Mode Selection and Cooperative Jamming for Covert Communication in D2D Underlaid UAV Networks

The integration of unmanned aerial vehicle (UAV) networks and device-to-device (D2D) communications is expected to provide ubiquitous connectivity and high-speed rates for sensitive information transmission in future wireless networks. However, the traditional cryptography and physical layer security techniques still cannot prevent adversaries from knowing the existence of information transmission such that they further launch attacks on transmitters and receivers. Covert communication can offer an even stronger level of security via hiding the information transmission process of wireless networks. In this article, we first integrate D2D communications into UAV networks, and then investigate the fundamental issues of mode selection and cooperative jamming for covert communication in such networks, aiming to provide a powerful security solution to support widespread securi-ty-sensitive applications of such networks. To this end, we propose two promising D2D underlaid UAV network architectures, whereby each UAV acts as either a flying BS or an aerial UE. Then, we propose a covert communication strategy by combining mode selection and cooperative jamming, where mode selection allows each user equipment to adaptively switch between half-du-plex and full-duplex communication modes, and cooperative jamming means that idle D2D pairs inject interference to confuse adversaries. The goal of the proposed strategy is to enhance covert capacity performance (i.e., the maximum channel rate) while maintaining a high detection error probability at adversaries in the promising network architectures. Numerical results are presented to evaluate our strategy of mode selection and cooperative jamming, and to illustrate performance gains in terms of covert capacity and detection error probability in these two network architectures. Finally, a vision is discussed for our future research in D2D underlaid UAV networks.

[1]  Jianfeng Ma,et al.  Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band , 2020, IEEE Internet of Things Journal.

[2]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[3]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[4]  Zhetao Li,et al.  Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks , 2019, IEEE Transactions on Communications.

[5]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[6]  Xiangyun Zhou,et al.  Delay-Intolerant Covert Communications With Either Fixed or Random Transmit Power , 2019, IEEE Transactions on Information Forensics and Security.

[7]  Shaoqian Li,et al.  Covert Communication With the Help of Relay and Channel Uncertainty , 2019, IEEE Wireless Communications Letters.

[8]  Matthieu R. Bloch,et al.  Covert Communication Over Noisy Channels: A Resolvability Perspective , 2015, IEEE Transactions on Information Theory.

[9]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[10]  Saikat Guha,et al.  Covert Wireless Communication With Artificial Noise Generation , 2017, IEEE Transactions on Wireless Communications.

[11]  Tarik Taleb,et al.  Aerial Control System for Spectrum Efficiency in UAV-to-Cellular Communications , 2018, IEEE Communications Magazine.

[12]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[13]  Jun Li,et al.  Covert Communication Achieved by a Greedy Relay in Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[14]  Tarik Taleb,et al.  Spectrum Sharing for Secrecy Performance Enhancement in D2D-Enabled UAV Networks , 2020, IEEE Network.

[15]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[16]  Tarik Taleb,et al.  Performance, Fairness, and Tradeoff in UAV Swarm Underlaid mmWave Cellular Networks With Directional Antennas , 2021, IEEE Transactions on Wireless Communications.

[17]  Tarik Taleb,et al.  Energy and Delay Aware Task Assignment Mechanism for UAV-Based IoT Platform , 2019, IEEE Internet of Things Journal.

[18]  Feng Shu,et al.  Delay-Constrained Covert Communications With a Full-Duplex Receiver , 2018, IEEE Wireless Communications Letters.

[19]  Feng Shu,et al.  Covert Transmission With a Self-Sustained Relay , 2018, IEEE Transactions on Wireless Communications.

[20]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[21]  Dan Wu,et al.  Trust Evaluation and Covert Communication-Based Secure Content Delivery for D2D Networks: A Hierarchical Matching Approach , 2019, IEEE Access.

[22]  Moe Z. Win,et al.  A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.

[23]  Saikat Guha,et al.  Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.