Abstract

In an UAV‐ (unmanned aerial vehicle‐) aided relaying system, the transmitted signal is exposed to free space in two transmission hops which may be overheard by eavesdroppers. Accordingly, physical layer security should be exploited to improve information security. This paper analyzes both (security and reliability) performance aspects of such a system where only one UAV among multiple UAVs, all capable of harvesting energy from radio frequency signals, is adopted. Towards this end, the tight approximated and exact closed‐form expressions of the outage probability at the legitimate destination and the intercept probability at the eavesdropper are first derived. Then, Monte‐Carlo simulations are conducted to verify the derived expressions. Based on these expressions, the protected zone of the selected UAV is also proposed through an exhaustive search. Finally, various results are provided to illustrate the impact of key operation parameters on the system performance and the efficacy of the UAV selection.

Highlights

  • Unmanned aerial vehicles (UAVs) have advantages of high mobility, low cost, and on-demand deployment and, have found multiple important applications in recent years, especially in the telecommunications sector [1]

  • Are the key contributions of our study: (i) Propose an UAV selection scheme to adopt only one UAV as a relay from a swarm of UAVs, all capable of harvesting energy from radio frequency (RF) signals, for reliableand-secured communications of the legitimate source-destination pair under the eavesdropping of the wire-tapper without a heavy burden of transmission bandwidth, power consumption, and signal synchronization (ii) Suggest the tight approximated and exact closedform expressions (in the sequel, two terms (“approximated closed-form expression” and “exact closedform expression”) are used frequently. The former refers to the expression which is represented in the explicit form and derived from some approximated quantities. The latter refers to the expression which is represented in the explicit form and derived from all exact quantities) of outage probability (OP) and intercept probability (IP) for the energy harvesting (EH) UAV selection under consideration of different availability degrees of wire-tapped information, path-loss, and Rayleigh fading for air-to-ground communication links (iii) Find the protected zone of the selected UAV to provide reliable communications of the legitimate source-destination pair and to secure these communications against the eavesdropper (iv) Provide various results to have insights into the impact of the main parameters of transmit power, time splitting factor, and the position of the selected UAV on the connection reliability and the secrecy performance of UAV-aided relaying systems

  • The secrecy performance of the UAVaided relaying system is examined in terms of the intercept probability

Read more

Summary

Introduction

Unmanned aerial vehicles (UAVs) have advantages of high mobility, low cost, and on-demand deployment and, have found multiple important applications in recent years, especially in the telecommunications sector [1]. The former refers to the expression which is represented in the explicit form (i.e., no integral is left) and derived from some approximated quantities The latter refers to the expression which is represented in the explicit form and derived from all exact quantities) of OP and IP for the EH UAV selection under consideration of different availability degrees of wire-tapped information, path-loss, and Rayleigh fading for air-to-ground communication links (iii) Find the protected zone of the selected UAV to provide reliable communications of the legitimate source-destination pair and to secure these communications against the eavesdropper (iv) Provide various results to have insights into the impact of the main parameters of transmit power, time splitting factor, and the position of the selected UAV on the connection reliability and the secrecy performance of UAV-aided relaying systems.

System Model
Scenario 1: E Receives Signals Only from S in the Second
Performance Analysis
Protected Zone of UAVs
Illustrative Results
Conclusions
Proof of Lemma 2
Proof of Lemma 3
Outlines of Derivations for Heterogeneous Locations of UAVs
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.