Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper
Introduction
Unmanned aerial vehicles (UAVs) have been expanded from the military domain into civilian markets, with the growing interest in unmanned technology [1], [2], [3], [4], [5], [6], [7], [8]. Especially, they play an important role in wireless communications thanks to their low operation cost, fast placement speed, extremely flexible deployment, and the ability to quickly adapt to special scenarios. They can easily change their positions dynamically and provide users with communication in an emergency situation. When a region needs to quickly restore communication, UAVs can be usually served as an onboard communication platform to provide temporary communication [9]. Apart from this, when the direct communication link between two or more remote users is blocked, it can also be used as a mobile relay to resume wireless communication [10]. The communication system composed of UAVs can communicate through line-of-sight (LoS) links so that the communication performance between the source point and the target points can be greatly improved [11].
Although the above-mentioned UAV-based communication systems have numerous advantages, it often faces new challenges in actual design and operation. In reality, UAVs have to collect, process, and transmit a large amount of private data. It is clear that UAV communication links are vulnerable to malicious attacks and eavesdropping [12], [13]. Therefore, security is a critical issue in the construction and operation of UAV networks. When eavesdroppers exist, it is important to design effective methods to improve the secrecy rate of UAV networks[14], [15], [16].
The problem of improving the secrecy rate of UAV when the eavesdroppers exist has received a great deal of attention in the past. To improve the secrecy rate of data transmission, Shen et al. proposed a algorithm that iteratively optimize the trajectory of a relay UAV [17]. In [18], Li et al. researched the secrecy communication issue where dual UAVs were cooperatively applied. They maximized the secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. In [19], Lee et al. also designed the scene of dual UAVs where the source UAV transmitted data to multiple users. They maximized the minimum secrecy rate among the targets by jointly optimizing the trajectories and the transmit power of the UAVs along with the scheduling of the targets. Apart from this, many researchers have also studied the security of UAV networks from different angles [20], [21], [22], [23], [24]. The above work mainly has the following defects,
- •
The similarity in the existing literature is that the position of the eavesdropper was assumed to be known in their scenarios. In practice, because the eavesdropper may remain silent to hide his location [25], [26], it is difficult for us to achieve the precise position coordinates.
- •
Most existing literature considers the UAV with transmitting function rather than a transceiver [18], [19]. However, to restore long distance communication between two users, UAVs had to act as a relay platform that they can receive and forward data [17].
To overcome these defects, in this paper, we consider a new scenario where dual UAVs are employed cooperatively to improve the quality of information transmission. One UAV is utilized as a mobile relay and the other is a jammer that tends to disturb eavesdroppers who can illegally eavesdrop on the information between the relaying UAV and the user. It is worth noting that the interference of user’s legitimate communications is also inevitable. Therefore, we take this interference into account when designing the achievable rate of the user. During the process of trajectory optimization, the jammer UAV is kept as far away as possible from user and close to the eavesdropper. In this scenario, the actual position of the eavesdropper is unknown. Meanwhile, when the relaying UAV can receive and forward data, it will be subject to the information causality from the transmitter.
The secrecy rate is an important index to measure the security of the scenario considered above. The critical issue in this scenario is that how to maximize the average secrecy rate. In this paper, we propose an iterative algorithm that jointly optimizes the trajectories and transmit power to maximize the average secrecy rate. The main contributions of this paper are as follows:
- •
We consider a new optimization problem for dual UAVs that one UAV is utilized as a mobile wireless relay and the other auxiliary UAV is used to interfere with the eavesdropper. Here, the eavesdropper whose actual position is unknown attempts to eavesdrop on information illegally.
- •
We propose an iterative algorithm that jointly optimize the trajectories and transmit power for dual UAVs with multiple constraints. The original optimization problem is thorny because of the characteristic of non-convex. We decompose the original problem into three tractable subproblems by applying the successive convex approximation technique. Then, we alternately optimize the trajectories and transmit power for dual UAVs through a method of block coordinate descent to make the average secrecy rate maximized.
This paper is organized as follows: Section 2 is an introduction of system model for UAV system and the critical problem to be addressed. Section 3 introduces the iterative algorithm that jointly optimizes the trajectories and transmit power to maximize the average secrecy rate. We validate the efficacy of the proposed optimization algorithm in Section 4. In the end, we have a conclusion in Section 5.
Section snippets
Problem formulation
In this section, we introduce a new scenario that dual UAVs are employed cooperatively to improve the average secrecy rate with an unknown position of the eavesdropper on ground. Then, we formulate the critical problem that how to maximize the average secrecy rate with the constraints of trajectories and transmit power of dual UAVs as well as the information causality.
