4 research outputs found

    Secure UAV Communication with Cooperative Jamming and Trajectory Control

    Full text link
    This paper presents a new cooperative jamming approach to secure the unmanned aerial vehicle (UAV) communication by leveraging jamming from other nearby UAVs to defend against the eavesdropping. In particular, we consider a two-UAV scenario when one UAV transmitter delivers the confidential information to a ground node (GN), and the other UAV jammer cooperatively sends artificial noise (AN) to confuse the ground eavesdropper for protecting the confidentiality of the data transmission. By exploiting the fully-controllable mobility, the two UAVs can adaptively adjust their locations over time (a.k.a. trajectories) to facilitate the secure communication and cooperative jamming. We assume that the two UAVs perfectly know the GN's location and partially know the eavesdropper's location {\emph{a-priori}}. Under this setup, we maximize the average secrecy rate from the UAV transmitter to the GN over one particular time period, by optimizing the UAVs' trajectories, jointly with their communicating/jamming power allocations. Although the formulated problem is non-convex, we propose an efficient solution by applying the techniques of alternating optimization and successive convex approximation (SCA).Comment: 5 pages, 2 figures, accepted for publication at the IEEE Communications Lette

    3D Trajectory Optimization for Secure UAV Communication with CoMP Reception

    Full text link
    This paper studies a secrecy unmanned aerial vehicle (UAV) communication system with coordinated multi-point (CoMP) reception, in which one UAV sends confidential messages to a set of distributed ground nodes (GNs) that can cooperate in signal detection, in the presence of several colluding suspicious eavesdroppers. Different from prior works considering the two-dimensional (2D) horizontal trajectory design in the non-CoMP scenario, this paper additionally exploits the UAV's vertical trajectory (or altitude) control for further improving the secrecy communication performance with CoMP. In particular, we jointly optimize the three dimensional (3D) trajectory and transmit power allocation of the UAV to maximize the average secrecy rate at GNs over a particular flight period, subject to the UAV's maximum flight speed and maximum transmit power constraints. To solve the non-convex optimization problem, we propose an alternating-optimization-based approach, which optimizes the transmit power allocation and trajectory design in an alternating manner, by convex optimization and successive convex approximation (SCA), respectively. Numerical results show that in the scenario with CoMP reception, our proposed 3D trajectory optimization significantly outperforms the conventional 2D horizontal trajectory design, by exploiting the additional degree of freedom in vertical trajectory.Comment: 6 pages, 5 figures, submitted to IEEE Conference for possible publicatio

    Joint 3D Maneuver and Power Adaptation for Secure UAV Communication with CoMP Reception

    Full text link
    This paper studies a secrecy unmanned aerial vehicle (UAV) communication system with coordinated multi-point (CoMP) reception, in which one UAV sends confidential messages to a set of cooperative ground receivers (GRs), in the presence of several suspicious eavesdroppers. In particular, we consider two types of eavesdroppers that are non-colluding and colluding, respectively. Under this setup, we exploit the UAV's maneuver in three dimensional (3D) space together with transmit power adaptation for optimizing the secrecy communication performance. First, we consider the quasi-stationary UAV scenario, where we jointly optimize the UAV's 3D placement and transmit power control to maximize the secrecy rate. Under both non-colluding and colluding eavesdroppers, we obtain the optimal solutions to the joint 3D placement and transmit power control problems in well structures. Next, we consider the mobile UAV scenario, where we jointly optimize the UAV's 3D trajectory and transmit power allocation to maximize the average secrecy rate during the whole communication period. To deal with the difficult joint 3D trajectory and transmit power allocation problems, we present alternating-optimization-based approaches to obtain high-quality solutions. Finally, we provide numerical results to validate the performance of our proposed designs. It is shown that due to the consideration of CoMP reception, our proposed design with 3D maneuver significantly outperforms the conventional design with two dimensional (2D) (horizontal) maneuver only, by exploiting the additional degrees of freedom in altitudes. It is also shown that the non-colluding and colluding eavesdroppers lead to distinct 3D UAV maneuver behaviors.Comment: Single-column, 31 pages, 10 figures, submitted to IEEE Journal for possible publication. arXiv admin note: text overlap with arXiv:1905.1114

    Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks

    Full text link
    This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their respective legitimate receivers on the ground, in the presence of another set of randomly distributed suspicious ground eavesdroppers. We assume that the horizontal locations of legitimate receivers and eavesdroppers are distributed as two independent homogeneous Possion point processes (PPPs), and each of the UAVs is positioned exactly above its corresponding legitimate receiver for efficient secrecy communication. Furthermore, we consider an elevation-angle-dependent line-of-sight (LoS)/non-LoS (NLoS) path-loss model for air-to-ground (A2G) wireless channels and employ the wiretap code for secrecy transmission. Under such setups, we first characterize the secrecy communication performance (in terms of the connection probability, secrecy outage probability, and secrecy transmission capacity) in mathematically tractable forms, and accordingly optimize the system configurations (i.e., the wiretap code rates and UAV positioning altitude) to maximize the secrecy transmission capacity, subject to a maximum secrecy outage probability constraint. Next, we propose to use the secrecy guard zone technique for further secrecy protection, and analyze the correspondingly achieved secrecy communication performance. Finally, we present numerical results to validate the theoretical analysis. It is shown that the employment of secrecy guard zone significantly improves the secrecy transmission capacity of this network, and the desirable guard zone radius generally decreases monotonically as the UAVs' and/or the eavesdroppers' densities increase.Comment: 16 pages, 11 figures. Accepted for publication in the IEEE Transactions on Communications. It overlaps with the former version (arXiv:1902.00836
    corecore