Physical-Layer Security in Drone Communications

A special issue of Drones (ISSN 2504-446X). This special issue belongs to the section "Drone Communications".

Deadline for manuscript submissions: 18 December 2024 | Viewed by 6700

Special Issue Editors


E-Mail Website
Guest Editor
School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China
Interests: physical-layer security; UAV communications; green communications; signal processing
School of Electronics and Information, Northwestern Polytechnical University, Xi'an 710072, China
Interests: physical-layer security; cognitive radio networks; marine communications; machine learning; resource allocation
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
College of Information Science and Engineering, Harbin Institute of Technology Weihai, Weihai 264209, China
Interests: cross-domain communications; cross-sea communications; maritime communication security

Special Issue Information

Dear Colleagues,

Both drone communications and physical-layer security (PLS) have become attractive in recent years. The problem emerges in that the signal transmissions in drone networks are more vulnerable to impersonation attacks and eavesdropping, due to the open line-of-sight nature of the low-altitude spatial channel environments. PLS that originates from natural features instead of artificial complexity provides quasi-Quantum features including high security and low complexity. PLS in drone communications is largely distinct from that of terrestrial communications due to the unique factors of drone communications such as jitter, trajectory planning and sparse scatterings.

This Special Issue aims to collect new developments regarding the PLS solutions in drone communications. We welcome submissions including, but not limited to, the following:

  • Physical-layer wireless key generations in drone communications;
  • Radio frequency fingerprinting of drones and legacy authentication;
  • Wireless channel feature-based legacy authentication in drone communications;
  • 3D beamforming-based secrecy enhancements in drone communications;
  • Imperfect knowledge from eavesdropper-related issues;
  • Drone jitter and its impacts on PLS;
  • Security and beneficial trajectory design of drones;
  • Relay and jamming-assisted PLS drone communications;
  • Experimental methodology and designs in PLS drone communications;
  • Field tests related to PLS of drone communications.

Dr. Dongming Li
Dr. Dawei Wang
Dr. Yi Lou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Drones is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • drone communications
  • physical-layer security
  • key generation
  • drone jitter
  • beamforming and jamming
  • trajectory planning

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1508 KiB  
Article
Secure Unmanned Aerial Vehicle Communication in Dual-Function Radar Communication System by Exploiting Constructive Interference
by Qian Xu, Jia Yi, Xianyu Wang, Ming-bo Niu, Md. Sipon Miah and Ling Wang
Drones 2024, 8(10), 581; https://doi.org/10.3390/drones8100581 - 15 Oct 2024
Viewed by 592
Abstract
In contrast from traditional unmanned aerial vehicle communication via unlicensed spectrum, connecting unmanned aerial vehicles with cellular networks can extend their communication coverage and improve the quality of their service. In addition, the emerging dual-functional radar communication paradigm in cellular systems can better [...] Read more.
In contrast from traditional unmanned aerial vehicle communication via unlicensed spectrum, connecting unmanned aerial vehicles with cellular networks can extend their communication coverage and improve the quality of their service. In addition, the emerging dual-functional radar communication paradigm in cellular systems can better meet the requirements of location-sensitive tasks such as reconnaissance and cargo delivery. Based on the above considerations, in this paper, we study the simultaneous communication and target sensing issue in cellular-connected unmanned aerial vehicle systems. Specifically, we consider a two-cell coordinated system with two base stations, cellular unmanned aerial vehicles, and potential aerial targets. In such systems, the communication security issue of cellular unmanned aerial vehicles regarding eavesdropping on their target is inevitable since the main beam of the transmit waveform needs to point to the direction of the target for achieving a sufficient detection performance. Aiming at protecting the privacy of cellular transmission as well as performing target sensing, we exploit the physical layer security technique with the aid of constructive interference-based precoding. A transmit power minimization problem is formulated with constraints on secure and reliable cellular transmission and a sufficient radar signal-to-interference-plus-noise ratio. By specially designing the transmit beamforming vectors at the base stations, the received signals at the cellular users are located in the decision regions of the transmitted symbols while the targets can only receive wrong symbols. We also compare the performance of the proposed scheme with that of the traditional one without constructive interference. The simulation results show that the proposed constructive interference-based strategy can meet the requirements of simultaneous target sensing and secure communication, and also save transmit power compared with the traditional scheme. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

