Friday, September 19, 2025

 

A survey of covert UAV Communications



Tsinghua University Press
Various roles of UAVs for covert communications. 

image: 

Various roles of UAVs for covert communications.

view more 

Credit: Chinese Journal of Aeronautics





Unmanned Aerial Vehicles (UAVs), as small and versatile flying platforms, play an increasingly important role in various domains such as remote connectivity, environmental monitoring, disaster management, smart agriculture, and search and rescue. Owing to their low cost, high mobility, and line-of-sight (LoS) communication capabilities, UAV-based communication has emerged as an effective approach to extend coverage and improve transmission performance. However, the LoS links and the inherent openness of wireless channels expose UAV networks to significant security risks. Fortunately, covert communications can achieve a higher level of security by hiding the very existence of transmission behavior. When wardens do not detect the transmitted signals, they will not attempt to decode the confidential content and take further action. Therefore, the information security of transmitters can be guaranteed.

 

In a recent article featured in the Chinese Journal of Aeronautics (Volume 38, Issue 10, October 2025), Dr. Fangtao Yang et al. conducted a comprehensive survey on covert UAV communications, providing insights into emerging methods, technologies, and applications of covert transmission in UAV-assisted networks.

 

This survey aims to provide an overview of the state-of-the-art in the uncertainties, wireless techniques, and applications of covert UAV communications. Firstly, although the average number of bits covertly transmitted per channel use is theoretically asymptotic to zero in the context of square root law, the positive covert rate can be achieved via the uncertainties towards wardens. Thus, uncertainties can be regarded as a higher degree of freedom to satisfy the covertness requirement since they can confuse wardens to ascertain if the transmitters are performing the wireless transmission. Existing uncertainty techniques for covert UAV communications can be classified into four categories: background noise uncertainty; power uncertainty; channel uncertainty; location variation and gaussian signaling. Secondly, since the LoS channels can benefit wardens, one common scheme to maintain the covertness is to jointly design the power and trajectory of UAV. In addition, several wireless techniques introducing uncertainties at wardens can be investigated to achieve better communication performance while ensuring the covertness. These techniques include multiple antennas, reconfigurable intelligent surface, multiple access, mmWave and Terahertz, AN as well as artificial intelligence. Finally, for the explosive applications in 6G networks, the covert UAV communications as a promising candidate can achieve full coverage and high security, as it not only can prevent the wardens from detecting the information transmission but also improve the communication performance via the mobility of UAVs. In this section, a comprehensive review of existing applications in covert UAV communications is provided. These applications include visible light communications, Internet of Things (IoT) networks, ultra-reliable and low-latency communications and backscatter networks.

 

However, there still remain some challenges regarding the practical scenarios and emerging applications. Thus, we point out the key issues of covert UAV communications for future research as follows. 1)Imperfect channel state information. 2) Energy efficiency; 3) Cellular-enabled UAV networks; 4) Spectrum prediction; 5) Heterogeneous interference. These issues are urgently addressed. With the rapid evolution of wireless technologies, methodologies for covert communications should evolve to introduce additional uncertainty and adapt to new security requirements in emerging applications and scenarios. This is particularly crucial to counteract the increasing computational capabilities of potential adversaries. As a result, covert UAV communications are anticipated to undergo rapid development and be widely adopted in practical applications.

 

Original Source

Fangtao YANG, Xiaoqi QIN, Shiqi GONG, Na DENG, Chengwen XING, Nan ZHAO. A survey of covert UAV communications[J]. Chinese Journal of Aeronautics, 2025, 38(10): 103493. https://doi.org/10.1016/j.cja.2025.103493.

 

About Chinese Journal of Aeronautics 

Chinese Journal of Aeronautics (CJA) is an open access, peer-reviewed international journal covering all aspects of aerospace engineering, monthly published by Elsevier. The Journal reports the scientific and technological achievements and frontiers in aeronautic engineering and astronautic engineering, in both theory and practice. CJA is indexed in SCI (IF = 5.7, Q1), EI, IAA, AJ, CSA, Scopus.