Proposed solution
In Section 2, we have proposed an optimization problem that maximize the average secrecy rate with multiple constraints. The following we will introduce an iterative algorithm that jointly optimizes the trajectories and transmit power to solve the above-mentioned optimization problem.
Numerical simulations
In this action, we validate the feasibility of the proposed algorithms by simulations. In our work, dual UAVs are employed cooperatively to improve the secrecy rate of information transmission and the location of the eavesdropper is unknown. We call the above scenario as dual UAVs with an estimated position of the eavesdropper which is referred to Dual UAVs/E. We compared this scenario with another two different scenarios. One scenario is that we use jammer UAV to interfere with the ground
Conclusions
In this paper, we formulated a new scenario where dual UAVs were employed cooperatively to improve the average secrecy rate of data transmission. We investigated the optimization problem that how to maximize the average secrecy rate with multiple constraints. Assisted by the block coordinate descent and successive convex approximation techniques, we proposed an iterative algorithm that jointly optimized the flight trajectories and transmit power. In comparison with traditional methods, the
CRediT authorship contribution statement
Weiwei Xu: Writing - original draft, Methodology. Heng Zhang: Conceptualization, Writing - review & editing, Funding acquisition. Xianghui Cao: Supervision, Data curation. Ruilong Deng: Writing - review & editing. Hongran Li: Investigation. Jian Zhang: Validation.
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgements
The work was partially supported by the National Natural Science Foundation of China under Grant 61873106 and 62061130220, National Nature Science Foundation of Jiangsu Province under Grant BK20171264, Jiangsu Qing Lan Project to Cultivate Middle-aged and Young Science Leaders, Jiangsu Six Talent Peak Project under Grants XYDXX-047, XYDXX-140, University Science Research General Research General Project of Jiangsu Province under Grant 18KJB520005, Lianyungang Hai Yan Plan under Grants
References (28)
- et al.
An encoding mechanism for secrecy on remote state estimation
Automatica
(2020) - et al.
Distributed krein space-based attack detection over sensor networks under deception attacks
Automatica
(2019) - et al.
3-d placement of an unmanned aerial vehicle base station for maximum coverage of users with different qos requirements
IEEE Wireless Commun. Lett.
(2017) - A. Rahmati, S. Hosseinalipour, Y. Yapici, X. He, I. Guvenc, H. Dai, A. Bhuyan, Dynamic interference management for...
- R. Gan, J. Shao, Y. Xiao, H. Zhang, W.X. Zheng, Optimizing attack schedules based on energy dispatch over two-hop relay...
- et al.
Energy-efficient uav communication with trajectory optimization
IEEE Trans. Wireless Commun.
(2017) - et al.
UAV-aided wireless communication design with propulsion energy constraint
- L. Wang, X. Cao, B. Sun, H. Zhang, S.C., Optimal schedule of secure transmissions for remote state estimation against...
- et al.
Mobile edge computing via a uav-mounted cloudlet: optimal bit allocation and path planning
IEEE Trans. Veh. Technol.
(2018) - et al.
Principles of physical layer security in multiuser wireless networks: a survey
IEEE Commun. Surveys Tutor.
(2014)
Trajectory design for completion time minimization in uav-enabled multicasting
IEEE Trans. Wireless Commun.
Joint trajectory and power optimization for uav relay networks
IEEE Commun. Lett.
The sky is not the limit: Lte for unmanned aerial vehicles
IEEE Commun. Mag.
Improving physical layer security via a uav friendly jammer for unknown eavesdropper location
IEEE Trans. Veh. Technol.
Cited by (16)
MobileRE: A replicas prioritized hybrid fault tolerance strategy for mobile distributed system
2021, Journal of Systems ArchitectureCitation Excerpt :The maximal moving speed changes from 3 to 15 m/s [40,41]. When the maximum movement speed is less than 3 m/s [27] or greater than 15 m/s [42], the experimental results will be extreme. The reliability cost rate of MobileRE increases with the increase of maximum move speed in a random or uniform bandwidth distribution model.
Linear Encryption Against Eavesdropping on Remote State Estimation
2023, IEEE Transactions on Automatic ControlStrategic UAV-Assisted Game Model for Detection in Covert Communication
2023, IEEE Transactions on Vehicular TechnologyResearch on transmission line communication relaying based on deep learning route optimization algorithm
2023, Proceedings of SPIE - The International Society for Optical EngineeringRIS Assisted Eavesdropping Avoidance for UAV Communication
2023, Chinese Control Conference, CCC