18 pages, 5180 KiB  
Article
Dataset Augmentation and Fractional Frequency Offset Compensation Based Radio Frequency Fingerprint Identification in Drone Communications
by Dongming Li, Zhaorui Wang, Yuting Lai and Huafei Shen
Drones 2024, 8(10), 569; https://doi.org/10.3390/drones8100569 - 10 Oct 2024
Viewed by 701
Abstract
The open nature of the wireless channel makes the drone communication vulnerable to adverse spoofing attacks, and the radio frequency fingerprint (RFF) identification is promising in effectively safeguarding the access security for drones. Since drones are constantly flying in the three dimensional aerial [...] Read more.
The open nature of the wireless channel makes the drone communication vulnerable to adverse spoofing attacks, and the radio frequency fingerprint (RFF) identification is promising in effectively safeguarding the access security for drones. Since drones are constantly flying in the three dimensional aerial space, the unique RFF identification problem emerges in drone communication that the effective extraction and identification of RFF suffer from the time-varying channel effects and unavoidable jitterings due to the constant flight. To tackle this issue, we propose augmenting the training RFF dataset by regenerating the drone channel characteristics and compensate the fractional frequency offset. The proposed method estimates the Rician K value of the channel and curve-fits the statistical distribution, the Rician channels are regenerated using the sinusoidal superposition method. Then, a probabilistic switching channel is also set up to introduce the Rayleigh channel effects into the training dataset. The proposed method effectively addresses the unilateral channel effects in the training dataset and achieves the balanced channel effect distribution. Consequently, the pre-trained model can extract channel-robust RFF features in drone air-ground channels. In addition, by compensating the fractional frequency offset, the proposed method removes the unstable frequency components and retains the stable integer frequency offset. Then, the stable frequency offset features that are robust to environmental changes can be extracted. The proposed method achieves an average classification accuracy of 97% under spatial and temporal varying conditions. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

23 pages, 1669 KiB  
Article
A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC
by Jiacheng Zhang, Peng Gu, Zhen Wang, Jun Zou and Guangzu Liu
Drones 2024, 8(9), 472; https://doi.org/10.3390/drones8090472 - 9 Sep 2024
Viewed by 672
Abstract
Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authentication protocols on drones. In this paper, [...] Read more.
Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authentication protocols on drones. In this paper, we propose a low-complexity protocol for storing identity information in a resource-unconstrained device that does not require the UAV to store the information, thereby enhancing the UAV’s resistance to capture. The protocol in this paper mainly consists of quasi-cyclic low-density parity-check (QC-LDPC) codes, physical unclonable functions (PUFs) based on random-access memory (RAM), “XOR” operations, and hash computation. The protocol in this paper is an authentication architecture in which the drone is guided by the ground station to read its identity information, and the drone does not store any identity information in advance. The protocol is divided into two phases: 1. fuzzy authentication of fingerprint PUF and 2. uniqueness authentication accomplished while guiding the recovery of identity PUF. Recovering identity PUF in this paper, QC-LDPC is used as the error control module, and the optimization of bit-flip decoding significantly reduces the probability of decoding failure. After the comparative security analysis and comparative overhead analysis of this paper’s protocol, it can be concluded that this paper’s protocol can withstand common attacks (including attacks attempting to pass authentication, attacks attempting to interfere with authentication, and physical capture attacks), and the storage and communication overhead is small in the case of large time overhead. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

25 pages, 1876 KiB  
Article
Multi-Node Joint Jamming Scheme for Secure UAV-Aided NOMA-CDRT Systems: Performance Analysis and Optimization
by Yao Xu, Shaobo Jia, Jichong Guo, Jianyue Zhu, Lilan Liu and Zhizhong Zhang
Drones 2024, 8(9), 449; https://doi.org/10.3390/drones8090449 - 1 Sep 2024
Viewed by 649
Abstract
Unmanned aerial vehicle (UAV) communication using non-orthogonal multiple access-based coordinated direct and relay transmission (NOMA-CDRT) supports both massive connectivity and wide-area coverage, becoming a key technology for future emergency rescue communications. However, relay forwarding and high-quality line-of-sight links may subject UAV-aided NOMA-CDRT to [...] Read more.
Unmanned aerial vehicle (UAV) communication using non-orthogonal multiple access-based coordinated direct and relay transmission (NOMA-CDRT) supports both massive connectivity and wide-area coverage, becoming a key technology for future emergency rescue communications. However, relay forwarding and high-quality line-of-sight links may subject UAV-aided NOMA-CDRT to multiple eavesdropping attempts by saboteurs. Therefore, we propose a multi-node joint jamming scheme using artificial noise (AN) for the UAV-assisted NOMA-CDRT to improve the system’s physical layer security. In the proposed scheme, the base station directly serves a nearby user while using a UAV relay to serve a disaster-affected user, and both the users and the UAV relay utilize AN to jointly interfere with eavesdroppers around the users. To accurately characterize and maximize the ergodic secrecy sum rate (ESSR) of the proposed scheme, we derive the corresponding closed-form expressions and design a joint power allocation and interference control (JPAIC) algorithm using particle swarm optimization. Simulations verify the correctness of the theoretical analysis, the ESSR advantage of the proposed scheme compared with the conventional NOMA-CDRT, and the effectiveness of the proposed JPAIC. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

