Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications

In this correspondence, covert air-to-ground communication is investigated to hide the wireless transmission from unmanned aerial vehicle (UAV). The warden's total detection error probability with limited observations is first analyzed. Considering the location uncertainty of the warden, a robust resource allocation and UAV trajectory optimization problem with worst-case covertness constraint is then formulated to maximize the average covert rate. To solve this optimization problem, we propose a block coordinate descent method based iterative algorithm to optimize the time slot allocation, power allocation and trajectory alternately. Numerical results demonstrate the effectiveness of the proposed algorithm in covert communication for UAVs.

[1]  Jun Li,et al.  Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications , 2018, IEEE Transactions on Signal Processing.

[2]  Saeedeh Parsaeefard,et al.  Analytical Channel Models for Millimeter Wave UAV Networks Under Hovering Fluctuations , 2019, IEEE Transactions on Wireless Communications.

[3]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.

[4]  Qingqing Wu,et al.  Accessing From the Sky: A Tutorial on UAV Communications for 5G and Beyond , 2019, Proceedings of the IEEE.

[5]  Swades De,et al.  Impact of Hovering Inaccuracy on UAV-Aided RFET , 2019, IEEE Communications Letters.

[6]  Zhetao Li,et al.  Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks , 2019, IEEE Transactions on Communications.

[7]  Halim Yanikomeroglu,et al.  3-D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users With Different QoS Requirements , 2017, IEEE Wireless Communications Letters.

[8]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[9]  Iain B. Collings,et al.  Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[10]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[11]  Feng Shu,et al.  Optimal Detection of UAV's Transmission With Beam Sweeping in Covert Wireless Networks , 2020, IEEE Transactions on Vehicular Technology.

[12]  Derrick Wing Kwan Ng,et al.  Multi-Antenna Covert Communications in Random Wireless Networks , 2019, IEEE Transactions on Wireless Communications.

[13]  Jie Tang,et al.  Joint Precoding Optimization for Secure SWIPT in UAV-Aided NOMA Networks , 2020, IEEE Transactions on Communications.

[14]  Yunfei Chen,et al.  UAV-Relaying-Assisted Secure Transmission With Caching , 2019, IEEE Transactions on Communications.

[15]  Joonhyuk Kang,et al.  Secrecy-Aware Altitude Optimization for Quasi-Static UAV Base Station Without Eavesdropper Location Information , 2019, IEEE Communications Letters.

[16]  Hüseyin Arslan,et al.  A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.

[17]  Swades De,et al.  Optimal UAV-Aided RFET System Design in Presence of Hovering Inaccuracy , 2021, IEEE Transactions on Communications.

[18]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[19]  Donald F. Towsley,et al.  Hiding information in noise: fundamental limits of covert wireless communication , 2015, IEEE Communications Magazine.