Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer

In this paper, we examine the secrecy performance of an unmanned aerial vehicle (UAV) equipped with an air-to-ground jammer and a ground communications network comprising a legitimate transmitter-receiver pair and an eavesdropper. We consider two scenarios: stationary UAV jammer and mobile UAV jammer. In the first scenario, we derive the secrecy outage probability (SOP) of the legitimate link for fixed distances between the UAV jammer, legitimate nodes and eavesdropper. Based on the SOP, we evaluate the jamming coverage of the UAV jammer and propose a two-step optimization problem to determine the optimal UAV location when the eavesdropper location is unknown. In the mobile UAV scenario, we design a new algorithm to provide jamming coverage to a given target area with minimum number of stopping points. Simulation and analytical results show that a UAV jammer can significantly improve the jamming coverage compared with a ground jammer.

[1]  Kandeepan Sithamparanathan,et al.  Optimal LAP Altitude for Maximum Coverage , 2014, IEEE Wireless Communications Letters.

[2]  Jianfeng Ma,et al.  Cooperative Jammer Placement for Physical Layer Security Enhancement , 2016, IEEE Network.

[3]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[4]  Halim Yanikomeroglu,et al.  Efficient 3-D placement of an aerial base station in next generation cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[5]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[6]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Yingbin Liang,et al.  Multiple-Input Multiple-Output Gaussian Broadcast Channels With Common and Confidential Messages , 2009, IEEE Transactions on Information Theory.

[9]  Matthieu R. Bloch,et al.  Friendly Jamming for Wireless Secrecy , 2010, 2010 IEEE International Conference on Communications.

[10]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Aleksandr Ometov,et al.  Effects of Heterogeneous Mobility on D2D- and Drone-Assisted Mission-Critical MTC in 5G , 2017, IEEE Communications Magazine.

[12]  Walid Saad,et al.  Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.

[13]  A. Lee Swindlehurst,et al.  Secure Relay and Jammer Selection for Physical Layer Security , 2015, IEEE Signal Processing Letters.

[14]  Halim Yanikomeroglu,et al.  3-D Placement of an Unmanned Aerial Vehicle Base Station (UAV-BS) for Energy-Efficient Maximal Coverage , 2017, IEEE Wireless Communications Letters.