Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks

The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security and covert communication problems for a pair of terrestrial nodes against UAV surveillance are considered in this paper. To overcome the information leakage and increase the transmission reliability, a multi-hop relaying strategy is deployed. We aim to optimize the throughput by carefully designing the parameters of the multi-hop network, including the coding rates, transmit power, and required number of hops. In the secure transmission scenario, the expressions of the connection probability and secrecy outage probability of an end-to-end path are derived and the closed-form expressions of the optimal transmit power, transmission and secrecy rates under a fixed number of hops are obtained. In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically. Simulation shows the impact of network settings on the transmission performance. The trade-off between secrecy/covertness and efficiency of the multi-hop transmission is discussed which leads to the existence of the optimal number of hops.

[1]  Rui Zhang,et al.  Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay , 2016, IEEE Journal of Selected Topics in Signal Processing.

[2]  Eduardo Tovar,et al.  PELE: Power efficient legitimate eavesdropping via jamming in UAV communications , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[3]  Lizhong Zheng,et al.  Fundamental Limits of Communication With Low Probability of Detection , 2015, IEEE Transactions on Information Theory.

[4]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[5]  Kandeepan Sithamparanathan,et al.  Optimal LAP Altitude for Maximum Coverage , 2014, IEEE Wireless Communications Letters.

[6]  Youngnam Han,et al.  Optimal Resource Allocation for Packet Delay Minimization in Multi-Layer UAV Networks , 2017, IEEE Communications Letters.

[7]  Xiangyun Zhou,et al.  Covert communication with finite blocklength in AWGN channels , 2017, 2017 IEEE International Conference on Communications (ICC).

[8]  Kaigui Bian,et al.  UAV Relaying: Power Allocation and Trajectory Optimization Using Decode-and-Forward Protocol , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[11]  Derrick Wing Kwan Ng,et al.  Secure Routing With Power Optimization for Ad-Hoc Networks , 2018, IEEE Transactions on Communications.

[12]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[13]  Tong-Xing Zheng,et al.  Physical Layer Security in Random Cellular Networks , 2016, SpringerBriefs in Computer Science.

[14]  Wei Zhang,et al.  Coverage Probability Analysis of UAV Cellular Networks in Urban Environments , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[15]  Tony Q. S. Quek,et al.  Secure UAV communication in the presence of active eavesdropper (invited paper) , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[16]  Saikat Guha,et al.  Multi-Hop Routing in Covert Wireless Networks , 2018, IEEE Transactions on Wireless Communications.

[17]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[18]  Mayank Bakshi,et al.  Reliable deniable communication: Hiding messages in noise , 2013, 2013 IEEE International Symposium on Information Theory.

[19]  Xiangyun Zhou,et al.  Secure Transmission in Linear Multihop Relaying Networks , 2017, IEEE Transactions on Wireless Communications.

[20]  Feng Liu,et al.  Outage Constrained Secrecy Throughput Maximization for DF Relay Networks , 2015, IEEE Transactions on Communications.

[21]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[22]  Xiaohong Jiang,et al.  SOQR: Secure Optimal QoS Routing in Wireless Ad Hoc Networks , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).

[23]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[24]  Jia-Cheng Jiang,et al.  UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions , 2019, IEEE Wireless Communications.

[25]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[26]  Sofie Pollin,et al.  Optimal UAV Positioning for Terrestrial-Aerial Communication in Presence of Fading , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[27]  Song Jin,et al.  Optimal Node Placement and Resource Allocation for UAV Relaying Network , 2018, IEEE Communications Letters.

[28]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[29]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[30]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[31]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[32]  Xiangyun Zhou,et al.  Covert Communication in Fading Channels under Channel Uncertainty , 2017, 2017 IEEE 85th Vehicular Technology Conference (VTC Spring).

[34]  Victor C. M. Leung,et al.  Modeling and Performance Analysis of UAV-Assisted Cellular Networks in Isolated Regions , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[35]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[36]  Lingyang Song,et al.  Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.

[37]  Martin Haenggi,et al.  Bandwidth- and power-efficient routing in linear wireless networks , 2006, IEEE Transactions on Information Theory.

[38]  Jie Xu,et al.  UAV-Enabled Broadcast Channel: Trajectory Design and Capacity Characterization , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[39]  Baoyun Wang,et al.  Proactive Eavesdropping in UAV-Aided Suspicious Communication Systems , 2019, IEEE Transactions on Vehicular Technology.

[40]  Walid Saad,et al.  Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.

[41]  Youngnam Han,et al.  Optimal Resource Allocation for Non-Orthogonal Transmission in UAV Relay Systems , 2018, IEEE Wireless Communications Letters.

[42]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.