12 research outputs found

    On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT

    Full text link
    This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source (Alice) sends confidential information to a destination (Bob) via an energy-constrained UAV-mounted amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve). We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous wireless information and power transfer (SWIPT) at the UAV-mounted relay to enhance physical-layer security (PLS) and transmission reliability. Assuming a low altitude UAV, we derive connection probability (CP), secrecy outage probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR) of the proposed protocol over Air-Ground (AG) channels, which are modeled as Rician fading with elevation-angel dependent parameters. By simulations, we verify our theoretical results and demonstrate significant performance improvement of our protocol, when compared to conventional transmission protocol with ground relaying and UAV-based transmission protocol without destination-assisted jamming. Finally, we evaluate the impacts of different system parameters and different UAV's locations on the proposed protocol in terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio

    Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer

    Get PDF
    In this paper, we propose a two-way secure communication scheme where two transceivers exchange confidential messages via a wireless powered untrusted amplify-and-forward (AF) relay in the presence of an external jammer. We take into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ) scenarios. Based on the time switching (TS) architecture at the relay, the data transmission is done in three phases. In the first phase, both the energy-starved nodes, the untrustworthy relay and the jammer, are charged by non-information radio frequency (RF) signals from the sources. In the second phase, the two sources send their information signals and concurrently, the jammer transmits artificial noise to confuse the curious relay. Finally, the third phase is dedicated to forward a scaled version of the received signal from the relay to the sources. For the proposed secure transmission schemes, we derive new closed-form lower-bound expressions for the ergodic secrecy sum rate (ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the asymptotic ESSR to determine the key parameters; the high SNR slope and the high SNR power offset of the jamming based scenarios. To highlight the performance advantage of the proposed FJ, we also examine the scenario of without jamming (WoJ). Finally, numerical examples and discussions are provided to acquire some engineering insights, and to demonstrate the impacts of different system parameters on the secrecy performance of the considered communication scenarios. The numerical results illustrate that the proposed FJ significantly outperforms the traditional one-way communication and the Constellation rotation approach, as well as our proposed benchmarks, the two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technolog

    Secure Short-Packet Transmission with Aerial Relaying: Blocklength and Trajectory Co-Design

    Full text link
    In this paper, we propose a secure short-packet communication (SPC) system involving an unmanned aerial vehicle (UAV)-aided relay in the presence of a terrestrial passive eavesdropper. The considered system, which is applicable to various next-generation Internet-of-Things (IoT) networks, exploits a UAV as a mobile relay, facilitating the reliable and secure exchange of intermittent short packets between a pair of remote IoT devices with strict latency. Our objective is to improve the overall secrecy throughput performance of the system by carefully designing key parameters such as the coding blocklengths and the UAV trajectory. However, this inherently poses a challenging optimization problem that is difficult to solve optimally. To address the issue, we propose a low-complexity algorithm inspired by the block successive convex approximation approach, where we divide the original problem into two subproblems and solve them alternately until convergence. Numerical results demonstrate that the proposed design achieves significant performance improvements relative to other benchmarks, and offer valuable insights into determining appropriate coding blocklengths and UAV trajectory.Comment: 7 pages, 5 figures, 1 table, Accepted by IEEE Global Communications Conference, 4-8 December 2023, Kuala Lumpur, Malaysia. arXiv admin note: substantial text overlap with arXiv:2307.0722

    Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design

    Full text link
    Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are anticipated to play crucial roles in the development of 5G-and-beyond wireless networks and the Internet of Things (IoT). In this paper, we propose a secure SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay, periodically receiving and relaying small data packets from a remote IoT device to its receiver in two hops with strict latency requirements, in the presence of an eavesdropper. This system requires careful optimization of important design parameters, such as the coding blocklengths of both hops, transmit powers, and UAV's trajectory. While the overall optimization problem is nonconvex, we tackle it by applying a block successive convex approximation (BSCA) approach to divide the original problem into three subproblems and solve them separately. Then, an overall iterative algorithm is proposed to obtain the final design with guaranteed convergence. Our proposed low-complexity algorithm incorporates 3D trajectory design and resource management to optimize the effective average secrecy throughput of the communication system over the course of UAV-relay's mission. Simulation results demonstrate significant performance improvements compared to various benchmark schemes and provide useful design insights on the coding blocklengths and transmit powers along the trajectory of the UAV

    Safeguarding Beyond-5G Wireless Communications with Unmanned Aerial Vehicles: Design and Optimization

    No full text
    The application frameworks of unmanned aerial vehicles (UAVs), more commonly known as drones, have recently gained popularity in public and civil domains. In the beyond-5G wireless networks, drone technology would play a crucial role in establishing or improving seamless and pervasive connectivity. This thesis addresses the security challenges of such aerial wireless communications using low-complexity physical-layer techniques. Our fundamental goal is to design, develop, and optimize analytical frameworks for deploying confidential and energy-efficient wireless drone communication systems. Our research lays a solid foundation for safeguarding drone communications by proposing efficient solutions and algorithms based on convex optimization and artificial intelligence
    corecore