Gridded UAV Swarm for Secrecy Rate Maximization with Unknown Eavesdropper

This paper considers grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtain an optimal trajectory and jamming power allocation for each UAV enabling wideband single ray beamforming to improve the secrecy rate. Results obtained demonstrate the effectiveness of the proposed UAV-aided jamming scheme as well as the optimal number of UAVs in the swarm necessary to observe a saturation effect in the secrecy rate. We also show the optimal radius of the unknown but constrained location of the eavesdropper.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Lingfeng Shen,et al.  Iterative UAV Trajectory Optimization for Physical Layer Secure Mobile Relaying , 2018, 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).

[3]  Muhammad R. A. Khandaker,et al.  Masked Beamforming in the Presence of Energy-Harvesting Eavesdroppers , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[5]  Jun Li,et al.  UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization , 2019, IEEE Transactions on Vehicular Technology.

[6]  Mathini Sellathurai,et al.  UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location , 2020, IEEE Access.

[7]  Ibrahim Kocaman Distributed Beamforming in a Swarm UAV Network , 2008 .

[8]  Zhiyang Li,et al.  Joint Trajectory and Communication Design for Secure UAV Networks , 2019, IEEE Communications Letters.

[9]  Muhammad R. A. Khandaker,et al.  Interference MIMO Relay Channel: Joint Power Control and Transceiver-Relay Beamforming , 2012, IEEE Transactions on Signal Processing.

[10]  Gene H. Golub,et al.  Symmetric Tensors and Symmetric Tensor Rank , 2008, SIAM J. Matrix Anal. Appl..

[11]  Ning Ge,et al.  UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective , 2019, IEEE Access.

[12]  Zhiguo Ding,et al.  Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.

[13]  Kaare Brandt Petersen,et al.  The Matrix Cookbook , 2006 .

[14]  An Li,et al.  Mobile jammer-aided secure UAV communications via trajectory design and power control , 2018, China Communications.

[15]  Stephen P. Boyd,et al.  Recent Advances in Learning and Control , 2008, Lecture Notes in Control and Information Sciences.

[16]  Muhammad R. A. Khandaker,et al.  SWIPT in MISO Multicasting Systems , 2014, IEEE Wireless Communications Letters.

[17]  Mehdi Bennis,et al.  A Speculative Study on 6G , 2019, IEEE Wireless Communications.

[18]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[19]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[20]  Symeon Chatzinotas,et al.  Successive Convex Approximation Algorithms for Sparse Signal Estimation with Nonconvex Regularizations , 2018, 2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM).

[21]  Baoqing Li,et al.  Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints , 2019, IEEE Access.

[22]  Gregory H. Huff,et al.  An investigation of geolocation-aware beamforming algorithms for swarming UAVs , 2017, 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting.

[23]  Huiming Wang,et al.  Hybrid Cooperative Beamforming and Jamming for Physical-Layer Security of Two-Way Relay Networks , 2013, IEEE Transactions on Information Forensics and Security.

[24]  Ian F. Akyildiz,et al.  6G and Beyond: The Future of Wireless Communications Systems , 2020, IEEE Access.

[25]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.