Efficient detection of GPS Spoofing attack! BUPT team proposes a new real-time trajectory anomaly detection scheme



Tsinghua University Press
Anomaly detection scheme of UAV under GPS-spoofing attack and real-time trajectory correction using MSSTP-OAD. 

image: 

Anomaly detection scheme of UAV under GPS-spoofing attack and real-time trajectory correction using MSSTP-OAD. 

view more 

Credit: Chinese Journal of Aeronautics






Civilian UAVs rely on unencrypted civilian GPS signals, making them easy prey for spoofers who broadcast slightly stronger fake satellite signals. Once the drone locks onto the counterfeit constellation it miscalculates its position and veers off mission. Existing counter-measures demand expensive multi-frequency receivers or continuous links to cellular/reference stations—requirements that are impractical for low-cost agricultural or delivery platforms.

 

Researchers from Beijing University of Posts and Telecommunications (BUPT) and Pengcheng Laboratory now report a lightweight, fully on-board solution in the Chinese Journal of Aeronautics (Volume 38, Issue 10, October 2025).  Their Motion-State-Series Trajectory Prediction and Online Anomaly Detection (MSSTP-OAD) system reframes the problem as short-term trajectory forecasting. During an offline phase, a stacked LSTM network is trained on flight logs—straight segments, turns, climbs and loiters—recorded in the open-source SITL simulator.  Each training sample is a 20-step sequence (5 s at 4 Hz) of motion-state vectors that fuse position, velocity, acceleration, attitude angles and magnetic field readings.  The network learns to predict the next five positions from the past 20 states.

 

During flight the algorithm works in two stages: 

1.  Rapid screening: every small time slot constructs a lightweight motion vector and feeds it to a first ensemble model (E1) for a quick anomaly count. 

2.  Final decision: at the end of the detection window, a high-dimensional vector that adds LSTM-predicted positions is sent to a second ensemble model (E2) that combines MLP, SVM and histogram-based gradient-boosting tree classifiers under a strict majority-vote rule, sharply reducing false positives.

 

Tests on 30 000 flight segments (half normal, half with 10–100 m horizontal spoofing offsets) showed: 

- Trajectory prediction R² = 0.996 (benign) / 0.994 (under attack); RMSE < 5 m even under attack. 

- Detection: accuracy 0.984, recall 0.988, F1 0.983. 

- After an alarm, a simple “return-to-waypoint” manoeuvre flew 26 % less extra distance than the baseline method.

 

The authors emphasize that current findings are simulation-based. Field campaigns employing software-defined-radio (SDR) spoofers are now under way to quantify robustness against real-world multipath, atmospheric delay, and receiver clock drift. Upcoming efforts will: 

1) fuse magnetometer and barometer data to counter potential IMU spoofing; 

2) apply quantization-aware training to shrink LSTM weights for minimal firmware overhead; and 

3) roll out a distributed variant in which neighbouring UAVs exchange ultra-light motion digests for consensus voting—boosting resilience without revealing flight plans. 

The end goal is a drop-in firmware patch for PX4 and ArduPilot that instantly retrofits existing commercial and hobby drones with a low-cost, zero-extra-hardware shield against GPS manipulation.

 

Original Source

Tianci HUANG, Huici WU, Xiaofeng TAO, Zhiqing WEI. Prediction-based trajectory anomaly detection in UAV system with GPS spoofing attack[J]. Chinese Journal of Aeronautics, 2025, 38(10): 103478. https://doi.org/10.1016/j.cja.2025.103478.

 

About Chinese Journal of Aeronautics 

Chinese Journal of Aeronautics (CJA) is an open access, peer-reviewed international journal covering all aspects of aerospace engineering, monthly published by Elsevier. The Journal reports the scientific and technological achievements and frontiers in aeronautic engineering and astronautic engineering, in both theory and practice. CJA is indexed in SCI (IF = 5.7, Q1), EI, IAA, AJ, CSA, Scopus.

