Jamming-aware optimization for UAV trajectory design and internet of things devices clustering

نویسندگان

چکیده

Abstract Radio jamming represents a serious threat in wireless networks that can cause denial of service (DoS) attacks for the network users. The jammer transmits signals to disrupt normal operation networks. With proliferation unmanned aerial vehicle (UAV)-based and Internet Things technologies, have become major challenge practical adoption these technologies. In this paper, we investigate problem optimizing performance UAV data collection from ground IoT devices presence malicious jammer. are clustered, collects cluster heads (CHs) such harmful effect is mitigated. objective minimize flight time while collecting attack. We modeled our mathematically as an integer linear program (ILP). Due difficulty solving optimization when scale large, proposed Jamming-Aware Routing Devices Clustering Algorithm (JA-RC). This algorithm Genetic-based solve original more efficient way. Then, under different settings scenarios.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor

Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...

متن کامل

UAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization

This paper studies a new unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) system, where a UAV-mounted mobile energy transmitter (ET) is dispatched to deliver wireless energy to a set of energy receivers (ERs) at known locations on the ground. We investigate how the UAV should optimally exploit its mobility via trajectory design to maximize the amount of energy transferred to ...

متن کامل

UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design

With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of s...

متن کامل

Internet of Things security and privacy: Design methods and optimization

Recent advances in information and communication technologies and embedded systems have given rise to a new disruptive technology: the Internet of Things (IoT). This major development will lead to major changes in usage and to a transformation of the technological ecosystem in all its complexity. IoT will allow people and objects in the physical world as well as data and virtual environments to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complex & Intelligent Systems

سال: 2023

ISSN: ['2198-6053', '2199-4536']

DOI: https://doi.org/10.1007/s40747-023-00970-3