Jamming-aware optimization for UAV trajectory design and internet of things devices clustering
نویسندگان
چکیده
Abstract Radio jamming represents a serious threat in wireless networks that can cause denial of service (DoS) attacks for the network users. The jammer transmits signals to disrupt normal operation networks. With proliferation unmanned aerial vehicle (UAV)-based and Internet Things technologies, have become major challenge practical adoption these technologies. In this paper, we investigate problem optimizing performance UAV data collection from ground IoT devices presence malicious jammer. are clustered, collects cluster heads (CHs) such harmful effect is mitigated. objective minimize flight time while collecting attack. We modeled our mathematically as an integer linear program (ILP). Due difficulty solving optimization when scale large, proposed Jamming-Aware Routing Devices Clustering Algorithm (JA-RC). This algorithm Genetic-based solve original more efficient way. Then, under different settings scenarios.
منابع مشابه
GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor
Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...
متن کاملUAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization
This paper studies a new unmanned aerial vehicle (UAV)-enabled wireless power transfer (WPT) system, where a UAV-mounted mobile energy transmitter (ET) is dispatched to deliver wireless energy to a set of energy receivers (ERs) at known locations on the ground. We investigate how the UAV should optimally exploit its mobility via trajectory design to maximize the amount of energy transferred to ...
متن کاملUAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design
With the emergence of diverse mobile applications (such as augmented reality), the quality of experience of mobile users is greatly limited by their computation capacity and finite battery lifetime. Mobile edge computing (MEC) and wireless power transfer are promising to address this issue. However, these two techniques are susceptible to propagation delay and loss. Motivated by the chance of s...
متن کاملInternet of Things security and privacy: Design methods and optimization
Recent advances in information and communication technologies and embedded systems have given rise to a new disruptive technology: the Internet of Things (IoT). This major development will lead to major changes in usage and to a transformation of the technological ecosystem in all its complexity. IoT will allow people and objects in the physical world as well as data and virtual environments to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complex & Intelligent Systems
سال: 2023
ISSN: ['2198-6053', '2199-4536']
DOI: https://doi.org/10.1007/s40747-023-00970-3