Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications

We address the critical problem of hiding unmanned aerial vehicles (UAV) for wireless transmissions by the emerging covert communication technology, since in military surveillance scenarios the disclosure of a UAV's location information may lead to an attack. Specifically, we jointly optimize the UAV's transmit power and height in order to maximize the communication quality to a legitimate receiver subject to a covertness constraint, a maximum transmit power constraint, and a lower bound and an upper bound on the UAV's height. To this end, we first derive the UAV's optimal height for maximizing the legitimate communication quality without any constraint and then we address this problem under constraints in particular the covertness constraint. Our solution explicitly shows the impact of these constraints and reveals the tradeoff among the legitimate communication quality, covertness requirement, and surveillance cost. For example, our examination demonstrates that the legitimate communication quality increases with the surveillance cost represented by the quality of the camera used for conducting surveillance.

[1]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[2]  Jun Li,et al.  UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.

[3]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[4]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[5]  He Chen,et al.  Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.

[6]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[7]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[8]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[9]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[10]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[11]  Donald F. Towsley,et al.  Square root law for communication with low probability of detection on AWGN channels , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[12]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[13]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[14]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[15]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.