4 research outputs found
Secure UAV Communication with Cooperative Jamming and Trajectory Control
This paper presents a new cooperative jamming approach to secure the unmanned
aerial vehicle (UAV) communication by leveraging jamming from other nearby UAVs
to defend against the eavesdropping. In particular, we consider a two-UAV
scenario when one UAV transmitter delivers the confidential information to a
ground node (GN), and the other UAV jammer cooperatively sends artificial noise
(AN) to confuse the ground eavesdropper for protecting the confidentiality of
the data transmission. By exploiting the fully-controllable mobility, the two
UAVs can adaptively adjust their locations over time (a.k.a. trajectories) to
facilitate the secure communication and cooperative jamming. We assume that the
two UAVs perfectly know the GN's location and partially know the eavesdropper's
location {\emph{a-priori}}. Under this setup, we maximize the average secrecy
rate from the UAV transmitter to the GN over one particular time period, by
optimizing the UAVs' trajectories, jointly with their communicating/jamming
power allocations. Although the formulated problem is non-convex, we propose an
efficient solution by applying the techniques of alternating optimization and
successive convex approximation (SCA).Comment: 5 pages, 2 figures, accepted for publication at the IEEE
Communications Lette
3D Trajectory Optimization for Secure UAV Communication with CoMP Reception
This paper studies a secrecy unmanned aerial vehicle (UAV) communication
system with coordinated multi-point (CoMP) reception, in which one UAV sends
confidential messages to a set of distributed ground nodes (GNs) that can
cooperate in signal detection, in the presence of several colluding suspicious
eavesdroppers. Different from prior works considering the two-dimensional (2D)
horizontal trajectory design in the non-CoMP scenario, this paper additionally
exploits the UAV's vertical trajectory (or altitude) control for further
improving the secrecy communication performance with CoMP. In particular, we
jointly optimize the three dimensional (3D) trajectory and transmit power
allocation of the UAV to maximize the average secrecy rate at GNs over a
particular flight period, subject to the UAV's maximum flight speed and maximum
transmit power constraints. To solve the non-convex optimization problem, we
propose an alternating-optimization-based approach, which optimizes the
transmit power allocation and trajectory design in an alternating manner, by
convex optimization and successive convex approximation (SCA), respectively.
Numerical results show that in the scenario with CoMP reception, our proposed
3D trajectory optimization significantly outperforms the conventional 2D
horizontal trajectory design, by exploiting the additional degree of freedom in
vertical trajectory.Comment: 6 pages, 5 figures, submitted to IEEE Conference for possible
publicatio
Joint 3D Maneuver and Power Adaptation for Secure UAV Communication with CoMP Reception
This paper studies a secrecy unmanned aerial vehicle (UAV) communication
system with coordinated multi-point (CoMP) reception, in which one UAV sends
confidential messages to a set of cooperative ground receivers (GRs), in the
presence of several suspicious eavesdroppers. In particular, we consider two
types of eavesdroppers that are non-colluding and colluding, respectively.
Under this setup, we exploit the UAV's maneuver in three dimensional (3D) space
together with transmit power adaptation for optimizing the secrecy
communication performance. First, we consider the quasi-stationary UAV
scenario, where we jointly optimize the UAV's 3D placement and transmit power
control to maximize the secrecy rate. Under both non-colluding and colluding
eavesdroppers, we obtain the optimal solutions to the joint 3D placement and
transmit power control problems in well structures. Next, we consider the
mobile UAV scenario, where we jointly optimize the UAV's 3D trajectory and
transmit power allocation to maximize the average secrecy rate during the whole
communication period. To deal with the difficult joint 3D trajectory and
transmit power allocation problems, we present alternating-optimization-based
approaches to obtain high-quality solutions. Finally, we provide numerical
results to validate the performance of our proposed designs. It is shown that
due to the consideration of CoMP reception, our proposed design with 3D
maneuver significantly outperforms the conventional design with two dimensional
(2D) (horizontal) maneuver only, by exploiting the additional degrees of
freedom in altitudes. It is also shown that the non-colluding and colluding
eavesdroppers lead to distinct 3D UAV maneuver behaviors.Comment: Single-column, 31 pages, 10 figures, submitted to IEEE Journal for
possible publication. arXiv admin note: text overlap with arXiv:1905.1114
Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks
This paper considers the secrecy transmission in a large-scale unmanned
aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the
sky transmit confidential information to their respective legitimate receivers
on the ground, in the presence of another set of randomly distributed
suspicious ground eavesdroppers. We assume that the horizontal locations of
legitimate receivers and eavesdroppers are distributed as two independent
homogeneous Possion point processes (PPPs), and each of the UAVs is positioned
exactly above its corresponding legitimate receiver for efficient secrecy
communication. Furthermore, we consider an elevation-angle-dependent
line-of-sight (LoS)/non-LoS (NLoS) path-loss model for air-to-ground (A2G)
wireless channels and employ the wiretap code for secrecy transmission. Under
such setups, we first characterize the secrecy communication performance (in
terms of the connection probability, secrecy outage probability, and secrecy
transmission capacity) in mathematically tractable forms, and accordingly
optimize the system configurations (i.e., the wiretap code rates and UAV
positioning altitude) to maximize the secrecy transmission capacity, subject to
a maximum secrecy outage probability constraint. Next, we propose to use the
secrecy guard zone technique for further secrecy protection, and analyze the
correspondingly achieved secrecy communication performance. Finally, we present
numerical results to validate the theoretical analysis. It is shown that the
employment of secrecy guard zone significantly improves the secrecy
transmission capacity of this network, and the desirable guard zone radius
generally decreases monotonically as the UAVs' and/or the eavesdroppers'
densities increase.Comment: 16 pages, 11 figures. Accepted for publication in the IEEE
Transactions on Communications. It overlaps with the former version
(arXiv:1902.00836