"url":null,"abstract":"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.","PeriodicalId":102261,"journal":{"name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Physical Layer Encryption for UAV-to-Ground Communications\",\"authors\":\"Ahmed Maksud, Y. Hua\",\"doi\":\"10.1109/iccworkshops53468.2022.9814512\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.\",\"PeriodicalId\":102261,\"journal\":{\"name\":\"2022 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccworkshops53468.2022.9814512\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccworkshops53468.2022.9814512","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

确保安全可靠的无线通信对于无人机(UAV)应用至关重要。之前关于安全无人机对地(U2G)通信的大部分工作都集中在轨迹和/或功率优化上,以确保所需的U2G信道比窃听信道更强。在本文中,我们提出了一种新的物理层加密方法,该方法执行符号和/或星座隐藏,用于安全的U2G通信。与之前针对对手特定检测算法的符号和/或星座隐藏工作不同,我们的方法利用了无人机和所需地面站(GS)之间互惠通道中固有的机密性,因此原则上对包括深度机器学习在内的任何窃听攻击算法都具有鲁棒性。该方法首先利用连续加密函数(CEF)将无人机和GS处的两个估计的互反信道向量(ercv)分别转换为任意维数的两个拟连续伪随机数序列(qcprn)。这些qcprn对ercv的一系列统计分布具有鲁棒性,大致遵循已知的统计分布,因此可以进一步转化为两个均匀分布(UD) qcprn序列。在UAV上生成的UD-QCPRNs被UAV以模方式叠加到其传输符号上,在GS上生成的UD-QCPRNs用于在GS上解密。本文还研究了两种ercv之间的差异以及其他噪声对所需U2G信道性能的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Physical Layer Encryption for UAV-to-Ground Communications
Ensuring secure and reliable wireless communication is crucial for Unmanned Aerial Vehicle (UAV) applications. Most of the prior works on secure UAV-to-Ground (U2G) communications focus on trajectory and/or power optimization to ensure that the desired U2G channel is stronger than an eavesdropping channel. In this paper we propose a novel physical layer encryption method that performs symbol and/or constellation hiding for secure U2G communications. Unlike prior works on symbol and/or constellation hiding which aimed at specific detection algorithms by adversaries, our method exploits the secrecy inherent in the reciprocal channel between an UAV and a desired ground station (GS), and is hence in principle robust against any eavesdropping attack algorithms including deep machine learning. Given a pair of estimated reciprocal channel vectors (ERCVs) with a limited dimension at UAV and GS respectively, our method first uses a continuous encryption function (CEF) to transform the two ERCVs at UAV and GS respectively into two sequences of quasi-continuous pseudo-random numbers (QCPRNs) of any desired dimension. Robust to a range of statistical distributions of ERCVs, these QCPRNs follow approximately a known statistical distribution and hence can be further transformed into two sequences of uniformly dis-tributed (UD) QCPRNs. The UD-QCPRNs generated at UAV are superimposed by UAV in a modulo fashion onto its transmitted symbols, and the UD-QCPRNs generated at GS are used for decryption at GS. This paper also studies the impact of the difference between the two ERCVs along with other noises on the performance of the desired U2G channel.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信