Joint Information-Theoretic Secrecy and Covertness for UAV-Assisted Wireless Transmission With Finite Blocklength

被引:7
作者
Liu, Pengpeng [1 ]
Li, Zan [1 ]
Si, Jiangbo [1 ]
Al-Dhahir, Naofal [2 ]
Gao, Yang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[3] Air Force Engn Univ, Coll Informat & Nav, Xian 710071, Peoples R China
基金
中国博士后科学基金;
关键词
Optimization; Wireless communication; Three-dimensional displays; Jamming; Trajectory; Security; Physical layer security; Unmanned aerial vehicles; physical layer security; covert communication; finite blocklength; 3D trajectory optimization; power optimization; RESOURCE-ALLOCATION; TRAJECTORY DESIGN; POWER; COMMUNICATION; OPTIMIZATION; PROBABILITY; THROUGHPUT; NETWORKS; SYSTEM;
D O I
10.1109/TVT.2023.3254882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study a novel joint information-theoretic secrecy and covertness model for an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which an UAV delivers classified information to a ground user (Bob) in the presence of two unauthorized users (Eve and Willie). Specifically, Eve tries to decode the legitimate information while Willie tries to detect if the UAV's transmission is present or not. Firstly, we assume that the perfect location knowledge of both Eve and Willie is known at the UAV. In this scenario, to guarantee security and covertness, the average secrecy rate maximization problem is formulated via joint design of the UAV's transmit power and three dimensional (3D) trajectory under Willie's covertness constraint. Technically speaking, the optimization problem is non-convex and mathematically intractable to tackle owing to the coupling of multiple variables. To address this non-convex problem, an iterative alternating optimization (AO) algorithm is developed with the assistance of the successive convex approximation (SCA) technique. After that, we extend the system model to both Eve's and Willie's imperfect location knowledge case, which is more sophisticated compared to the perfect location knowledge case due to the uncertain location constraints. We still utilize the iterative AO algorithm combined with SCA and S-procedure techniques to cope with the nonconvex problem. Numerical results indicate that our proposed 3D optimization algorithm performs better than the conventional two dimensional (2D) scheme and the benchmark scheme for both perfect and imperfect location knowledge cases.
引用
收藏
页码:10187 / 10199
页数:13
相关论文
共 43 条
[1]   Convex Optimization: Algorithms and Complexity [J].
不详 .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2015, 8 (3-4) :232-+
[2]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[3]  
Boyd SP., 2004, Convex optimization, DOI 10.1017/CBO9780511804441
[4]   UAV-Relayed Covert Communication Towards a Flying Warden [J].
Chen, Xinying ;
Sheng, Min ;
Zhao, Nan ;
Xu, Wei ;
Niyato, Dusit .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (11) :7659-7672
[5]   UAV-Aided Covert Communication With a Multi-Antenna Jammer [J].
Chen, Xinying ;
Zhang, Ning ;
Tang, Jie ;
Liu, Mingqian ;
Zhao, Nan ;
Niyato, Dusit .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (11) :11619-11631
[6]   Robust Trajectory and Transmit Power Design for Secure UAV Communications [J].
Cui, Miao ;
Zhang, Guangchi ;
Wu, Qingqing ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :9042-9046
[7]   Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks [J].
Fang, Sisai ;
Chen, Gaojie ;
Li, Yonghui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (02) :276-280
[8]   An ADMM-Based Optimization Method for URLLC-Enabled UAV Relay System [J].
Feng, Renhai ;
Li, Zeping ;
Wang, Qing ;
Huang, Jianli .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (06) :1123-1127
[9]   Covert Communication and Secure Transmission Over Untrusted Relaying Networks in the Presence of Multiple Wardens [J].
Forouzesh, Moslem ;
Azmi, Paeiz ;
Kuhestani, Ali ;
Yeoh, Phee Lep .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (06) :3737-3749
[10]   Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint [J].
Hayat, Samira ;
Yanmaz, Evsen ;
Muzaffar, Raheeb .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (04) :2624-2661