Elsevier

Information Sciences

Volume 546, 6 February 2021, Pages 871-882
Information Sciences

Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper

https://doi.org/10.1016/j.ins.2020.08.107Get rights and content

Highlights

  • We consider a new optimization problem for dual UAVs that one UAV is utilized as a mobile wireless relay and the other auxiliary UAV is used to interfere with the eavesdropper. Here, the eavesdropper whose actual position is unknown attempts to eavesdrop on information illegally.

  • We formulate a critical problem that how to maximize the average secrecy rate with the constraints of trajectories and transmit power of dual UAVs as well as the information causality. This optimization problem is thorny because of the characteristic of non-convex.

  • We propose an iterative algorithm that jointly optimize the trajectories and transmit power for dual UAVs with multiple constraints. We decompose the original problem into three tractable subproblems by applying the successive convex approximation technique. Then, we alternately optimize the trajectories and transmit power for dual UAVs through a method of block coordinate descent to make the average secrecy rate maximized.

Abstract

Unmanned aerial vehicles (UAVs) face a lot of security challenges due to the openness of their wireless communication. In this paper, we investigate how to improve the security of wireless communication when the UAV is utilized as a wireless relay. We consider a new scenario where the dual UAVs are employed cooperatively to transmit confidential information and an eavesdropper whose actual position is unknown attempts to eavesdrop on the information illegally. We propose an optimization problem for the average secrecy rate under multiple constraints. The optimization problem we proposed is non-convex and complicated. We design an iterative algorithm that jointly optimizes the trajectories and transmit power to make the average secrecy rate maximized via the block coordinate descent and successive convex approximation techniques. The feasibility of this method is verified by numerical simulation.

Introduction

Unmanned aerial vehicles (UAVs) have been expanded from the military domain into civilian markets, with the growing interest in unmanned technology [1], [2], [3], [4], [5], [6], [7], [8]. Especially, they play an important role in wireless communications thanks to their low operation cost, fast placement speed, extremely flexible deployment, and the ability to quickly adapt to special scenarios. They can easily change their positions dynamically and provide users with communication in an emergency situation. When a region needs to quickly restore communication, UAVs can be usually served as an onboard communication platform to provide temporary communication [9]. Apart from this, when the direct communication link between two or more remote users is blocked, it can also be used as a mobile relay to resume wireless communication [10]. The communication system composed of UAVs can communicate through line-of-sight (LoS) links so that the communication performance between the source point and the target points can be greatly improved [11].

Although the above-mentioned UAV-based communication systems have numerous advantages, it often faces new challenges in actual design and operation. In reality, UAVs have to collect, process, and transmit a large amount of private data. It is clear that UAV communication links are vulnerable to malicious attacks and eavesdropping [12], [13]. Therefore, security is a critical issue in the construction and operation of UAV networks. When eavesdroppers exist, it is important to design effective methods to improve the secrecy rate of UAV networks[14], [15], [16].

The problem of improving the secrecy rate of UAV when the eavesdroppers exist has received a great deal of attention in the past. To improve the secrecy rate of data transmission, Shen et al. proposed a algorithm that iteratively optimize the trajectory of a relay UAV [17]. In [18], Li et al. researched the secrecy communication issue where dual UAVs were cooperatively applied. They maximized the secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. In [19], Lee et al. also designed the scene of dual UAVs where the source UAV transmitted data to multiple users. They maximized the minimum secrecy rate among the targets by jointly optimizing the trajectories and the transmit power of the UAVs along with the scheduling of the targets. Apart from this, many researchers have also studied the security of UAV networks from different angles [20], [21], [22], [23], [24]. The above work mainly has the following defects,

  • The similarity in the existing literature is that the position of the eavesdropper was assumed to be known in their scenarios. In practice, because the eavesdropper may remain silent to hide his location [25], [26], it is difficult for us to achieve the precise position coordinates.

  • Most existing literature considers the UAV with transmitting function rather than a transceiver [18], [19]. However, to restore long distance communication between two users, UAVs had to act as a relay platform that they can receive and forward data [17].

To overcome these defects, in this paper, we consider a new scenario where dual UAVs are employed cooperatively to improve the quality of information transmission. One UAV is utilized as a mobile relay and the other is a jammer that tends to disturb eavesdroppers who can illegally eavesdrop on the information between the relaying UAV and the user. It is worth noting that the interference of user’s legitimate communications is also inevitable. Therefore, we take this interference into account when designing the achievable rate of the user. During the process of trajectory optimization, the jammer UAV is kept as far away as possible from user and close to the eavesdropper. In this scenario, the actual position of the eavesdropper is unknown. Meanwhile, when the relaying UAV can receive and forward data, it will be subject to the information causality from the transmitter.

The secrecy rate is an important index to measure the security of the scenario considered above. The critical issue in this scenario is that how to maximize the average secrecy rate. In this paper, we propose an iterative algorithm that jointly optimizes the trajectories and transmit power to maximize the average secrecy rate. The main contributions of this paper are as follows:

  • We consider a new optimization problem for dual UAVs that one UAV is utilized as a mobile wireless relay and the other auxiliary UAV is used to interfere with the eavesdropper. Here, the eavesdropper whose actual position is unknown attempts to eavesdrop on information illegally.

