UAV-Enabled Confidential Data Collection in Wireless Networks

This work, for the first time, considers confidential data collection in the context of unmanned aerial vehicle (UAV) wireless networks, where the scheduled ground sensor node (SN) intends to transmit confidential information to the UAV without being intercepted by other unscheduled ground SNs. Specifically, a full-duplex (FD) UAV collects data from each scheduled SN on the ground and generates artificial noise (AN) to prevent the scheduled SN's confidential information from being wiretapped by other unscheduled SNs. We first derive the reliability outage probability (ROP) and secrecy outage probability (SOP) of a considered fixed-rate transmission, based on which we formulate an optimization problem that maximizes the minimum average secrecy rate (ASR) subject to some specific constraints. We then transform the formulated optimization problem into a convex problem with the aid of first-order restrictive approximation technique and penalty method. The resultant problem is a generalized nonlinear convex programming (GNCP) and solving it directly still leads to a high complexity, which motivates us to further approximate this problem as a second-order cone program (SOCP) in order to reduce the computational complexity. Finally, we develop an iteration procedure based on penalty successive convex approximation (P-SCA) algorithm to pursue the solution to the formulated optimization problem. Our examination shows that the developed joint design achieves a significant performance gain compared to a benchmark scheme.

[1]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[2]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[3]  Cheng Zhan,et al.  Energy Minimization in Internet-of-Things System Based on Rotary-Wing UAV , 2019, IEEE Wireless Communications Letters.

[4]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[5]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[6]  Markku J. Juntti,et al.  Optimal Energy-Efficient Transmit Beamforming for Multi-User MISO Downlink , 2015, IEEE Transactions on Signal Processing.

[7]  Lingyang Song,et al.  Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.

[8]  Mohamed-Slim Alouini,et al.  Joint Trajectory and Precoding Optimization for UAV-Assisted NOMA Networks , 2019, IEEE Transactions on Communications.

[9]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[10]  Rui Zhang,et al.  Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network , 2017, IEEE Wireless Communications Letters.

[11]  Feng Shu,et al.  UAV-Enabled Covert Wireless Data Collection , 2019, IEEE Journal on Selected Areas in Communications.

[12]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[13]  Caijun Zhong,et al.  Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access , 2018, IEEE Journal on Selected Areas in Communications.

[14]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[15]  Chao Shen,et al.  Flight Time Minimization of UAV for Data Collection Over Wireless Sensor Networks , 2018, IEEE Journal on Selected Areas in Communications.

[16]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[17]  He Chen,et al.  Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.

[18]  Mohamed-Slim Alouini,et al.  Safeguarding UAV IoT Communication Systems Against Randomly Located Eavesdroppers , 2020, IEEE Internet of Things Journal.

[19]  Riqing Chen,et al.  Physical Layer Security for Ultra-Reliable and Low-Latency Communications , 2019, IEEE Wireless Communications.

[20]  Rui Zhang,et al.  Cyclical Multiple Access in UAV-Aided Communications: A Throughput-Delay Tradeoff , 2016, IEEE Wireless Communications Letters.

[21]  Tony Q. S. Quek,et al.  Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.

[22]  Yunfei Chen,et al.  UAV-Relaying-Assisted Secure Transmission With Caching , 2019, IEEE Transactions on Communications.

[23]  Le-Nam Tran,et al.  Energy Efficiency Fairness for Multi-Pair Wireless-Powered Relaying Systems , 2019, IEEE Journal on Selected Areas in Communications.

[24]  Jun Li,et al.  UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.

[25]  Feng Shu,et al.  Robust Synthesis Scheme for Secure Multi-Beam Directional Modulation in Broadcasting Systems , 2016, IEEE Access.

[26]  Xiangyun Zhou,et al.  Artificial-Noise-Aided Secure Transmission in Wiretap Channels With Transmitter-Side Correlation , 2016, IEEE Transactions on Wireless Communications.

[27]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[28]  Jin Chen,et al.  Unmanned Aerial Vehicle-Aided Communications: Joint Transmit Power and Trajectory Optimization , 2018, IEEE Wireless Communications Letters.

[29]  Weihua Zhuang,et al.  UAV Relay in VANETs Against Smart Jamming With Reinforcement Learning , 2018, IEEE Transactions on Vehicular Technology.

[30]  Jinhong Yuan,et al.  Optimization of Code Rates in SISOME Wiretap Channels , 2015, IEEE Transactions on Wireless Communications.

[31]  Justin P. Coon,et al.  Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers , 2019, IEEE Transactions on Information Forensics and Security.

[32]  Jinhong Yuan,et al.  Three Artificial-Noise-Aided Secure Transmission Schemes in Wiretap Channels , 2018, IEEE Transactions on Vehicular Technology.

[33]  Wei-Chiang Li,et al.  Coordinated Beamforming for Multiuser MISO Interference Channel Under Rate Outage Constraints , 2011, IEEE Transactions on Signal Processing.

[34]  Matthew R. McKay,et al.  Rethinking the Secrecy Outage Formulation: A Secure Transmission Design Perspective , 2011, IEEE Communications Letters.

[35]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.