20 pages, 18987 KiB  
Article
Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification
by Yunfei Zheng, Xuejun Zhang, Shenghan Wang and Weidong Zhang
Drones 2024, 8(8), 391; https://doi.org/10.3390/drones8080391 - 13 Aug 2024
Viewed by 981
Abstract
With the rapid development of the unmanned aerial vehicles (UAVs) industry, there is increasing demand for UAV surveillance technology. Automatic Dependent Surveillance-Broadcast (ADS-B) provides accurate monitoring of UAVs. However, the system cannot encrypt messages or verify identity. To address the issue of identity [...] Read more.
With the rapid development of the unmanned aerial vehicles (UAVs) industry, there is increasing demand for UAV surveillance technology. Automatic Dependent Surveillance-Broadcast (ADS-B) provides accurate monitoring of UAVs. However, the system cannot encrypt messages or verify identity. To address the issue of identity spoofing, radio frequency fingerprinting identification (RFFI) is applied for ADS-B transmitters to determine the true identities of UAVs through physical layer security technology. This paper develops an ensemble learning ADS-B radio signal recognition framework. Firstly, the research analyzes the data content characteristics of the ADS-B signal and conducts segment processing to eliminate the possible effects of the signal content. To extract features from different signal segments, a method merging end-to-end and non-end-to-end data processing is approached in a convolutional neural network. Subsequently, these features are fused through EL to enhance the robustness and generalizability of the identification system. Finally, the proposed framework’s effectiveness is evaluated using collected ADS-B data. The experimental results indicate that the recognition accuracy of the proposed ELWAM-CNN method can reach up to 97.43% and have better performance at different signal-to-noise ratios compared to existing methods using machine learning. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

27 pages, 3031 KiB  
Article
A Quantum-Resistant Identity Authentication and Key Agreement Scheme for UAV Networks Based on Kyber Algorithm
by Tao Xia, Menglin Wang, Jun He, Gang Yang, Linna Fan and Guoheng Wei
Drones 2024, 8(8), 359; https://doi.org/10.3390/drones8080359 - 30 Jul 2024
Cited by 1 | Viewed by 1166
Abstract
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats. Current schemes often employ algorithms like elliptic curve cryptography (ECC) and [...] Read more.
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats. Current schemes often employ algorithms like elliptic curve cryptography (ECC) and Rivest–Shamir–Adleman (RSA), which are vulnerable to quantum attacks. To address this issue, we propose LIGKYX, a novel scheme combining the quantum-resistant Kyber algorithm with the hash-based message authentication code (HMAC) for enhanced security and efficiency. This scheme enables the mutual authentication between UAVs and ground stations and supports secure session key establishment protocols. Additionally, it facilitates robust authentication and key agreement among UAVs through control stations, addressing the critical challenge of quantum-resistant security in UAV networks. The proposed LIGKYX scheme operates based on the Kyber algorithm and elliptic curve Diffie–Hellman (ECDH) key exchange protocol, employing the HMAC and pre-computation techniques. Furthermore, a formal verification tool validated the security of LIGKYX under the Dolev–Yao threat model. Comparative analyses on security properties, communication overhead, and computational overhead indicate that LIGKYX not only matches or exceeds existing schemes but also uniquely counters quantum attacks effectively, ensuring the security of UAV communication networks with a lower time overhead for authentication and communication. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

22 pages, 601 KiB  
Article
Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems
by Changjian Qin, Mu Niu, Pinchang Zhang and Ji He
Drones 2024, 8(8), 358; https://doi.org/10.3390/drones8080358 - 30 Jul 2024
Viewed by 724
Abstract
Reconfigurable Intelligent Surface (RIS)-assisted Unmanned Aerial Vehicle (UAV) communications face a critical security threat from impersonation attacks, where adversaries impersonate legitimate entities to infiltrate networks to obtain private data or unauthorized access. To combat such security threats, this paper proposes a novel physical [...] Read more.
Reconfigurable Intelligent Surface (RIS)-assisted Unmanned Aerial Vehicle (UAV) communications face a critical security threat from impersonation attacks, where adversaries impersonate legitimate entities to infiltrate networks to obtain private data or unauthorized access. To combat such security threats, this paper proposes a novel physical layer (PHY-layer) authentication scheme for validating UAV identity in RIS-enabled UAV wireless networks. Considering that most existing works focus on traditional communication systems such as IoT and millimeter wave multiple-input multiple-output (MIMO) systems, there is currently no mature PHY-layer authentication scheme to serve RIS-UAV communication systems. To this end, our scheme leverages the unique characteristics of cascaded channels related to RIS to verify the legitimacy of UAV transmitting signals to the base station (BS). To be more precise, we first use the least squares estimate method and coordinate a descent-based algorithm to extract the cascaded channel feature. Next, we explore a quantizer to quantize the fluctuations of the channel gain that are related to the extracted channel feature. The 1-bit quantizer’s output findings are exploited to generate the authentication decision criteria, which are then tested using a binary hypothesis. The statistical signal processing technique is utilized to obtain the analytical formulations for detection and false alarm probabilities. We also conduct a computational complexity analysis of the proposed scheme. Finally, the numerical results validate the effectiveness of the proposed performance metric models and show that our detection performance can reach over 90% accuracy at a low signal-to-noise ratio (e.g., −8 dB), with a 10% improvement in detection accuracy compared with existing schemes. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

Back to TopTop