Securing UAV Communication with Mobile UAV Eavesdroppers: Joint Trajectory and Communication Design

This paper investigates an unmanned aerial vehicle (UAV)-enabled secure communication system, where ground users (GUs) send confidential information to a UAV by time division multiple access (TDMA) in the presence of a potential mobile UAV eavesdropper. The mobile UAV eavesdropper is performing other task periodically in the same area. Our goal is to maximize the minimum average secrecy rate among all GUs by jointly optimizing the UAV trajectory, transmit power control and user scheduling. To tackle the non-convex problem, we firstly transform it into a more tractable form. Then, we propose an efficient algorithm based on block coordinate descent and successive convex approximation techniques to solve the problem. Furthermore, considering the mobility of the eavesdropper, we propose a new and low-complexity method to design the initial trajectory. Numerical results validated the superior performance of our proposed design against other benchmark schemes based on hover-and-fly trajectory.

[1]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[2]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[3]  Mazen O. Hasna,et al.  Secrecy Outage Performance of Ground-to-Air Communications With Multiple Aerial Eavesdroppers and Its Deep Learning Evaluation , 2020, IEEE Wireless Communications Letters.

[4]  Branka Vucetic,et al.  Secure Communications for UAV-Enabled Mobile Edge Computing Systems , 2020, IEEE Transactions on Communications.

[5]  Zhetao Li,et al.  Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks , 2019, IEEE Transactions on Communications.

[6]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.

[7]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[8]  Jie Xu,et al.  Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks , 2018, IEEE Internet of Things Journal.

[9]  Derrick Wing Kwan Ng,et al.  Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.

[10]  Jia-Cheng Jiang,et al.  UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions , 2019, IEEE Wireless Communications.

[11]  Mohamed-Slim Alouini,et al.  On the Secrecy of UAV Systems With Linear Trajectory , 2020, IEEE Transactions on Wireless Communications.

[12]  Hani Mehrpouyan,et al.  Detection, localization, and tracking of unauthorized UAS and Jammers , 2017, 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC).

[13]  Jie Xu,et al.  UAV-Enabled Wireless Power Transfer: Trajectory Design and Energy Optimization , 2017, IEEE Transactions on Wireless Communications.

[14]  Jie Xu,et al.  Joint 3D Maneuver and Power Adaptation for Secure UAV Communication With CoMP Reception , 2019, IEEE Transactions on Wireless Communications.

[15]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.