Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3643650.3658612acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article
Open access

RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking

Published: 19 June 2024 Publication History
  • Get Citation Alerts
  • Abstract

    As Unmanned Aerial Vehicles (UAVs) become increasingly integral to a variety of industries, their dependency on radio frequency (RF) signal-based communication systems has exposed them to a multitude of security vulnerabilities. One of the most notable ones is RF jamming, which can disrupt communication, control, and navigation. While traditional countermeasures, such as Hardware Sandboxing \citemead_defeating_2016, or Intrusion Detection System (IDS) based on Deep Learning aim to mitigate these threats, they exhibit limitations in addressing sophisticated jamming attacks \citedhomane_counter_measures_2020-1. This paper presents a novel design of an authentication-based strategy using RF watermarking. Our proposed RF watermarking technique embeds hidden identifiers within RF signals to authenticate communication sources and detect jamming attempts. Through a comprehensive evaluation, we demonstrate the effectiveness of our proposed scheme in enhancing UAV communication security and ensuring reliable operation in the presence of adversarial interference.

    References

    [1]
    A. Ahmed, Q. Ahmed, A. Rehman, and S. Karim. 2012. The Performance of Fast Frequency Hopping System in Additive White Gaussian Noise (AWGN). International Journal of Computer Applications, Vol. 46, 20, 14--22.
    [2]
    N. A. S. Al-Maweri, A. Q. M. Sabri, A. M. Mansoor, U. H. Obaidellah, E. R. M. Faizal, and J. C. Lai P. 2017. Metadata Hiding for UAV Video Based on Digital Watermarking in DWT Transform. Multimedia Tools and Applications, Vol. 76, 15, 16239--16261.
    [3]
    M. Aref, S. Jayaweera, and E. Yepez. 2020. A Survey on Cognitive Anti-jamming Communications. IET Communications, Vol. 14.
    [4]
    R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith, and L. Wingers. 2015. The SIMON and SPECK Lightweight Block Ciphers. In Proceedings of the 52nd Annual Design Automation Conference. ACM/EDAC/IEEE, San Francisco, CA, USA, 1--6.
    [5]
    A. Brito, P. Sebastião, and N. Souto. 2019. Jamming for Unauthorized UAV Operations-Communications Link. In Proceedings of the 2019 International Young Engineers Forum (YEF-ECE) (Costa de Caparica, Portugal). IEEE, 94--98.
    [6]
    V. Chamola, P. Kotesh, A. Agarwal, Naren, N. Gupta, and M. Guizani. 2021. A Comprehensive Review of Unmanned Aerial Vehicle Attacks and Neutralization Techniques. Ad Hoc Networks, Vol. 111, 102324.
    [7]
    K. J. Devi, P. Singh, M. Bilal, and A. Nayyar. 2024. Enabling Secure Image Transmission in Unmanned Aerial Vehicle Using Digital Image Watermarking with H-Grey Optimization. Expert Systems with Applications, Vol. 236, 121190.
    [8]
    P. Dhomane and R. Mathew. 2020. Counter-Measures to Spoofing and Jamming of Drone Signals. SSRN Electronic Journal.
    [9]
    R. Di Pietro, G. Oligeri, and P. Tedeschi. 2019. JAM-ME: Exploiting Jamming to Accomplish Drone Mission. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS). 1--9.
    [10]
    H. Imai and S. Hirakawa. 1977. A New Multilevel Coding Method Using Error-Correcting Codes. IEEE Transactions on Information Theory, Vol. 23, 3, 371--377.
    [11]
    J. E. Kleider, S. Gifford, S. Chuprun, and B. Fette. 2004. Radio Frequency Watermarking for OFDM Wireless Networks. In Proceedings of the 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5. V--397.
    [12]
    A. Krayani, A. S. Alam, L. Marcenaro, A. Nallanathan, and C. Regazzoni. 2022. Automatic Jamming Signal Classification in Cognitive UAV Radios. IEEE Transactions on Vehicular Technology, Vol. 71, 12, 12972--12988.
    [13]
    F. Lakew Yihunie, A. K. Singh, and S. Bhatia. 2020. Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles. In Smart Systems and IoT: Innovations in Computing, ( Vol. 160), Springer, 701--710.
    [14]
    Z. Lei, P. Ding, W. Zheng, X. Fei, and H. Fan. 2021. UAV Countermeasure Technology Based on Partial-band Noise Jamming. In Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC). 1456--1461.
    [15]
    Y. Li, J. Pawlak, J. Price, K. Al Shamaileh, Q. Niyaz, S. Paheding, and V. Devabhaktuni. 2022. Jamming Detection and Classification in OFDM-Based UAVs via Feature- and Spectrogram-Tailored Machine Learning. IEEE Access, Vol. 10, 16859--16870.
    [16]
    D. T. Magill, F. D. Natali, and G. P. Edwards. 1994. Spread-Spectrum Technology for Commercial Applications. Proc. IEEE, Vol. 82, 4, 572--584.
    [17]
    M. P. Marcinak and B. G. Mobasseri. 2005. Digital Video Watermarking for Metadata Embedding in UAV Video. In Proceedings of the MILCOM 2005 - 2005 IEEE Military Communications Conference. 1637--1643 Vol. 3.
    [18]
    J. Mead, C. Bobda, and T. JL Whitaker. [n.,d.]. Defeating drone jamming with hardware sandboxing. In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) (2016--12). 1--6.
    [19]
    J. Mikulka and S. Hanus. 2007. CCK and Barker Coding Implementation in IEEE 802.11b Standard. In Proc. of the 2007 17th International Conference Radioelektronika. 1--4.
    [20]
    S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan. 2023. Unmanned Aerial Vehicles (UAVs): Practical Aspects, Applications, Open Challenges, Security Issues, and Future Trends. Intelligent Service Robotics, Vol. 16, 1, 109--137.
    [21]
    S. Sciancalepore, F. Kusters, N. K. Abdelhadi, and G. Oligeri. 2023. Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep Learning. IEEE Internet of Things Journal, 1--1.
    [22]
    J. Winters. 1987. On the Capacity of Radio Communication Systems with Diversity in a Rayleigh Fading Environment. IEEE Journal on Selected Areas in Communications, Vol. 5, 5, 871--878.
    [23]
    J. Xu, H. Lou, W. Zhang, and G. Sang. 2020. An Intelligent Anti-Jamming Scheme for Cognitive Radio Based on Deep Reinforcement Learning. IEEE Access, Vol. 8, 202563--202572. io

    Index Terms

    1. RF-WAVEGUARD: Enhancing UAV Security Against Signal Jamming Attacks through Radio Frequency Watermarking

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SaT-CPS '24: Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems
        June 2024
        97 pages
        ISBN:9798400705557
        DOI:10.1145/3643650
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 19 June 2024

        Check for updates

        Author Tags

        1. communication resilience
        2. cyber threats
        3. jamming attacks
        4. rf watermarking
        5. uavs security

        Qualifiers

        • Research-article

        Funding Sources

        • The Italian Ministry for Universities and Research (MUR)

        Conference

        CODASPY '24
        Sponsor:

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 8
          Total Downloads
        • Downloads (Last 12 months)8
        • Downloads (Last 6 weeks)8

        Other Metrics

        Citations

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media