UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location

This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demonstrate that the optimal flight path obtains better secrecy rate performance compared to that using direct UAV flight path encasing the transmitter and the legitimate receiver. Most importantly, even with the unknown eavesdropper location, we obtained a secrecy rate that is comparable to a scenario when the eavesdropper’s location is known. However, the average secrecy rate with the unknown eavesdropper location varies depending on the proximity of the eavesdropper to the known location of the transmitter. We also observe that due to the UAV-aided jamming, the average secrecy rate stabilizes at some point even though the average received envelope power of the eavesdropper increases. This essentially demonstrates the effectiveness of the proposed scheme.

[1]  Li Sun,et al.  Physical layer security with its applications in 5G networks: A review , 2017, China Communications.

[2]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[3]  An Li,et al.  Mobile jammer-aided secure UAV communications via trajectory design and power control , 2018, China Communications.

[4]  Qihui Wu,et al.  Network-connected UAV communications , 2018 .

[5]  Jin Chen,et al.  Network-connected UAV communications: Potentials and challenges , 2018, China Communications.

[6]  Meisam Razaviyayn,et al.  Successive Convex Approximation: Analysis and Applications , 2014 .

[7]  Symeon Chatzinotas,et al.  Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations , 2018, 2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[8]  Zhiyang Li,et al.  Joint Trajectory and Communication Design for Secure UAV Networks , 2019, IEEE Communications Letters.

[9]  Yunfei Chen,et al.  Physical-Layer Security Over Non-Small-Scale Fading Channels , 2016, IEEE Transactions on Vehicular Technology.

[10]  Irene A. Stegun,et al.  Handbook of Mathematical Functions. , 1966 .

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Lingfeng Shen,et al.  Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[13]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[14]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[15]  Shuowen Zhang,et al.  Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective , 2018, IEEE Transactions on Communications.

[16]  Victor C. M. Leung,et al.  UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells , 2018, IEEE Transactions on Vehicular Technology.

[17]  Stephen P. Boyd,et al.  Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.

[18]  Muhammad R. A. Khandaker,et al.  Robust Secrecy Beamforming With Energy-Harvesting Eavesdroppers , 2015, IEEE Wireless Communications Letters.

[19]  Yangyang Zhang,et al.  Secure Full-Duplex Two-Way Relaying for SWIPT , 2018, IEEE Wireless Communications Letters.

[20]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[21]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[22]  Wei Yu,et al.  Dual methods for nonconvex spectrum optimization of multicarrier systems , 2006, IEEE Transactions on Communications.

[23]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[24]  Baoqing Li,et al.  Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints , 2019, IEEE Access.

[25]  Jun Li,et al.  UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.

[26]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[27]  I. S. Gradshteyn,et al.  Table of Integrals, Series, and Products , 1976 .

[28]  Mehdi Bennis,et al.  A Speculative Study on 6G , 2019, IEEE Wireless Communications.

[29]  Qingqing Wu,et al.  Common Throughput Maximization in UAV-Enabled OFDMA Systems With Delay Consideration , 2018, IEEE Transactions on Communications.

[30]  Rui Zhang,et al.  Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.

[31]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Yimin D. Zhang,et al.  Multi-target Motion Parameter Estimation Exploiting Collaborative UAV Network , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[33]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.

[34]  Zhiguo Ding,et al.  Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.