Security analysis and secured access design for networks of image remote sensing

Zhao Juan , Dai Haibo , Xu Xiaolong , Yan Hao , Zhang Zheng , Li Chunguo

›› 2025, Vol. 11 ›› Issue (1) : 136 -144.

PDF
›› 2025, Vol. 11 ›› Issue (1) : 136 -144. DOI: 10.1016/j.dcan.2023.05.004
Original article

Security analysis and secured access design for networks of image remote sensing

Author information +
History +
PDF

Abstract

The secured access is studied in this paper for the network of the image remote sensing. Each sensor in this network encounters the information security when uploading information of the images wirelessly from the sensor to the central collection point. In order to enhance the sensing quality for the remote uploading, the passive reflection surface technique is employed. If one eavesdropper that exists nearby this sensor is keeping on accessing the same networks, he may receive the same image from this sensor. Our goal in this paper is to improve the SNR of legitimate collection unit while cut down the SNR of the eavesdropper as much as possible by adaptively adjust the uploading power from this sensor to enhance the security of the remote sensing images. In order to achieve this goal, the secured energy efficiency performance is theoretically analyzed with respect to the number of the passive reflection elements by calculating the instantaneous performance over the channel fading coefficients. Based on this theoretical result, the secured access is formulated as a mathematical optimization problem by adjusting the sensor uploading power as the unknown variables with the objective of the energy efficiency maximization while satisfying any required maximum data rate of the eavesdropper sensor. Finally, the analytical expression is theoretically derived for the optimum uploading power. Numerical simulations verify the design approach.

Keywords

Image remote sensing / Secured access / Energy efficiency / Sensor transmit power / Secured access design

Cite this article

Download citation ▾
Zhao Juan, Dai Haibo, Xu Xiaolong, Yan Hao, Zhang Zheng, Li Chunguo. Security analysis and secured access design for networks of image remote sensing. , 2025, 11(1): 136-144 DOI:10.1016/j.dcan.2023.05.004

登录浏览全文

4963

注册一个新账户 忘记密码

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgement

This work is supported in part by Jiangsu Province High Level “333” Program (0401206044), National Natural Science Foundation of China (61801243, 62072255), Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology (JIT-B-202031), University Incubator Foundation of Jinling Institute of Technology (JIT-FHXM-202110), Open Project of Fujian Provincial Key Lab. of Network Security and Cryptology (NSCL-KF2021-02), Open Foundation of National Railway Intelligence Transportation System Engineering Tech. Research Center (RITS2021KF02), China Postdoctoral Science Foundation (2019M651914).

References

[1]

X. Lu, X. Sun, W. Diao, Y. Feng, P. Wang, K. Fu, LIL: lightweight incremental learning approach through feature transfer for remote sensing image scene classification, IEEE Trans. Geosci. Remote Sens. 60 (8) (2022) 1-20.

[2]

Q. He, X. Sun, Z. Yan, K. Fu, DABNet: deformable contextual and boundary-weighted network for cloud detection in remote sensing images, IEEE Trans. Geosci. Remote Sens. 60 (1) (2022) 1-16.

[3]

Y. Zhu, X. Sun, W. Diao, H. Li, K. Fu, RFA-Net: reconstructed feature alignment network for domain adaptation object detection in remote sensing imagery, IEEE J. Sel. Top. Appl. Earth Obs. 15 (7) (2022) 5689-5703.

[4]

Y. Tian, B. Gao, L. Tong, Design and application of wireless sensor networks for ground verification of remote sensing, in: IEEE Int. Conf. on Apperceiving Comput-ing and Intelligence Analysis, IEEE, 2008, pp. 381-384.

[5]

Y. Qu, Y. Zhu, W. Han, J. Wang, M. Ma, Crop leaf area index observations with a wireless sensor network and its potential for validating remote sensing products, IEEE J. Sel. Top. Appl. Earth Obs. 7 (2) (2014) 431-444.

[6]

Y. Gui, H. Lu, X. Jiang, F. Wu, C.W. Chen, Compressed pseudo-analog transmission system for remote sensing images over bandwidth-constrained wireless channels, IEEE Trans. Circuits Syst. Video Technol. 30 (9) (2020) 3181-3195.

[7]

J. Wen, J. Yang, T. Wang, Y. Li, Z. Lv, Energy-efficient task allocation for reliable parallel computation of cluster-based wireless sensor network in edge computing, Digit. Commun. Netw. 9 (2) (2023) 473-482.

[8]

Y. Tripathi, A. Prakash, R. Tripathi, A novel slot scheduling technique for duty-cycle based data transmission for wireless sensor network, Dig. Commun. Netw. 8 (3) (2022) 351-358.

[9]

A. Pughat, V. Sharma, Performance analysis of an improved dynamic power man-agement model in wireless sensor node, Dig. Commun. Netw. 3 (1) (2017) 19-29.

[10]

J. Yang, An ellipse-guided routing algorithm in wireless sensor networks, Dig. Com-mun. Netw. 8 (5) (2022) 770-777.

[11]

W. Fang, W. Zhang, W. Yang, Z. Li, W. Gao, Y. Yang, Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks, Dig. Commun. Netw. 7 (4) (2021) 470-478.

[12]

L. Fan, L. Liu, H. Gao, Z. Ma, Y. Wu, Secure K-nearest neighbor queries in two-tiered mobile wireless sensor networks, Dig. Commun. Netw. 7 (2) (2021) 247-256.

