Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs

This paper considers that a legitimate UAV tracks suspicious UAVs’ flight for preventing intended crimes and terror attacks. To enhance tracking accuracy, the legitimate UAV proactively eavesdrops suspicious UAVs’ communication via sending jamming signals. A tracking algorithm is developed for the legitimate UAV to track the suspicious flight by comprehensively utilizing eavesdropped packets, angle-of-arrival and received signal strength of the suspicious transmitter’s signal. A new co-simulation framework is implemented to combine the complementary features of optimization toolbox with channel modeling (in Matlab) and discrete event-driven mobility tracking (in NS3). Moreover, numerical results validate the proposed algorithms in terms of tracking accuracy of the suspicious UAVs’ trajectory.

[1]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[2]  Sanjay Jha,et al.  Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks , 2013, IEEE Journal on Selected Areas in Communications.

[3]  Tarik Taleb,et al.  UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.

[4]  Jeremiah Gertler,et al.  Homeland Security: Unmanned Aerial Vehicles and Border Surveillance , 2010 .

[5]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[6]  Mustafa Ilhan Akbas,et al.  Spatially Adaptive Positioning for Molecular Geometry Inspired Aerial Networks , 2017, DIVANet@MSWiM.

[7]  Ismail Güvenç,et al.  Detection, Tracking, and Interdiction for Amateur Drones , 2018, IEEE Communications Magazine.

[8]  Randal W. Beard,et al.  GPS-denied relative motion estimation for fixed-wing UAV using the variational pose estimator , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[9]  Anjan Chakrabarty,et al.  Autonomous indoor object tracking with the Parrot AR.Drone , 2016, 2016 International Conference on Unmanned Aircraft Systems (ICUAS).

[10]  Xin Wang,et al.  Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles , 2016, IEEE Transactions on Mobile Computing.

[11]  Ismail Guvenc,et al.  Receding Horizon Multi-UAV Cooperative Tracking of Moving RF Source , 2017, IEEE Communications Letters.

[12]  Eduardo Tovar,et al.  Energy Efficient Legitimate Wireless Surveillance of UAV Communications , 2019, IEEE Transactions on Vehicular Technology.

[13]  Naira Hovakimyan,et al.  Vision-based target tracking and motion estimation using a small UAV , 2010, 49th IEEE Conference on Decision and Control (CDC).

[14]  Sally I. McClean,et al.  UAV Position Estimation and Collision Avoidance Using the Extended Kalman Filter , 2013, IEEE Transactions on Vehicular Technology.

[15]  Xin Wang,et al.  EPLA: Energy-balancing packets scheduling for airborne relaying networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[16]  Xinping Guan,et al.  NS3-MATLAB co-simulator for cyber-physical systems in smart grid , 2016, 2016 35th Chinese Control Conference (CCC).

[17]  Damla Turgut,et al.  VBCA: A virtual forces clustering algorithm for autonomous aerial drone systems , 2016, 2016 Annual IEEE Systems Conference (SysCon).

[18]  Eduardo Tovar,et al.  PELE: Power efficient legitimate eavesdropping via jamming in UAV communications , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  Jason J. Ford,et al.  Vision-based detection and tracking of aerial targets for UAV collision avoidance , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[20]  Eduardo Tovar,et al.  Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels , 2019, Sensors.

[21]  Jie Xu,et al.  Proactive Eavesdropping via Jamming over HARQ-Based Communications , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[22]  Branko Ristic,et al.  Comparison of Recursive Algorithms for Emitter Localisation using TDOA Measurements from a Pair of UAVs , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[23]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[24]  Damla Turgut,et al.  Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[25]  Danda B. Rawat,et al.  Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[26]  Ouassima Akhrif,et al.  Communication Relay for Multiground Units With Unmanned Aerial Vehicle Using Only Signal Strength and Angle of Arrival , 2017, IEEE Transactions on Control Systems Technology.