Joint 3-D Trajectory and Power Optimization for Dual-UAV-Assisted Short-Packet Covert Communications

被引:2
作者
Liu, Pengpeng [1 ]
Si, Jiangbo [1 ]
Li, Zan [1 ]
Al-Dhahir, Naofal [2 ]
Gao, Yang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[3] Air Force Engn Univ, Coll Informat & Nav, Xian 710071, Peoples R China
关键词
Autonomous aerial vehicles; Three-dimensional displays; Jamming; Ultra reliable low latency communication; Trajectory optimization; Silicon; Lifting equipment; 3-D trajectory optimization; covert communication; power optimization; short packet; unmanned aerial vehicles (UAVs); TRANSMIT POWER; NETWORKS; ALLOCATION;
D O I
10.1109/JIOT.2024.3357456
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates a dual-unmanned aerial vehicle (UAV)-assisted short-packet covert communication system in the presence of a warden. Specifically, one flying UAV serves as the base station to transmit covert information to a legitimate ground user, and the other flying UAV is deployed as a cooperative jammer to transmit artificial noise against detection by a warden. Considering a more practical scenario, where only imperfect location information of the warden is known at both UAVs, we jointly optimize both UAVs' transmit powers and 3-D trajectories to maximize the average covert transmission rate under the constraints of both UAVs' mobility, transmit powers and warden's detection error probability (DEP). On the one hand, the incomplete Gamma function involved in warden's DEP makes the covertness constraint intractable for further analysis. To facilitate the design, warden's DEP is lower bounded by Pinsker's inequality. On the other hand, the formulated optimization problem is intractable to solve directly owing to the multiple highly coupled variables and the uncertainty of the warden's location. The alternating optimization algorithm combined with the successive convex approximation and $\mathcal {S}$ -procedure techniques is leveraged to solve three optimization subproblems iteratively. Numerical results reveal that superior performance can be achieved by employing the proposed joint optimization of both UAVs' transmit powers and 3-D trajectories algorithm compared with the traditional 2-D trajectory optimization algorithm and the scheme without the assistance of the cooperative UAV.
引用
收藏
页码:17388 / 17401
页数:14
相关论文
共 41 条
[1]   Convex Optimization: Algorithms and Complexity [J].
不详 .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2015, 8 (3-4) :232-+
[2]  
[Anonymous], 2017, Rep. 36.777
[3]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[4]  
Boyd S., 2004, Convex Optimization
[5]   UAV-Relayed Covert Communication Towards a Flying Warden [J].
Chen, Xinying ;
Sheng, Min ;
Zhao, Nan ;
Xu, Wei ;
Niyato, Dusit .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (11) :7659-7672
[6]   Secure Transmission via Power Allocation in NOMA-UAV Networks With Circular Trajectory [J].
Chen, Xinying ;
Yang, Zhutian ;
Zhao, Nan ;
Chen, Yunfei ;
Wang, Jingjing ;
Ding, Zhiguo ;
Yu, F. Richard .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (09) :10033-10045
[7]   Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication [J].
Du, Hongyang ;
Niyato, Dusit ;
Xie, Yuan-Ai ;
Cheng, Yanyu ;
Kang, Jiawen ;
Kim, Dong In .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (10) :2962-2979
[8]   Securing the UAV-Aided Non-Orthogonal Downlink in the Face of Colluding Eavesdroppers [J].
Fu, Huabo ;
Sheng, Zhichao ;
Nasir, Ali A. ;
Muqaibel, Ali H. ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) :6837-6842
[9]   Beamforming Design for Multiuser uRLLC With Finite Blocklength Transmission [J].
He, Shiwen ;
An, Zhenyu ;
Zhu, Jianyue ;
Zhang, Jian ;
Huang, Yongming ;
Zhang, Yaoxue .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (12) :8096-8109
[10]   Resource Allocation for Secure UAV-Assisted SWIPT Systems [J].
Hong, Xianggong ;
Liu, Pengpeng ;
Zhou, Fuhui ;
Guo, Sen ;
Chu, Zheng .
IEEE ACCESS, 2019, 7 :24248-24257