Europe, Mediterranean coast saw record drought in August: AFP analysis of EU data


By AFP
September 18, 2025


Climate change is propelling a range of threats to health, including droughts that have hit the yields of important food crops. — © AFP

Europe and the Mediterranean basin saw record drought in August, with more than half of the land affected, according to AFP analysis of EU data.

Last month, 53 percent of the region was affected by drought — an all-time high since records began in 2012 — according to the EU’s Copernicus Climate Change Service.

The figure is far above the 2012-2024 average for August of 30.1 percent.

Eastern Europe and the Balkans were particularly hard hit. Thousands of residents were evacuated and two people were killed as a result of wildfires in Balkan states spurred by high temperatures.

Western Europe was also badly affected, with Portugal seeing a drop in rainfall across 70 percent of the country.

France, hit by its second heatwave of the summer in August, experienced water shortages in two-thirds of the country.



Drought in late August 2025 in Europe and the Mediterranean – Copyright AFP Nalini LEPETIT-CHELLA, Valentina BRESCHI

Several countries in the eastern Mediterranean were severely impacted, with more than 90 percent of Armenia, Georgia and Lebanon all affected by drought.

Turkey, which experienced water shortages in 84 percent of the country, also faced numerous wildfires.

The Copernicus dataset, drawing on billions of measurements from satellites, ships, aircraft and weather stations, has recorded relentlessly rising temperatures as the planet warms as a result of humanity’s emissions of greenhouse gases.

Environment: Snow melts more quickly in forests that have been burned



ByDr. Tim Sandle
SCIENCE EDITOR
DIGITAL JOURNAL
September 18, 2025


The Adamello glacier is suffering from reduced snowfall -- down 50 percent last year - Copyright AFP GABRIEL BOUYS

In snow-dominated regions globally, mountain snowpacks are a vital water resource for recharging aquifers (an underground layer of water-bearing material) and sustaining streamflow (the flow of water in streams and other channels) into the drier summer months. This natural course is being disrupted by human-initiated environmental changes.

Wildfires, themselves often a product of climate change, are causing earlier snowmelt across the western U.S., and this effect will only become further exacerbated by projected warmer winters. This presents increased environmental risk. Notably, wildfires are increasing in frequency, size, duration, and intensity.

A new study, from the Colorado School of Mines (a public R1 research university focused on applied science and engineering), concludes that snow that falls in forests that have been burned melts more quickly than snow that falls in forests that haven’t burned. The study has significant water supply implications for communities that rely on snowmelt to satisfy their water requirements.

The earlier snow melt in burned forests is a result of two processes. The darker snow left by forest fires is less reflective, causing the snow to absorb more energy and melt earlier.

Secondly, burned forests often have less tree cover, so there is more sunlight reaching the snowpack.

Additionally, climate change also affects the snow sensitivity to burned conditions. Here, colder winter air temperatures yield snowpacks with higher cold content (defined as the amount of energy required to melt a snowpack). This occurs throughout the winter, providing a higher energy threshold needed to melt the snow.

Impacted: Pacific Northwest and Northern Sierra Nevada

Climate warming has altered patterns of snow accumulation and melt throughout the seasonal snow zone in the western U.S. Lower elevation regions like the Pacific Northwest and Northern Sierra Nevada will be especially impacted. These changes could make it harder for communities there to manage their water supply.

The study relied on remotely sensed snow data gathered by NASA’s Moderate Resolution Imaging Spectroradiometer (MODIS) satellite. Most previous studies on the topic utilized ground-based measurement systems.

Postfire snow cover loss was shown to be more extreme in relatively low-elevation, warm environments compared to that in high-elevation, cold regions.

According to the study, 98 percent of forested regions in the western U.S. could expect earlier snowmelt after a fire occurs. The situation gets worse as average temperatures increase – with 2°C of additional warming, the type of warming predicted to accompany climate change, 86 percent of the snow zone would experience earlier post-fire snowmelt compared to historically average conditions.

