Physical Layer Security in UAV Systems: Challenges and Opportunities

被引:239
作者
Sun, Xiaofang [1 ,2 ]
Ng, Derrick Wing Kwan [3 ]
Ding, Zhiguo [4 ]
Xu, Yanqing [1 ,2 ]
Zhong, Zhangdui [1 ,2 ]
机构
[1] State Key Tab Rail Traff Control & Safety, Beijing, Peoples R China
[2] Beijing Engn Res Ctr High Speed Railway Broadband, Beijing, Peoples R China
[3] Univ New South Wales, Sydney, NSW, Australia
[4] Univ Manchester, Manchester, Lancs, England
基金
欧盟地平线“2020”; 英国工程与自然科学研究理事会; 澳大利亚研究理事会;
关键词
Wireless communication; Eavesdropping; Network security; Physical layer security; Unmanned aerial vehicles; Receivers; Trajectory; 5G mobile communication; NETWORKS;
D O I
10.1109/MWC.001.1900028
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicle (UAV) wireless communications has experienced an upsurge of interest in both military and civilian applications, due to its high mobility, low cost, on-demand deployment, and inherent line-of-sight air-to-ground channels. However, these benefits also make UAV wireless communication systems vulnerable to malicious eavesdropping attacks. In this article, we aim to examine the physical layer security issues in UAV systems. In particular, passive and active eavesdropping are two primary types of attack in UAV systems. We provide an overview on emerging techniques, such as trajectory design, resource allocation, and cooperative UAVs, to fight against both types of eavesdropping in UAV wireless communication systems. Moreover, the applications of non-orthogonal multiple access, multiple-input multiple-output, and millimeter-wave in UAV systems are also proposed to improve the system spectral efficiency and to guarantee security simultaneously. Finally, we discuss some potential research directions and challenges in terms of physical layer security in UAV systems.
引用
收藏
页码:40 / 47
页数:8
相关论文
共 15 条
[1]  
3GPP, 2017, TR 36.777
[2]   Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling [J].
Cai, Yunlong ;
Cui, Fangyu ;
Shi, Qingjiang ;
Zhao, Minjian ;
Li, Geoffrey Ye .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) :1972-1985
[3]   Robust Secure Transmission in MISO Channels Based on Worst-Case Optimization [J].
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (04) :1696-1707
[4]   UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel [J].
Li, An ;
Wu, Qingqing ;
Zhang, Rui .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2019, 8 (01) :181-184
[5]   Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper [J].
Liu, Chenxi ;
Lee, Jemin ;
Quek, Tony Q. S. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (06) :2919-2931
[6]   Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey [J].
Mukherjee, Amitav ;
Fakoorian, S. Ali A. ;
Huang, Jing ;
Swindlehurst, A. Lee .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (03) :1550-1573
[7]   Physical Layer Security in Wireless Cooperative Relay Networks: State of the Art and Beyond [J].
Rodriguez, Leonardo Jimenez ;
Tran, Nghi H. ;
Duong, Trung Q. ;
Le-Ngoc, Tho ;
Elkashlan, Maged ;
Shetty, Sachin .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (12) :32-+
[8]  
Sun X., 2018, P IEEE GLOBECOM WKSP
[9]  
Wong VWS, 2017, KEY TECHNOLOGIES FOR 5G WIRELESS SYSTEMS, P1, DOI 10.1017/9781316771655
[10]   Secure Massive MIMO Transmission With an Active Eavesdropper [J].
Wu, Yongpeng ;
Schober, Robert ;
Ng, Derrick Wing Kwan ;
Xiao, Chengshan ;
Caire, Giuseppe .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (07) :3880-3900