Abstract

The broadcast nature of air-to-ground line-of-sight (LoS) wireless channel imposes a great challenge in secure unmanned aerial vehicle (UAV) communications. To address this issue, this paper investigates UAV-ground communications from the physical-layer security perspective. Specifically, the investigated scenario includes a UAV serving as the base station (BS) that transmits confidential signals to a legitimate ground user, and there are multiple eavesdroppers on the ground with unknown position information. To further enhance the secrecy performance of the UAV-ground communications, an idle UAV can be employed to serve as a friendly jammer, which can transmit jamming signals to confuse the eavesdroppers. In our proposed strategy, the flying trajectory and the transmit power for both the UAVs are jointly optimized by maximizing the worst-case secrecy rate (WCSR) of the system. Considering the intractability of the formulated non-convex problem, we further provide a block coordinate descent-based iterative optimization method. Simulations verify that our proposed algorithm can significantly improve the average WCSR in comparison with the existing works.

Highlights

  • Thanks to the low cost and high flexibility, unmanned aerial vehicles (UAVs) have gained increasing interests in the areas of emergency services, intelligent transportation, etc

  • As the UAV-to-ground channels usually exhibit line-of-sight (LoS) links, UAV is regarded as an attractive candidate wireless service provider [4]

  • We investigate the physical layer security (PLS) issue in UAV communications with multiple location-unknown eavesdroppers

Read more

Summary

INTRODUCTION

Thanks to the low cost and high flexibility, unmanned aerial vehicles (UAVs) have gained increasing interests in the areas of emergency services, intelligent transportation, etc. With the help of the jammer, it can be guaranteed that, during most of the flight, the UAV-to-destination link has a greater chance to be better than the UAV-to-eavesdropper link In such a scenario, and with inexact eavesdropper location information, it is a meaningful and challenging issue to jointly optimize the trajectory and transmit power of both UAVs. To the best of our knowledge, this issue has yet not been addressed. Thanks to the mobility of UAVs, the source UAV is inclined to move close to the destination to enhance the legitimate channel and achieve higher transmit rate, while the jammer UAV tends to hover above the Eves to obtain better jamming performance. Log RD[n] and log REk [n] represent the achievable rate of D and Eve k at time slot n, respectively

PROBLEM FORMULATION
1: Initialization: source
SIMULATIONS
Findings
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.