  • We propose an iterative algorithm that jointly optimize the trajectories and transmit power for dual UAVs with multiple constraints. The original optimization problem is thorny because of the characteristic of non-convex. We decompose the original problem into three tractable subproblems by applying the successive convex approximation technique. Then, we alternately optimize the trajectories and transmit power for dual UAVs through a method of block coordinate descent to make the average secrecy rate maximized.

This paper is organized as follows: Section 2 is an introduction of system model for UAV system and the critical problem to be addressed. Section 3 introduces the iterative algorithm that jointly optimizes the trajectories and transmit power to maximize the average secrecy rate. We validate the efficacy of the proposed optimization algorithm in Section 4. In the end, we have a conclusion in Section 5.

Section snippets

Problem formulation

In this section, we introduce a new scenario that dual UAVs are employed cooperatively to improve the average secrecy rate with an unknown position of the eavesdropper on ground. Then, we formulate the critical problem that how to maximize the average secrecy rate with the constraints of trajectories and transmit power of dual UAVs as well as the information causality.

Proposed solution

In Section 2, we have proposed an optimization problem that maximize the average secrecy rate with multiple constraints. The following we will introduce an iterative algorithm that jointly optimizes the trajectories and transmit power to solve the above-mentioned optimization problem.

Numerical simulations

In this action, we validate the feasibility of the proposed algorithms by simulations. In our work, dual UAVs are employed cooperatively to improve the secrecy rate of information transmission and the location of the eavesdropper is unknown. We call the above scenario as dual UAVs with an estimated position of the eavesdropper which is referred to Dual UAVs/E. We compared this scenario with another two different scenarios. One scenario is that we use jammer UAV to interfere with the ground

Conclusions

In this paper, we formulated a new scenario where dual UAVs were employed cooperatively to improve the average secrecy rate of data transmission. We investigated the optimization problem that how to maximize the average secrecy rate with multiple constraints. Assisted by the block coordinate descent and successive convex approximation techniques, we proposed an iterative algorithm that jointly optimized the flight trajectories and transmit power. In comparison with traditional methods, the

CRediT authorship contribution statement

Weiwei Xu: Writing - original draft, Methodology. Heng Zhang: Conceptualization, Writing - review & editing, Funding acquisition. Xianghui Cao: Supervision, Data curation. Ruilong Deng: Writing - review & editing. Hongran Li: Investigation. Jian Zhang: Validation.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgements

The work was partially supported by the National Natural Science Foundation of China under Grant 61873106 and 62061130220, National Nature Science Foundation of Jiangsu Province under Grant BK20171264, Jiangsu Qing Lan Project to Cultivate Middle-aged and Young Science Leaders, Jiangsu Six Talent Peak Project under Grants XYDXX-047, XYDXX-140, University Science Research General Research General Project of Jiangsu Province under Grant 18KJB520005, Lianyungang Hai Yan Plan under Grants

References (28)

  • W. Yang et al.

    An encoding mechanism for secrecy on remote state estimation

    Automatica

    (2020)
  • X. Ge et al.

    Distributed krein space-based attack detection over sensor networks under deception attacks

    Automatica

    (2019)
  • M. Alzenad et al.

    3-d placement of an unmanned aerial vehicle base station for maximum coverage of users with different qos requirements

    IEEE Wireless Commun. Lett.

    (2017)
  • A. Rahmati, S. Hosseinalipour, Y. Yapici, X. He, I. Guvenc, H. Dai, A. Bhuyan, Dynamic interference management for...
  • R. Gan, J. Shao, Y. Xiao, H. Zhang, W.X. Zheng, Optimizing attack schedules based on energy dispatch over two-hop relay...
  • Y. Zeng et al.

    Energy-efficient uav communication with trajectory optimization

    IEEE Trans. Wireless Commun.

    (2017)
  • S. Eom et al.

    UAV-aided wireless communication design with propulsion energy constraint

  • L. Wang, X. Cao, B. Sun, H. Zhang, S.C., Optimal schedule of secure transmissions for remote state estimation against...
  • J.K.S. Jeong et al.

    Mobile edge computing via a uav-mounted cloudlet: optimal bit allocation and path planning

    IEEE Trans. Veh. Technol.

    (2018)
  • A. Mukherjee et al.

    Principles of physical layer security in multiuser wireless networks: a survey

    IEEE Commun. Surveys Tutor.

    (2014)
  • Y. Zeng et al.

    Trajectory design for completion time minimization in uav-enabled multicasting

    IEEE Trans. Wireless Commun.

    (2018)
  • S. Zhang et al.

    Joint trajectory and power optimization for uav relay networks

    IEEE Commun. Lett.

    (2017)
  • X. Lin et al.

    The sky is not the limit: Lte for unmanned aerial vehicles

    IEEE Commun. Mag.

    (2018)
  • Y. Zhou et al.

    Improving physical layer security via a uav friendly jammer for unknown eavesdropper location

    IEEE Trans. Veh. Technol.

    (2018)
  • Cited by (16)

    View all citing articles on Scopus
    View full text