Abstract
In this work, we determine the physical layer security (PLS) metrics for ground-to-unmanned aerial vehicle (UAV) link in the presence of a suspicious UAV, which intends to overhear confidential transmission. The ground node sends data up to the UAV, which is positioned exactly above the transmitter and is able to spot an aerial eavesdropper according to the predefined horizontal and/or vertical guard distance. However, the attacker tries to intercept the channel transmission outside of marked zone. The main and wiretap channel are both assumed to be subjected to Fisher-Snedecor fading process. Under such system/channel scenario, the average secrecy capacity, lower bound of secrecy outage probability, intercept probability and non-zero secrecy capacity are characterized in terms of mathematical tractable forms. In addition, numerical and simulation results are presented to verify the correctness of theoretical ones. The impact of different positions of UAVs (their heights and mutual distances) and various conditions over channels on the secrecy transmission is analysed and discussed in details. The proposed PLS scenario can be utilized in Internet of Things environments, with UAV as a data collector, to enhance the security of energy-aware or disaster-stricken transmissions. All obtained results can be helpful in prediction of positioning UAV to achive low probability of interception of confidential communication.







Similar content being viewed by others
Availability of data and materials
The datasets generated during the current study are available from the corresponding author on reasonable request.
References
Alzahrani, B., Oubbati, O. S., Barnawi, A., Atiquzzaman, M., & Alghazzawi, D. (2020). UAV assistance paradigm: State-of-the-art in applications and challenges. Journal of Network and Computer Applications, 166, 102706. https://doi.org/10.1016/j.jnca.2020.102706
Pakrooh, R., & Bohlooli, A. (2021). A survey on unmanned aerial vehicles-assisted internet of things: A service-oriented classification. Wireless Personal Communications, 119, 1541–1575. https://doi.org/10.1007/s11277-021-08294-6
Zhao, N., Lu, W., Sheng, M., Chen, Y., Tang, J., Yu, F. R., & Wong, K.-K. (2019). UAV-assisted emergency networks in disasters. IEEE Wireless Communications, 26(1), 45–51. https://doi.org/10.1109/MWC.2018.1800160
Perera, T. D. P., Panic, S., Jayakody, D. N. K., Muthuchidambaranathan, P., & Li, J. (2020). A WPT-enabled UAV-assisted condition monitoring scheme for wireless sensor networks. IEEE Transactions on Intelligent Transportation Systems, 22(8), 5112–5126. https://doi.org/10.1109/TITS.2020.3018493
Kumar, S., Gurjar, D. S., Nguyen, H. H., & Arif, W. (2023). Wireless powered UAV-enabled communications over mixed LoS and NLoS channels. Wireless Personal Communications, 130(1), 191–218. https://doi.org/10.1007/s11277-023-10281-y
Bloch, M., & Barros, J. (2011). Physical-layer Security: from Information Theory to Security Engineering. Cambridge, UK: Cambridge University Press.
Shiu, Y.-S., Chang, S. Y., Wu, H.-C., Huang, S.C.-H., & Chen, H.-H. (2011). Physical layer security in wireless networks: A tutorial. IEEE Wireless Communications, 18(2), 66–74. https://doi.org/10.1109/MWC.2011.5751298
Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., & Zeng, K. (2019). Physical-layer security of 5G wireless networks for IoT: Challenges and opportunities. IEEE Internet of Things Journal, 6(5), 8169–8181. https://doi.org/10.1109/JIOT.2019.2927379
Stallings, W. (2017). Cryptography and Network Security, Principles and Practice (7th ed.). Harlow, England: Pearson Education.
Zhou, X., Song, L., & Zhang, Y. (2013). Physical Layer Security in Wireless Communications. Boca Raton, USA: CRC Press.
