12 research outputs found
On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying with Cooperative Jamming and SWIPT
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV)
aided transmission protocol, where a source (Alice) sends confidential
information to a destination (Bob) via an energy-constrained UAV-mounted
amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve).
We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous
wireless information and power transfer (SWIPT) at the UAV-mounted relay to
enhance physical-layer security (PLS) and transmission reliability. Assuming a
low altitude UAV, we derive connection probability (CP), secrecy outage
probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR)
of the proposed protocol over Air-Ground (AG) channels, which are modeled as
Rician fading with elevation-angel dependent parameters. By simulations, we
verify our theoretical results and demonstrate significant performance
improvement of our protocol, when compared to conventional transmission
protocol with ground relaying and UAV-based transmission protocol without
destination-assisted jamming. Finally, we evaluate the impacts of different
system parameters and different UAV's locations on the proposed protocol in
terms of ASR.Comment: 10 pages, 9 figures, Submitted for possible journal publicatio
Secure Two-Way Transmission via Wireless-Powered Untrusted Relay and External Jammer
In this paper, we propose a two-way secure communication scheme where two
transceivers exchange confidential messages via a wireless powered untrusted
amplify-and-forward (AF) relay in the presence of an external jammer. We take
into account both friendly jamming (FJ) and Gaussian noise jamming (GNJ)
scenarios. Based on the time switching (TS) architecture at the relay, the data
transmission is done in three phases. In the first phase, both the
energy-starved nodes, the untrustworthy relay and the jammer, are charged by
non-information radio frequency (RF) signals from the sources. In the second
phase, the two sources send their information signals and concurrently, the
jammer transmits artificial noise to confuse the curious relay. Finally, the
third phase is dedicated to forward a scaled version of the received signal
from the relay to the sources. For the proposed secure transmission schemes, we
derive new closed-form lower-bound expressions for the ergodic secrecy sum rate
(ESSR) in the high signal-to-noise ratio (SNR) regime. We further analyze the
asymptotic ESSR to determine the key parameters; the high SNR slope and the
high SNR power offset of the jamming based scenarios. To highlight the
performance advantage of the proposed FJ, we also examine the scenario of
without jamming (WoJ). Finally, numerical examples and discussions are provided
to acquire some engineering insights, and to demonstrate the impacts of
different system parameters on the secrecy performance of the considered
communication scenarios. The numerical results illustrate that the proposed FJ
significantly outperforms the traditional one-way communication and the
Constellation rotation approach, as well as our proposed benchmarks, the
two-way WoJ and GNJ scenarios.Comment: 14 pages, 6 figures, Submitted to IEEE Transactions on Vehicular
Technolog
Secure Short-Packet Transmission with Aerial Relaying: Blocklength and Trajectory Co-Design
In this paper, we propose a secure short-packet communication (SPC) system
involving an unmanned aerial vehicle (UAV)-aided relay in the presence of a
terrestrial passive eavesdropper. The considered system, which is applicable to
various next-generation Internet-of-Things (IoT) networks, exploits a UAV as a
mobile relay, facilitating the reliable and secure exchange of intermittent
short packets between a pair of remote IoT devices with strict latency. Our
objective is to improve the overall secrecy throughput performance of the
system by carefully designing key parameters such as the coding blocklengths
and the UAV trajectory. However, this inherently poses a challenging
optimization problem that is difficult to solve optimally. To address the
issue, we propose a low-complexity algorithm inspired by the block successive
convex approximation approach, where we divide the original problem into two
subproblems and solve them alternately until convergence. Numerical results
demonstrate that the proposed design achieves significant performance
improvements relative to other benchmarks, and offer valuable insights into
determining appropriate coding blocklengths and UAV trajectory.Comment: 7 pages, 5 figures, 1 table, Accepted by IEEE Global Communications
Conference, 4-8 December 2023, Kuala Lumpur, Malaysia. arXiv admin note:
substantial text overlap with arXiv:2307.0722
Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design
Short-packet communication (SPC) and unmanned aerial vehicles (UAVs) are
anticipated to play crucial roles in the development of 5G-and-beyond wireless
networks and the Internet of Things (IoT). In this paper, we propose a secure
SPC system, where a UAV serves as a mobile decode-and-forward (DF) relay,
periodically receiving and relaying small data packets from a remote IoT device
to its receiver in two hops with strict latency requirements, in the presence
of an eavesdropper. This system requires careful optimization of important
design parameters, such as the coding blocklengths of both hops, transmit
powers, and UAV's trajectory. While the overall optimization problem is
nonconvex, we tackle it by applying a block successive convex approximation
(BSCA) approach to divide the original problem into three subproblems and solve
them separately. Then, an overall iterative algorithm is proposed to obtain the
final design with guaranteed convergence. Our proposed low-complexity algorithm
incorporates 3D trajectory design and resource management to optimize the
effective average secrecy throughput of the communication system over the
course of UAV-relay's mission. Simulation results demonstrate significant
performance improvements compared to various benchmark schemes and provide
useful design insights on the coding blocklengths and transmit powers along the
trajectory of the UAV
Safeguarding Beyond-5G Wireless Communications with Unmanned Aerial Vehicles: Design and Optimization
The application frameworks of unmanned aerial vehicles (UAVs), more commonly known as drones, have recently gained popularity in public and civil domains. In the beyond-5G wireless networks, drone technology would play a crucial role in establishing or improving seamless and pervasive connectivity. This thesis addresses the security challenges of such aerial wireless communications using low-complexity physical-layer techniques. Our fundamental goal is to design, develop, and optimize analytical frameworks for deploying confidential and energy-efficient wireless drone communication systems. Our research lays a solid foundation for safeguarding drone communications by proposing efficient solutions and algorithms based on convex optimization and artificial intelligence