[13]

G. Zhou, C. Pan, H. Ren, K. Wang, Z. Peng, Secure wireless communication in RIS-aided MISO system with hardware impairments, IEEE Wirel. Commun. Lett. 10 (6) (2021) 1309-1313.

[14]

X. Tang, X. Lan, D. Zhai, R. Zhang, Z. Han, Securing wireless transmissions with RIS-receiver coordination: passive beamforming and active jamming, IEEE Trans. Veh. Technol. 70 (6) (2021) 6260-6265.

[15]

Y. Han, N. Li, Y. Liu, T. Zhang, X. Tao, Artificial noise aided secure NOMA communi-cations in STAR-RIS networks, IEEE Wirel. Commun. Lett. 11 (6) (2022) 1191-1195.

[16]

Z. Wei, W. Guo, B. Li, A multi-eavesdropper scheme against RIS secured LoS-dominated channel, IEEE Commun. Lett. 26 (6) (2022) 1221-1225.

[17]

Y. Sun, Y. Zhu, G. Zheng, K.-K. Wong, S. Chatzinotas, D.W.K. Ng, D. Guan, Energy-efficient hybrid beamforming for multilayer RIS-assisted secure integrated terrestrial-aerial networks, IEEE Trans. Commun. 70 (6) (2022) 4189-4210.

[18]

N. Ye, X. Zhuo, J. Li, J. Li, B. Di, J. An, Secure directional modulation in RIS-aided networks: a low-sidelobe hybrid beamforming approach, IEEE Wirel. Commun. Lett. 11 (8) (2022) 1753-1757.

[19]

H. Dai, L. Zhang, H. Bian, Baoyun Wang, UAV relaying assisted transmission opti-mization with caching in vehicular networks, Phys. Commun. 43 (2020) 1-8.

[20]

Y. Zhang, L. Jia, N. Qi, Y. Xu, M. Wang, Anti-jamming channel access in 5G ultra-dense networks: a game-theoretic learning approach, Digit. Commun. Netw. 9 (2) (2023) 523-533.

[21]

Z. Wang, B. Cao, C. Liu, C. Xu, L. Zhang, Blockchain-based fog radio access networks: architecture, key technologies, and challenges, Dig. Commun. Netw. 8 (5) (2022) 720-726.

[22]

Y. Li, S. Xia, M. Zheng, B. Cao, Q. Liu, Lyapunov optimization based trade-off policy for mobile cloud offloading in heterogeneous wireless networks, IEEE Trans. Cloud Comput. 10 (1) (2022) 491-505.

[23]

Y. Li, H. Ma, L. Wang, S. Mao, G. Wang, Optimized content caching and user associ-ation for edge computing in densely deployed heterogeneous networks, IEEE Trans. Mob. Comput. 21 (6) (2022) 2130-2142.

[24]

S. Xia, Z. Yao, Y. Li, S. Mao, Online distributed offloading and computing re-source management with energy harvesting for heterogeneous MEC-enabled IoT, IEEE Trans. Wirel. Commun. 20 (10) (2021) 6743-6757.

[25]

S. Xia, Z. Yao, G. Wu, Y. Li, Distributed offloading for cooperative intelligent trans-portation under heterogeneous networks, IEEE Trans. Intell. Transp. Syst. 23 (9) (2022) 16701-16714.

[26]

C. He, C. Tian, C. Zhang, D. Feng, C. Pan, F.-C. Zheng, Energy efficiency optimization for distributed antenna systems with D2D communications under channel uncer-tainty, IEEE Trans. Green Commun. Netw. 4 (4) (2020) 1037-1047.

[27]

F. Heliot, M.A. Imran, R. Tafazolli, On the energy efficiency-spectral efficiency trade-off over the MIMO Rayleigh fading channel, IEEE Trans. Commun. 60 (5) (2012) 1345-1356.

[28]

S. Boyd, L. Vandenberghe, Convex Optimization, Cambridge, UK, 2004.

[29]

Corless R. Gonnet, G. Hare, D. Jeffrey, D. Knuth, On the Lambert W function, Adv. Comput. Math. 5 (1996) 329-359.

[30]

H. Dai, H. Zhang, C. Li, B. Wang, Efficient deployment of multiple UAVs for IoT communication in dynamic environment, China Commun. 17 (1) (2020) 89-103.

[31]

H. Dai, H. Zhang, M. Hua, C. Li, Y. Huang, B. Wang, How to deploy multiple UAVs for providing communication service in an unknown region?, IEEE Wirel. Commun. Lett. 8 (4) (2019) 1276-1279.

[32]

X. Yu, D. Xu, Y. Sun, D.W.K. Ng, R. Schober, Robust and secure wireless communica-tions via intelligent reflecting surfaces, IEEE J. Sel. Areas Commun. 38 (11) (2020) 2637-2652.

[33]

F. Shu, Y. Teng, J. Li, M. Huang, W. Shi, J. Li, Y. Wu, J. Wang, Enhanced secrecy rate maximization for directional modulation networks via IRS, IEEE Trans. Commun. 69 (12) (2022) 8388-8401.

[34]

X. Wang, F. Shu, W. Shi, X. Liang, R. Dong, J. Li, J. Wang, Beamforming design for IRS-aided decode-and-forward relay wireless network, IEEE Trans. Green Commun. Netw. 6 (1) (2022) 198-207.

[35]

X. Zhou, S. Yan, Q. Wu, F. Shu, D.W.K. Ng, Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint, IEEE Trans. Wirel. Commun. 21 (1) (2022) 532-547.

AI Summary AI Mindmap
PDF

206

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/