Sun, X., Ng, D. W. K., Ding, Z., Xu, Y., & Zhong, Z. (2019). Physical layer security in UAV systems: Challenges and opportunities. IEEE Wireless Communications, 26(5), 40–47. https://doi.org/10.1109/MWC.001.1900028
Lei, H., Wang, D., Park, K.-H., Ansari, I. S., Jiang, J., Pan, G., & Alouini, M.-S. (2019). Safeguarding UAV IoT communication systems against randomly located eavesdroppers. IEEE Internet of Things Journal, 7(2), 1230–1244. https://doi.org/10.1109/JIOT.2019.2953903
Bao, T., Yang, H.-C., & Hasna, M. O. (2019). Secrecy performance analysis of UAV-assisted relaying communication systems. IEEE Transactions on Vehicular Technology, 69(1), 1122–1126. https://doi.org/10.1109/TVT.2019.2952525
Yang, L., Long, X. & Zhang, J (2020). Secrecy analysis of UAV-aided relaying systems. In: 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), 1–5. IEEE, Antwerp, Belgium. https://doi.org/10.1109/VTC2020-Spring48590.2020.9129020
Le, C.-B., & Nguyen, S. Q. (2023). Evaluation of physical layer security for UAV-enabled wireless networks over \(\alpha\)-\(\kappa\)-\(\mu\) fading channels. Wireless Personal Communications, 128(3), 1671–1687. https://doi.org/10.1007/s11277-022-10014-7
Wu, Q., Mei, W., & Zhang, R. (2019). Safeguarding wireless network with UAVs: A physical layer security perspective. IEEE Wireless Communications, 26(5), 12–18. https://doi.org/10.1109/MWC.001.1900050
Liu, H., & Kwak, K.S.(2017). Secrecy outage probability of UAV-aided selective relaying networks. In: 2017 9th International Conference on Ubiquitous and Future Networks (ICUFN), 24–29. IEEE, Milan, Italy . https://doi.org/10.1109/ICUFN.2017.7993741
Tang, J., Chen, G., & Coon, J. P. (2019). Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers. IEEE Transactions on Information Forensics and Security, 14(11), 3026–3041. https://doi.org/10.1109/TIFS.2019.2912074
Zhou, F., Li, X., Alazab, M., Jhaveri, R. H., & Guo, K. (2022). Secrecy performance for RIS-based integrated satellite vehicle networks with a UAV relay and MRC eavesdropping. IEEE Transactions on Intelligent vehicles, 8(2), 1676–1685. https://doi.org/10.1109/TIV.2022.3225466
Guo, K., Li, X., Alazab, M., Jhaveri, R. H., & An, K. (2022). Integrated satellite multiple two-way relay networks: Secrecy performance under multiple eves and vehicles with non-ideal hardware. IEEE Transactions on Intelligent Vehicles, 8(2), 1307–1318. https://doi.org/10.1109/TIV.2022.3215011
Ma, R., Yang, W., Tao, L., Lu, X., Xiang, Z., & Liu, J. (2021). Covert communications with randomly distributed wardens in the finite blocklength regime. IEEE Transactions on Vehicular Technology, 71(1), 533–544. https://doi.org/10.1109/TVT.2021.3128600
Ma, R., Yang, W., Guan, X., Lu, X., Song, Y., & Chen, D. (2023). Covert mmwave communications with finite blocklength against spatially random wardens. IEEE Internet of Things Journal, 11(2), 3402–3416. https://doi.org/10.1109/JIOT.2023.3296414
Yoo, S. K., Cotton, S. L., Sofotasios, P. C., Matthaiou, M., Valkama, M., & Karagiannidis, G. K. (2017). The Fisher-Snedecor \(\cal{F}\) distribution: A simple and accurate composite fading model. IEEE Communications Letters, 21(7), 1661–1664. https://doi.org/10.1109/LCOMM.2017.2687438
Yao, Z., Cheng, W., Zhang, W., & Zhang, H. (2021). Resource allocation for 5G-UAV-based emergency wireless communications. IEEE Journal on Selected Areas in Communications, 39(11), 3395–3410. https://doi.org/10.1109/JSAC.2021.3088684
Kong, L., & Kaddoum, G. (2018). On physical layer security over the Fisher-Snedecor \(\cal{F}\) wiretap fading channels. IEEE Access, 6, 39466–39472. https://doi.org/10.1109/ACCESS.2018.2853700
Gradshteyn, I. S., & Ryzhik, I. M. (2014). Table of Integrals, Series, and Products (8th ed.). Oxford, UK: Academic press.