The research appears in the journal Science Advances, titled “Impact of current and warmer climate conditions on snow cover loss in burned forests”.

 

Poverty and social disadvantage in women and men and fertility outcomes




JAMA Network Open






About The Study: 

The findings of this cohort study suggest that poverty and social disadvantage, characterized by low educational level and household income among both women and men, were associated with lower fecundability (defined as the per-month probability of conceiving) and increased risks of subfertility (defined as a time to pregnancy or the duration of actively pursuing pregnancy of more than 12 months or use of assisted reproductive technology) but not with miscarriage risk. Further studies are needed to identify the underlying and explanatory mechanisms associated with fertility outcomes and the potential for novel public health strategies for couples desiring pregnancy.



Corresponding author: To contact the corresponding author, Vincent W. V. Jaddoe, M.D., Ph.D., email v.jaddoe@erasmusmc.nl.

To access the embargoed study: Visit our For The Media website at this link https://media.jamanetwork.com/

(doi: 10.1001/jamanetworkopen.2025.32741)

Editor’s Note: Please see the article for additional information, including other authors, author contributions and affiliations, conflict of interest and financial disclosures, and funding and support.

#  #  #

Embed this link to provide your readers free access to the full-text article T

 http://jamanetwork.com/journals/jamanetworkopen/fullarticle/10.1001/jamanetworkopen.2025.32741?utm_source=For_The_Media&utm_medium=referral&utm_campaign=ftm_links&utm_term=091925

About JAMA Network Open: JAMA Network Open is an online-only open access general medical journal from the JAMA Network. On weekdays, the journal publishes peer-reviewed clinical research and commentary in more than 40 medical and health subject areas. Every article is free online from the day of publication.

 

Modeling the impact of MMR vaccination strategies on measles outbreaks in Texas




JAMA Health Forum





About The Study: 

The findings of this study highlight the critical role of improving measles, mumps, rubella (MMR) vaccination coverage to prevent large-scale measles outbreaks, particularly in regions with declining immunization rates.


Corresponding Author: To contact the corresponding author, Kaiming Bi, Ph.D., email kaiming.bi@uth.tmc.edu.

To access the embargoed study: Visit our For The Media website at this link https://media.jamanetwork.com/

(doi: 10.1001/jamahealthforum.2025.3992)

Editor’s Note: Please see the article for additional information, including other authors, author contributions and affiliations, conflict of interest and financial disclosures, and funding and support.

#  #  #

Embed this link to provide your readers free access to the full-text article 

 https://jamanetwork.com/journals/jama-health-forum/fullarticle/10.1001/jamahealthforum.2025.3992?utm_source=For_The_Media&utm_medium=referral&utm_campaign=ftm_links&utm_term=091925

About JAMA Health Forum: JAMA Health Forum is an international, peer-reviewed, online, open access journal that addresses health policy and strategies affecting medicine, health and health care. The journal publishes original research, evidence-based reports and opinion about national and global health policy; innovative approaches to health care delivery; and health care economics, access, quality, safety, equity and reform. Its distribution will be solely digital and all content will be freely available for anyone to read.

 

How an ant’s nose knows


New study reveals a previously unknown mechanism that ensures that each olfactory neuron expresses only one odorant receptor, with broad implications for the study of gene regulation.



Rockefeller University

Ants 

image: 

Clonal raider ants

view more 

Credit: Daniel Kronauer





Ant societies are built on scent. Pheromones guide the insects to food, warn them of predators, and regulate the rhythms of their colonies. This chemical communication system is governed by a simple rule: one receptor, one neuron. Ant genomes contain hundreds of odorant receptor genes, each encoding a receptor tuned to specific chemicals. Were a neuron to express multiple receptors at once, the messages arriving in the brain would be scrambled, and the ant would lose its finely tuned sense of smell.

Now, scientists working with the clonal raider ant have discovered the unique process by which each neuron selects a single odorant receptor from a vast library of genes. The findings, published in Current Biology, settle the longstanding mystery of how ants keep sensory signals clear.

