Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems

With the explosive increase in demand for wireless communication, the issue of wireless communication security has also become a growing concern. In this paper, we investigate a novel covert communication for unmanned aerial vehicle (UAV)-assisted uplink rate-splitting multiple access (RSMA) systems, where a UAV adopts the rate-splitting (RS) strategy to increase the total transmission rate while avoiding deteriorating the covert transmission of a ground user. In the proposed system, a ground user and a UAV adopt the RSMA scheme to simultaneously communicate with a base station surveilled by an evil monitor. The UAV acts as both the transmitter and the friendly jammer to cover the ground user’s transmission with random power. To maximize the expected sum rate (ESR), we first study the RS strategy and obtain the optimal power allocation factor. Then, the closed-form of minimum detection error probability (DEP), ESR, and optimal target rate of the UAV are derived. Constrained by the minimum DEP and expected covert rate (ECR), we maximize the ESR by optimizing the position and target rate of the UAV. Numerical results show that the proposed scheme outperforms the traditional NOMA systems in terms of ESR with the same DEP and ECR.

[1]  Shihao Yan,et al.  Optimal Geometric Solutions to UAV-Enabled Covert Communications in Line-of-Sight Scenarios , 2022, IEEE Transactions on Wireless Communications.

[2]  N. I. Miridakis,et al.  Rate-Splitting Multiple Access-Enabled Security Analysis in Cognitive Satellite Terrestrial Networks , 2022, IEEE Transactions on Vehicular Technology.

[3]  Ruonan Zhang,et al.  An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks , 2022, Remote. Sens..

[4]  Ruonan Zhang,et al.  Outage-driven link selection for secure buffer-aided networks , 2022, Science China Information Sciences.

[5]  Dawei Wang,et al.  Cooperative Hybrid Nonorthogonal Multiple Access-Based Mobile-Edge Computing in Cognitive Radio Networks , 2022, IEEE Transactions on Cognitive Communications and Networking.

[6]  T. Tsiftsis,et al.  A New Rate Splitting Strategy for Uplink CR-NOMA Systems , 2022, IEEE Transactions on Vehicular Technology.

[7]  B. Liu,et al.  Channel Inversion Power Control Aided Covert Communications in Uplink NOMA Systems , 2022, IEEE Wireless Communications Letters.

[8]  Zan Li,et al.  Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization , 2020, IEEE Transactions on Wireless Communications.

[9]  Naofal Al-Dhahir,et al.  Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks , 2021, IEEE Transactions on Communications.

[10]  Naofal Al-Dhahir,et al.  Secure and Energy Efficient Transmission for RSMA-Based Cognitive Satellite-Terrestrial Networks , 2021, IEEE Wireless Communications Letters.

[11]  Julian Cheng,et al.  Supporting IoT With Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks , 2021, IEEE Internet of Things Journal.

[12]  Iain B. Collings,et al.  Optimal Transmit Power and Flying Location for UAV Covert Wireless Communications , 2020, IEEE Journal on Selected Areas in Communications.

[13]  Feng Shu,et al.  UAV-Enabled Covert Wireless Data Collection , 2019, IEEE Journal on Selected Areas in Communications.

[14]  Gui Zhou,et al.  Rate-Splitting Multiple Access for Multi-antenna Downlink Communication Systems: Spectral and Energy Efficiency Tradeoff , 2020, IEEE Transactions on Wireless Communications.

[15]  Walid Saad,et al.  Sum-Rate Maximization of Uplink Rate Splitting Multiple Access (RSMA) Communication , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[16]  Min Lin,et al.  Joint Beamforming and Power Allocation for Satellite-Terrestrial Integrated Networks With Non-Orthogonal Multiple Access , 2019, IEEE Journal of Selected Topics in Signal Processing.

[17]  Jun Li,et al.  Achieving Covert Wireless Communications Using a Full-Duplex Receiver , 2018, IEEE Transactions on Wireless Communications.

[18]  Saikat Guha,et al.  Covert Communication in the Presence of an Uninformed Jammer , 2016, IEEE Transactions on Wireless Communications.

[19]  Boulat A. Bash,et al.  Limits of Reliable Communication with Low Probability of Detection on AWGN Channels , 2012, IEEE Journal on Selected Areas in Communications.

[20]  Gaston H. Gonnet,et al.  On the LambertW function , 1996, Adv. Comput. Math..