Safeguarding UAV IoT Communication Systems Against Randomly Located Eavesdroppers

Unmanned aerial vehicles (UAVs) will be extensively utilized in various Internet of Things (IoT) scenarios due to their flexible mobility and rapid on-demand deployment. It becomes necessary and urgent to investigate the secrecy performance of the UAV IoT communication systems because of the open characteristics of wireless channels. In this article, the physical layer security of UAV IoT communication systems is studied, in which a ground IoT device transmits some confidential messages to a UAV hovering in the air, while a random number of eavesdroppers are randomly positioned around the ground source. The ground-to-air channel is assumed to experience Rician fading for the case of line-of-sight propagation and Rayleigh fading for the case of nonline-of-sight propagation, respectively. In addition, in order to improve the security of the system, we also investigate the secrecy performance of the UAV IoT system with a friendly UAV that generates jamming signals to distract the eavesdroppers. Utilizing the stochastic geometry theory, the cumulative distribution functions for the signal-to-interference-plus-noise ratio of the main and eavesdropping links are derived, and then the analytical expressions of the secrecy outage probability and the average secrecy rate are obtained. Finally, the accuracy of the analytical results is verified by Monte Carlo simulation.

[1]  Xianwei Zhou,et al.  Resource Allocation in Unmanned Aerial Vehicle (UAV)-Assisted Wireless-Powered Internet of Things , 2019, Sensors.

[2]  Julian Cheng,et al.  Asymptotic Error Rate Analysis of Selection Combining on Generalized Correlated Nakagami-m Channels , 2012, IEEE Transactions on Communications.

[3]  Victor Adamchik,et al.  The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.

[4]  Halim Yanikomeroglu,et al.  Efficient 3-D placement of an aerial base station in next generation cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[5]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[6]  Sofie Pollin,et al.  Ultra Reliable UAV Communication Using Altitude and Cooperation Diversity , 2017, IEEE Transactions on Communications.

[7]  He Chen,et al.  Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.

[8]  Feng Lyu,et al.  3D Multi-Drone-Cell Trajectory Design for Efficient IoT Data Collection , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[9]  Jie Yang,et al.  DSF-NOMA: UAV-Assisted Emergency Communication Technology in a Heterogeneous Internet of Things , 2019, IEEE Internet of Things Journal.

[10]  Qihui Wu,et al.  An Amateur Drone Surveillance System Based on the Cognitive Internet of Things , 2017, IEEE Communications Magazine.

[11]  Tarik Taleb,et al.  Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.

[12]  M. Cenk Gursoy,et al.  Downlink Analysis in Unmanned Aerial Vehicle (UAV) Assisted Cellular Networks With Clustered Users , 2018, IEEE Access.

[13]  Mohamed-Slim Alouini,et al.  Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .

[14]  Salman Durrani,et al.  Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments , 2018, IEEE Internet of Things Journal.

[15]  Zhiguo Ding,et al.  Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.

[16]  Xiao Liu,et al.  Optimizing Trajectory of Unmanned Aerial Vehicles for Efficient Data Acquisition: A Matrix Completion Approach , 2019, IEEE Internet of Things Journal.

[17]  Yue Chen,et al.  Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.

[18]  Jing Huang,et al.  Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.

[19]  Mohsen Guizani,et al.  Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.

[20]  Inkyu Lee,et al.  UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.

[21]  Jun Zhang,et al.  Joint Beamforming and Power Allocation for UAV-Enabled Full-Duplex Relay , 2019, IEEE Transactions on Vehicular Technology.

[22]  Harpreet S. Dhillon,et al.  Downlink Coverage Analysis for a Finite 3-D Wireless Network of Unmanned Aerial Vehicles , 2017, IEEE Transactions on Communications.

[23]  Lingyang Song,et al.  UAV Offloading: Spectrum Trading Contract Design for UAV Assisted 5G Networks , 2017, ArXiv.

[24]  Justin P. Coon,et al.  Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers , 2019, IEEE Transactions on Information Forensics and Security.

[25]  Zhi Chen,et al.  Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System , 2018, IEEE Access.

[26]  Justin P. Coon,et al.  Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.

[27]  Hui-Ming Wang,et al.  Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.

[28]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[29]  Simon L. Cotton,et al.  Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..

[30]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[31]  Rui Zhang,et al.  Network-Connected UAV: 3-D System Modeling and Coverage Performance Analysis , 2019, IEEE Internet of Things Journal.

[32]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[33]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[34]  Qinghe Du,et al.  A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions , 2018, Entropy.

[35]  Musaed Alhussein,et al.  Joint Placement and Device Association of UAV Base Stations in IoT Networks , 2019, Sensors.

[36]  Kandeepan Sithamparanathan,et al.  Optimal LAP Altitude for Maximum Coverage , 2014, IEEE Wireless Communications Letters.

[37]  Ning Zhang,et al.  RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks , 2019, IEEE Internet of Things Journal.

[38]  Mohamed-Slim Alouini,et al.  Joint Trajectory and Precoding Optimization for UAV-Assisted NOMA Networks , 2019, IEEE Transactions on Communications.

[39]  Tony Q. S. Quek,et al.  Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.

[40]  Jia-Cheng Jiang,et al.  UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions , 2019, IEEE Wireless Communications.

[41]  Anh T. Pham,et al.  Mixed mmWave RF/FSO Relaying Systems Over Generalized Fading Channels With Pointing Errors , 2017, IEEE Photonics Journal.

[42]  Thomas Lagkas,et al.  UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things” , 2018, Sensors.

[43]  Walid Saad,et al.  Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.

[44]  Rui Zhang,et al.  Cellular-Connected UAV: Potential, Challenges, and Promising Technologies , 2018, IEEE Wireless Communications.

[45]  Gan Zheng,et al.  Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.

[46]  Milton Abramowitz,et al.  Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .

[47]  I. S. Ansari,et al.  Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.

[48]  Jianhua Lu,et al.  UAV-Aided MIMO Communications for 5G Internet of Things , 2019, IEEE Internet of Things Journal.