"We're describing a new form of gene regulation," says Daniel Kronauer, head of the Laboratory of Social Evolution and Behavior at Rockefeller. "Our results demonstrate the importance of studying less conventional model species. We were able to discover new, fundamental molecular phenomena in clonal raider ants that we could not have seen in fruit flies."

One receptor, one neuron

A central principle of smell is that every neuron must have its own molecular identity. "It's a kind of dogma in the field of sensory neuroscience," says Giacomo Glotzer, a graduate student in the Kronauer lab. "Each sensory neuron typically expresses one receptor—and that gives it its identity."

Different species solve the "one receptor, one neuron" puzzle in different ways. Fruit flies rely on molecular switches that turn individual genes on or off, ensuring that only one receptor emerges from each sensory neuron. Mammals employ a more chaotic approach, with each neuron randomly reshuffling its chromatin until only one receptor gene remains accessible.

It was unknown, however, whether ants employed a strategy more like the fly or the mouse, or altogether different strategy. Unlike fruit flies, which get by with about 60 odorant receptors, ants have several hundred—comparable in scale to that of mammals. And many of their receptors are packed into clusters of nearly identical genes. In such a crowded neighborhood, turning on one gene might incidentally activate others. A simple strategy like the fruit fly’s may not work for the ant’s complex sense of smell, suggesting that ants maintain the 1:1 olfactory ratio some other way.

Building on a foundational paper on the subject that the team had published in 2023, the lab set out to capture this elusive mechanism in action. After dissecting the antennal tissue of clonal raider ants, the team then used RNA sequencing, to determine which genes were turned on, and RNA fluorescence in situ hybridization, to localize those genes in the ant antenna. They then used numerous cutting-edge molecular and computational techniques to create a clear image of one chosen receptor surrounded by its quieted neighbors.

They found that, when an ant neuron switches on its chosen receptor gene, it doesn't stop there. The RNA polymerase—the engine that copies the DNA into RNA—continues past that gene's normal endpoint, spilling into the genes that sit downstream of the target. These "readthrough" transcripts remain trapped in the nucleus, likely because they lack the unique tag required for export. The authors speculate that these transcripts are non-functional, but that their production itself is what silences downstream genes. Meanwhile, the neuron also generates "antisense" RNAs in the other direction. The polymerase here acts as a roadblock to silence upstream genes that might otherwise have turned on.

The result is a protective genetic shield around the chosen receptor gene.

"When we took the mechanism apart and dissected it into its constituent parts, we found that this strategy serves to silence the local genomic environment, giving that cell its singular receptor identity," says Parviz Daniel Hejazi Pastor, a biomedical fellow in the Kronauer lab. "Our findings center around transcriptional interference—that the neuron chooses one receptor by preventing the true transcription of other receptors both upstream and downstream."

Beyond clonal raider ants

The team went on to confirm that this same mechanism is at work in other social insects, including the Indian jumping ant and the honeybee. These findings raise the possibility that many insects, both social and non-social, use transcriptional interference to maintain a 1:1 ratio between receptors and neurons. "This mechanism may be even more broadly distributed than we thought, particularly among insect species with large repertoires of olfactory receptor genes" Kronauer says. "It's even possible that fruit flies are the odd ones out."

The implications extend far beyond insect olfaction. By showing that tight clusters of related genes can be governed by two-way safeguards—readthrough that quiets downstream neighbors and antisense transcription that blocks upstream ones—this work offers a blueprint for how genomes might keep large gene families in check. The results also point to a potential mechanism for explaining how ants quickly expand their sense of smell over relatively short evolutionary time. The findings described in this paper might allow newly duplicated receptor genes to be integrated into a sensory system without the need to coevolve additional regulatory mechanisms.

"Once you have the system in place like this, you can allow it to become more complex without disrupting anything," Kronauer says. "We speculate that this kind of gene regulatory system contributes to allowing the ants to evolve new olfactory receptors so quickly."