UAV-Enabled Covert Wireless Data Collection

This work considers unmanned aerial vehicle (UAV) networks for collecting data covertly from ground users. The full-duplex UAV intends to gather critical information from a scheduled user (SU) through wireless communication and generate artificial noise (AN) with random transmit power in order to ensure a negligible probability of the SU's transmission being detected by the unscheduled users (USUs). To enhance the system performance, we jointly design the UAV's trajectory and its maximum AN transmit power together with the user scheduling strategy subject to practical constraints, e.g., a covertness constraint, which is explicitly determined by analyzing each USU's detection performance, and a binary constraint induced by user scheduling. The formulated design problem is a mixed-integer non-convex optimization problem, which is challenging to solve directly, but tackled by our developed penalty successive convex approximation (P-SCA) scheme. An efficient UAV trajectory initialization is also presented based on the Successive Hover-and-Fly (SHAF) trajectory, which also serves as a benchmark scheme. Our examination shows the developed P-SCA scheme significantly outperforms the benchmark scheme in terms of achieving a higher max-min average transmission rate from all the SUs to the UAV.

[1]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[2]  He Chen,et al.  Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.

[3]  Jun Li,et al.  UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.

[4]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[5]  Donald F. Towsley,et al.  Covert Communications When the Warden Does Not Know the Background Noise Power , 2016, IEEE Communications Letters.

[6]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[7]  G. Laporte The traveling salesman problem: An overview of exact and approximate algorithms , 1992 .

[8]  Qian Yang,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[9]  Xiangyun Zhou,et al.  Covert Communication in Backscatter Radio , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[10]  Rui Zhang,et al.  Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network , 2017, IEEE Wireless Communications Letters.

[11]  Iain B. Collings,et al.  Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[12]  Jie Xu,et al.  Capacity Characterization of UAV-Enabled Two-User Broadcast Channel , 2018, IEEE Journal on Selected Areas in Communications.

[13]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[14]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[15]  Quang-Doanh Vu,et al.  Weighted Max–Min Fairness for C-RAN Multicasting Under Limited Fronthaul Constraints , 2018, IEEE Transactions on Communications.

[16]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[17]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[18]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[19]  Chao Shen,et al.  Flight Time Minimization of UAV for Data Collection Over Wireless Sensor Networks , 2018, IEEE Journal on Selected Areas in Communications.

[20]  W. Marsden I and J , 2012 .

[21]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[22]  Khurram Shahzad Relaying via Cooperative Jamming in Covert Wireless Communications , 2018, 2018 12th International Conference on Signal Processing and Communication Systems (ICSPCS).

[23]  Lingyang Song,et al.  Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.

[24]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[25]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[26]  Xiangyun Zhou,et al.  Gaussian Signalling for Covert Communications , 2018, IEEE Transactions on Wireless Communications.

[27]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[28]  Stephen P. Boyd,et al.  Variations and extension of the convex–concave procedure , 2016 .

[29]  Xiangyun Zhou,et al.  Low Probability of Detection Communication: Opportunities and Challenges , 2019, IEEE Wireless Communications.

[30]  Quang-Doanh Vu,et al.  Max-Min Fairness for Multicast Multigroup Multicell Transmission under Backhaul Constraints , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[31]  Xiangyun Zhou,et al.  Covert Wireless Communication With a Poisson Field of Interferers , 2017, IEEE Transactions on Wireless Communications.

[32]  Qingqing Wu,et al.  Common Throughput Maximization in UAV-Enabled OFDMA Systems With Delay Consideration , 2018, IEEE Transactions on Communications.

[33]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[34]  Mianxiong Dong,et al.  UAV-assisted data gathering in wireless sensor networks , 2014, The Journal of Supercomputing.

[35]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[36]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[37]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.