Multi-UAV-assisted covert communications for secure content delivery in Internet of Things

被引:6
作者
Liu, Ye [1 ]
Na, Zhenyu [1 ,2 ]
Zhang, Yue [1 ]
Qin, Xiaofei [1 ]
Lin, Bin [1 ,3 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[2] Guangdong Prov Key Lab Aerosp Commun & Networking, Shenzhen 518055, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518052, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-UAV; Internet of Things; Covert communication; Secure content delivery; Resource allocation; TRANSMIT POWER; OPTIMIZATION; DESIGN; ROBUST; SECRECY;
D O I
10.1016/j.comcom.2023.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) have found extensive applications in fast deploying Internet of Things in non-infrastructure areas due to their high maneuverability and robust networking. However, the open nature of wireless channels makes air-to-ground content delivery face serious security risks. A multi-UAV-assisted covert communication system model is proposed in this paper, which focuses on the secure content delivery from multiple UAVs to multiple legitimate ground users (LGUs) under the detection of an illegal interceptor. Our objective is to maximize the average covert rate (ACR) for all LGUs by synergistically optimizing UAV-LGU scheduling, multi-UAV transmit power, and multi-UAV trajectory, while complying with the covertness constraint. To cope with the formulated non-convex problem, we divide it into three sub-problems, and then propose an iterative algorithm to alternately solve them. Simulation results demonstrate that the proposed algorithm can significantly improve the ACR of the system by adaptively adjusting the Multi-UAV trajectory, flight speed and transmit power, while meeting the covertness constraint. Moreover, compared with the two benchmark schemes, the proposed joint optimization scheme can enhance the ACR by 5% and 31%, respectively, when the flight period is 100 s.
引用
收藏
页码:138 / 146
页数:9
相关论文
共 36 条
  • [1] A Review of Metaverse's Definitions, Architecture, Applications, Challenges, Issues, Solutions, and Future Trends
    Al-Ghaili, Abbas M.
    Kasim, Hairoladenan
    Al-Hada, Naif Mohammed
    Bin Hassan, Zainuddin
    Othman, Marini
    Tharik, Jakir Hussain
    Kasmani, Rafiziana Md.
    Shayea, Ibraheem
    [J]. IEEE ACCESS, 2022, 10 : 125835 - 125866
  • [2] [Anonymous], 1996, INF HID 1 INT WORKSH
  • [3] Limits of Reliable Communication with Low Probability of Detection on AWGN Channels
    Bash, Boulat A.
    Goeckel, Dennis
    Towsley, Don
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) : 1921 - 1930
  • [4] Secure Transmission via Beamforming Optimization for NOMA Networks
    Cao, Yang
    Zhao, Nan
    Chen, Yunfei
    Jin, Minglu
    Ding, Zhiguo
    Li, Yonghui
    Yu, F. Richard
    [J]. IEEE WIRELESS COMMUNICATIONS, 2020, 27 (01) : 193 - 199
  • [5] Robust Trajectory and Transmit Power Design for Secure UAV Communications
    Cui, Miao
    Zhang, Guangchi
    Wu, Qingqing
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) : 9042 - 9046
  • [6] Edge Intelligence-Based Ultra-Reliable and Low-Latency Communications for Digital Twin-Enabled Metaverse
    Dang Van Huynh
    Khosravirad, Saeed R.
    Masaracchia, Antonino
    Dobre, Octavia A.
    Duong, Trung Q.
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (08) : 1733 - 1737
  • [7] Robust trajectory and communication design for angle-constrained multi-UAV communications in the presence of jammers
    Gao, Yufang
    Wu, Yang
    Cui, Zhichao
    Yang, Wendong
    Hu, Guojie
    Xu, Shiming
    [J]. CHINA COMMUNICATIONS, 2022, 19 (02) : 131 - 147
  • [8] Polarization Sensitive Array Based Physical-Layer Security
    Gong, Shiqi
    Xing, Chengwen
    Chen, Sheng
    Fei, Zesong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) : 3964 - 3981
  • [9] Secure Communications for Dual-Polarized MIMO Systems
    Gong, Shiqi
    Xing, Chengwen
    Chen, Sheng
    Fei, Zesong
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2017, 65 (16) : 4177 - 4192
  • [10] Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey
    Hamamreh, Jehad M.
    Furqan, Haji M.
    Arslan, Huseyin
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1773 - 1828