Abstract

This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source (Alice) sends confidential information to a destination (Bob) via an energy-constrained UAV-mounted amplify-and-forward (AF) relay in the presence of a ground eavesdropper (Eve). We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous wireless information and power transfer (SWIPT) at the UAV-mounted relay to enhance physical-layer security (PLS) and transmission reliability. Assuming a low altitude UAV, we derive connection probability (CP), secrecy outage probability (SOP), instantaneous secrecy rate, and average secrecy rate (ASR) of the proposed protocol over Air-Ground (AG) channels, which are modeled as Rician fading with elevation-angel dependent parameters. By simulations, we verify our theoretical results and demonstrate significant performance improvement of our protocol, when compared to conventional transmission protocol with ground relaying and UAV-based transmission protocol without destination-assisted jamming. Finally, we evaluate the impacts of different system parameters and different UAV's locations on the proposed protocol in terms of ASR.

Highlights

  • Unmanned aerial vehicle (UAV) based wireless communications has recently attracted significant research attentions from both academia and industry

  • NUMERICAL RESULTS AND DISCUSSIONS we present simulation results of connection probability, secrecy outage probability, and average secrecy rate in order to validate our theoretical results in the paper

  • We demonstrate both reliability and security performance enhancements offered by the proposed UAV-relaying (UR) with destination-assisted cooperative jamming (CJ) transmission protocol, compared to the case using a ground node as a relay which located with the same horizontal distance from the legitimate nodes, namely the ground relaying (GR) scheme, and the case using UR but without destination jamming as two competitive benchmarks for the sake of comparison

Read more

Summary

INTRODUCTION

Unmanned aerial vehicle (UAV) based wireless communications has recently attracted significant research attentions from both academia and industry. Mamaghani et al proposed a D2D communications via an untrustworthy amplify-and-forward (AF) relaying with SWIPT in the presence of an external jammer They demonstrated the effectiveness of the jamming transmission in the studied three-phase time-switching based untrusted relay communications protocol and derived the closed-form expressions for various secrecy criteria in order to evaluate the secure communication [22], [25]. We adopt the destination-assisted cooperative jamming (CJ) and SWIPT techniques at the UAV-based relay for the PHY-security improvements as well as energy harvesting. We conduct simulations to i) verify our theoretical results, ii) identify the best location of the UAV-based relay that provides the best average secrecy rate, iii) evaluate impacts of different system parameters on the system performance in terms of reliability and security, and iv) validate the effectiveness and improvements of the proposed protocol, when compared to conventional transmission protocol with GR scheme and UAV-based relaying (UR) without destinationassisted jamming.

SYSTEM MODEL AND CHANNEL MODEL
CHANNEL MODEL
PERFORMANCE ANALYSIS
CONNECTION PROBABILITY
SECRECY OUTAGE PROBABILITY
INSTANTANEOUS SECRECY RATE Definition 2
ACHIEVABLE AVERAGE SECRECY RATE Definition 3
ASYMPTOTIC ASR ANALYSIS
NUMERICAL RESULTS AND DISCUSSIONS
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.