This paper presents a new cooperative jamming approach to secure the unmanned aerial vehicle (UAV) communication by leveraging jamming from other nearby UAVs to defend against the eavesdropping. In particular, we consider a two-UAV scenario when one UAV transmitter delivers the confidential information to a ground node (GN), and the other UAV jammer cooperatively sends artificial noise (AN) to confuse the ground eavesdropper for protecting the confidentiality of the data transmission. By exploiting the fully-controllable mobility, the two UAVs can adaptively adjust their locations over time (a.k.a. trajectories) to facilitate the secure communication and cooperative jamming. We assume that the two UAVs perfectly know the GN's location and partially know the eavesdropper's location a-priori. Under this setup, we maximize the average secrecy rate from the UAV transmitter to the GN over one particular time period, by optimizing the UAVs' trajectories, jointly with their communicating/jamming power allocations. Although the formulated problem is non-convex, we propose an efficient solution by applying the techniques of alternating optimization and successive convex approximation (SCA).
This paper studies a secrecy unmanned aerial vehicle (UAV) communication system with coordinated multi-point (CoMP) reception, in which one UAV sends confidential messages to a set of cooperative ground receivers (GRs), in the presence of several suspicious eavesdroppers. In particular, we consider two types of eavesdroppers that are non-colluding and colluding, respectively. Under this setup, we exploit the UAV's maneuver in three dimensional (3D) space together with transmit power adaptation for optimizing the secrecy communication performance. First, we consider the quasi-stationary UAV scenario, in which the UAV is placed at a fixed but optimizable location during the communication period. In this scenario, we jointly optimize the UAV's 3D placement and transmit power control to maximize the secrecy rate. Under both non-colluding and colluding eavesdroppers, we obtain the optimal solutions to the joint 3D placement and transmit power control problems in well structures. Next, we consider the mobile UAV scenario, in which the UAV has a mission to fly from an initial location to a final location during the communication period. In this scenario, we jointly optimize the UAV's 3D trajectory and transmit power allocation to maximize the average secrecy rate during the whole communication period. To deal with the difficult joint 3D trajectory and transmit power allocation problems, we present alternating-optimization-based approaches to obtain high-quality solutions. Finally, we provide numerical results to validate the performance of our proposed designs. It is shown that due to the consideration of CoMP reception, our proposed design with 3D maneuver significantly outperforms the conventional design with two dimensional (2D) (horizontal) maneuver only, by exploiting the additional degrees of freedom in altitudes. It is also shown that the non-colluding and colluding eavesdroppers lead to distinct ). J. Xu is the corresponding author.3D UAV maneuver behaviors, e.g., under colluding eavesdroppers, the UAV should fly farther apart from them (than that under the non-colluding ones) for avoiding their collaborative interception. Index TermsUAV communications, physical layer security, coordinated multi-point (CoMP) reception, 3D maneuver, power adaptation.Recently, the coordinated multi-point (CoMP) transmission/reception has been recognized as a promising technique in wireless networks [32][33][34][35], which enables symbol-level cooperation among geographically distributed nodes (such as BSs) to increase the communication performance via utilizing the inter-cell interference. It is well established that CoMP is able to significantly enhance the communication reliability and increase the data-rate throughput for both cell-center and cell-edge users [32][33][34][35], and also increase the secrecy communication performance [36]. Therefore, it is expected that the exploitation of CoMP can also enhance the performance of secrecy UAV communications. Nevertheless, how to optimally design the UAV maneuver for secrecy UAV com...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.