Wolfram Research, Inc.: The Mathematical Functions Site. https://functions.wolfram.com, Champaign, IL, USA. [Online; accessed 02-Mar-2024] (1998–2024)
Adamchik, V.S., & Marichev, O.(1990). The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system. In: Proceedings of the International Symposium on Symbolic and Algebraic Computation, 212–224. ACM, Tokyo, Japan . https://doi.org/10.1145/96877.96930
Bloch, M., Barros, J., Rodrigues, M. R., & McLaughlin, S. W. (2008). Wireless information-theoretic security. IEEE Transactions on Information Theory, 54(6), 2515–2534. https://doi.org/10.1109/TIT.2008.921908
Gupta, S. (1969). Integrals involving products of G-function. Proceedings of the National Academy of Sciences India Section A-Physical Sciences, 39, 193. https://doi.org/10.1017/S0305004100038019
Peppas, K. P. (2012). A new formula for the average bit error probability of dual-hop amplify-and-forward relaying systems over generalized shadowed fading channels. IEEE Wireless Communications Letters, 1(2), 85–88. https://doi.org/10.1109/WCL.2012.012712.110092
Chergui, H., Benjillali, M., & Saoudi, S. (2016). Performance analysis of project-and-forward relaying in mixed MIMO-pinhole and Rayleigh dual-hop channel. IEEE Communications Letters, 20(3), 610–613. https://doi.org/10.1109/LCOMM.2016.2514348
Acknowledgements
This work was supported by the Ministry of Science, Technological Development and Innovation of the Republic of Serbia (Contract No. 451-03-65/2024-03/200102).
Funding
The authors declare that no funds or grants were received during the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conceptualization and design. Material preparation, data collection and analysis were performed by Jelena Anastasov, Aleksandra Cvetković and Aleksandra Panajotović. Jelena Anastasov and Aleksandra Cvetković did the analytical derivations, Daniela Milović and Aleksandra Panajotović prepared numerical results and figures; simulations were performed by Dejan Milić and Nenad Milošević, as well as validation. The first draft of the manuscript was written by Jelena Anastasov and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
Ethics approval
Not applicable
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: Derivation of Asymptotic ASC
Appendix A: Derivation of Asymptotic ASC
In order to present solution of (11) in more tractable way, we derive asymptotic version of ASC at high SNR regime, i.e. when \(\lambda \rightarrow \infty\).
More specific, at high SNR region, (11) can be rewritten as [25, eq.(20)]
where \(\hat{\mathfrak {I}}_1\) and \(\hat{\mathfrak {I}}_2\) denotes asymptotic versions of \(\mathfrak {I}_1\) and \(\mathfrak {I}_2\), respectively. Integrals \(\hat{\mathfrak {I}}_1\) and \(\hat{\mathfrak {I}}_2\) can be obtained with the help of asymptotic expressions of cdfs for instantaneous SNRs of main and wiretap channel. Namely, we recall the series expansion of Meijer’s G function when its argument tends to 0 [27, eq. (07.34.06.0001.01)], which corresponds to high SNR regime, and we take only the first term in expansion to obtain asymptotic behavior of (8) and (3), respectively, in the following way
and
Then, by substituting (A2) and (2) in \(\mathfrak {I}_1\), and with the help of [27, eqs. (01.05.26.0002.01) and (07.34.21.0013.01)], after some mathematical manipulations, we get the following form of \(\hat{\mathfrak {I}}_1\)
One can notice the solution of this integral in a form of Meijer’s G function. These functions are built-in for most of the common mathematical packages. Unfortunately, this is not the case for the bivariate Meijer’s G functions that are more complex. Also, by substituting (A3) and (7) in \(\mathfrak {I}_2\), and again recalling [27, eq. (01.05.26.0002.01)] and [27, eq. (07.34.21.0013.01)], we get
Thus, the final asymptotic form of ASC, in high SNR region, can be obtained by using derived equations (A4), (A5) and (14).
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Anastasov, J., Cvetković, A., Panajotović, A. et al. Physical Layer Security of Ground-to-UAV Communication in the Presence of an Aerial Eavesdropper Outside the Guard Zone. Wireless Pers Commun 138, 1597–1614 (2024). https://doi.org/10.1007/s11277-024-11562-w
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-024-11562-w