Optimizing UAV Networks For Secure Comms

Mar 03, 2025 Leave a message

Unmanned Aerial Vehicles (UAVs) are becoming increasingly ubiquitous both in civilian and military applications. One of the reasons why is their myriad uses in fluid and dynamic situations, such as a battlefield or disaster response area.

One such use is to provide an ad-hoc communications network when infrastructure, like ground-based antennas and fiber optic cables, might not be available. There are several advantages to using UAVs for that role, such as their ability to access line-of-sight to pretty much any point in the area.

However, this also represents a disadvantage if the communication channel is intended to be secure. Finding a balance between the level of security and datalink speed makes for an interesting optimization problem that has been the focus of research for many information theorists for a while.

news-752-501

Secure comms

First, It is important to establish a baseline of why this security is essential. UAVs operating as communications platforms in military zones can provide unparalleled capabilities for ground forces. In ideal situations, they provide a link from any ground forces back to the forward operating base, but also between individual ground forces themselves.

However, a sophisticated enemy would know how important that communication link is and would do their best to either intercept the transmissions and try to decode them or just jam the signal outright. In one case, they receive vital enemy intel that their adversary might not know they have, and in the other, they effectively shut down the communication network that could give that adversary an advantage.

Jamming would be the default in most situations, so even if the information warfare officers responsible for maintaining the UAV comms link enabled advanced cryptography on the channel, their enemy would simply jam it, eliminating whatever tactical advantage it could supply. So, the key is to establish a secure link while also making jamming impracticable.

One way to do that is through a technique called physical layer security (PLS). This technique utilizes the physical environment the signals are sent through to defend against both interception and jamming. It uses techniques like channel hopping, beamforming and, importantly, intentionally transmitted noise to obfuscate and confuse any "wardens" that might be listening.

In information theory literature, a warden is a system that might be listening to a comms line with ill intent. Confusing them is one of the primary goals of establishing a secure communications channel.

 

Detection versus bandwidth

A paper released initially as a pre-print in October 2023 by researchers from China, India and Saudi Arabia focused onnews-750-422 establishing a secure communications line with a high bandwidth while confusing any wardens that might be listening, no matter their sophistication level. It does so by utilizing two different UAVs - one that establishes legitimate communications links with ground forces while the other intentionally jams the frequency both are using.

Intentional jamming might seem counter-productive, but if the jammer and transmitter coordinate correctly, they could easily fool a system simply by sniffing different wireless signals. The jamming signal would be switched off at specific points to allow the real signal to pass through without interruption.

However, to an outside party, there would be no differentiation between the jamming signal and an actual signal, so it would likely simply miss that a message had been passed entirely.

 

Calculating trade-offs

Saying that the optimization function is complex would be putting it mildly. In optimization theory, the algorithms are designed to find a minimum depending on what value is being optimized for. However, many times in the numerical solution of the function, there are things called "local minima," which can be thought of as a divet before a steeper drop off the other side.

Getting stuck in one of these is a hazard of most simplified optimization functions, so the authors used a Successive Convex Approximation (SCA).

An SCA algorithm tackles this local minima problem by simplifying its local environment to approximations that can more easily be solved. It does this iteratively to study the approximation around the current point. It gradually improves the approximation over time, allowing it to represent the more complex function more accurately while still treating it as a tractable problem.

 

Harnessing drones

Information warfare like this is gaining increasing importance, especially given the increase in the use of drones in almost all modern wars. As drones become more prevalent as communications platforms and face down enemies with sophisticated interception techniques, developing secure channels that can't be interpreted or jammed will become even more important. That effort sounds like another optimization problem to solve.

Send Inquiry

whatsapp

Phone

E-mail

Inquiry