-
Interference and noise cancellation for joint communication radar (JCR) system based on contextual information
Authors:
Christantus O. Nnamani,
Mathini Sellathurai
Abstract:
This paper examines the separation of wireless communication and radar signals, thereby guaranteeing cohabitation and acting as a panacea to spectrum sensing. First, considering that the channel impulse response was known by the receivers (communication and radar), we showed that the optimizing beamforming weights mitigate the interference caused by signals and improve the physical layer security…
▽ More
This paper examines the separation of wireless communication and radar signals, thereby guaranteeing cohabitation and acting as a panacea to spectrum sensing. First, considering that the channel impulse response was known by the receivers (communication and radar), we showed that the optimizing beamforming weights mitigate the interference caused by signals and improve the physical layer security (PLS) of the system. Furthermore, when the channel responses were unknown, we designed an interference filter as a low-complex noise and interference cancellation autoencoder. By mitigating the interference on the legitimate users, the PLS was guaranteed. Results showed that even for a low signal-to-noise ratio, the autoencoder produces low root-mean-square error (RMSE) values.
△ Less
Submitted 13 February, 2023;
originally announced February 2023.
-
Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtai…
▽ More
This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtain an optimal trajectory and jamming power allocation for each UAV enabling wideband single ray beamforming to improve the secrecy rate. Results obtained demonstrate the effectiveness of the proposed UAV-aided jamming scheme as well as the optimal number of UAVs in the swarm necessary to observe a saturation effect in the secrecy rate. We also show the optimal radius of the unknown but constrained location of the eavesdropper.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Joint Beamforming and Location Optimization for Secure Data Collection in Wireless Sensor Networks with UAV-Carried Intelligent Reflecting Surface
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper considers unmanned aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) for secure data collection in wireless sensor networks. An eavesdropper (Eve) lurks within the vicinity of the main receiver (Bob) while several randomly placed sensor nodes beamform collaboratively to the UAV-carried IRS that reflects the signal to the main receiver (Bob). The design objective is to ma…
▽ More
This paper considers unmanned aerial vehicle (UAV)-carried intelligent reflecting surface (IRS) for secure data collection in wireless sensor networks. An eavesdropper (Eve) lurks within the vicinity of the main receiver (Bob) while several randomly placed sensor nodes beamform collaboratively to the UAV-carried IRS that reflects the signal to the main receiver (Bob). The design objective is to maximise the achievable secrecy rate in the noisy communication channel by jointly optimizing the collaborative beamforming weights of the sensor nodes, the trajectory of the UAV and the reflection coefficients of the IRS elements. By designing the IRS reflection coefficients with and without the knowledge of the eavesdropper's channel, we develop a non-iterative sub-optimal solution for the secrecy rate maximization problem. It has been shown analytically that the UAV flight time and the randomness in the distribution of the sensor nodes, obtained by varying the sensor distribution area, can greatly affect secrecy performance. In addition, the maximum allowable number of IRS elements as well as a bound on the attainable average secrecy rate of the IRS aided noisy communication channel have also been derived. Extensive simulation results demonstrate the superior performance of the proposed algorithms compared to the existing schemes.
△ Less
Submitted 16 January, 2021;
originally announced January 2021.
-
UAV-Aided Jamming for Secure Ground Communication with Unknown Eavesdropper Location
Authors:
Christantus O. Nnamani,
Muhammad R. A. Khandaker,
Mathini Sellathurai
Abstract:
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming…
▽ More
This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demonstrate that the optimal flight path obtains better secrecy rate performance compared to that using direct UAV flight path encasing the transmitter and the legitimate receiver. Most importantly, even with the unknown eavesdropper location, we obtained a secrecy rate that is comparable to a scenario when the eavesdropper's location is known. However, the average secrecy rate with the unknown eavesdropper location varies depending on the proximity of the eavesdropper to the known location of the transmitter. We also observe that due to the UAV-aided jamming, the average secrecy rate stabilizes at some point even though the average received envelope power of the eavesdropper increases. This essentially demonstrates the effectiveness of the proposed scheme.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.