Multi-UAV-assisted covert communications for secure content delivery in Internet of Things

被引:6
作者
Liu, Ye [1 ]
Na, Zhenyu [1 ,2 ]
Zhang, Yue [1 ]
Qin, Xiaofei [1 ]
Lin, Bin [1 ,3 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[2] Guangdong Prov Key Lab Aerosp Commun & Networking, Shenzhen 518055, Peoples R China
[3] Peng Cheng Lab, Shenzhen 518052, Peoples R China
基金
中国国家自然科学基金;
关键词
Multi-UAV; Internet of Things; Covert communication; Secure content delivery; Resource allocation; TRANSMIT POWER; OPTIMIZATION; DESIGN; ROBUST; SECRECY;
D O I
10.1016/j.comcom.2023.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) have found extensive applications in fast deploying Internet of Things in non-infrastructure areas due to their high maneuverability and robust networking. However, the open nature of wireless channels makes air-to-ground content delivery face serious security risks. A multi-UAV-assisted covert communication system model is proposed in this paper, which focuses on the secure content delivery from multiple UAVs to multiple legitimate ground users (LGUs) under the detection of an illegal interceptor. Our objective is to maximize the average covert rate (ACR) for all LGUs by synergistically optimizing UAV-LGU scheduling, multi-UAV transmit power, and multi-UAV trajectory, while complying with the covertness constraint. To cope with the formulated non-convex problem, we divide it into three sub-problems, and then propose an iterative algorithm to alternately solve them. Simulation results demonstrate that the proposed algorithm can significantly improve the ACR of the system by adaptively adjusting the Multi-UAV trajectory, flight speed and transmit power, while meeting the covertness constraint. Moreover, compared with the two benchmark schemes, the proposed joint optimization scheme can enhance the ACR by 5% and 31%, respectively, when the flight period is 100 s.
引用
收藏
页码:138 / 146
页数:9
相关论文
共 36 条
  • [31] Multi-Antenna Covert Communications in Random Wireless Networks
    Zheng, Tong-Xing
    Wang, Hui-Ming
    Ng, Derrick Wing Kwan
    Yuan, Jinhong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (03) : 1974 - 1987
  • [32] Safeguarding Decentralized Wireless Networks Using Full-Duplex Jamming Receivers
    Zheng, Tong-Xing
    Wang, Hui-Ming
    Yang, Qian
    Lee, Moon Ho
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (01) : 278 - 292
  • [33] Seeing Isn't Believing: QoE Evaluation for Privacy-Aware Users
    Zhou, Liang
    Wu, Dan
    Wei, Xin
    Dong, Zhenjiang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2019, 37 (07) : 1656 - 1665
  • [34] Zhou W., 2023, IEEE T VEHIC TECH, VPP, P1
  • [35] Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications
    Zhou, Xiaobo
    Yan, Shihao
    Hu, Jinsong
    Sun, Jiande
    Li, Jun
    Shu, Feng
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (16) : 4276 - 4290
  • [36] UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization
    Zhou, Xiaobo
    Wu, Qingqing
    Yan, Shihao
    Shu, Feng
    Li, Jun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 4069 - 4073