Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks

  title={Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks},
  author={Jianping Yao and Jie Xu},
  journal={IEEE Transactions on Communications},
  • Jianping YaoJie Xu
  • Published 3 February 2019
  • Computer Science
  • IEEE Transactions on Communications
This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their respective legitimate receivers on the ground, in the presence of another set of randomly distributed suspicious ground eavesdroppers. We assume that the horizontal locations of legitimate receivers and eavesdroppers are distributed as two independent homogeneous Possion point processes (PPPs), and… 

On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT

This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source sends confidential information to a destination via an energy-constrained UAV-mounted amplify-and-forward relay in the presence of a ground eavesdropper to enhance physical-layer security and transmission reliability.

Joint 3D Maneuver and Power Adaptation for Secure UAV Communication With CoMP Reception

This paper studies a secrecy unmanned aerial vehicle (UAV) communication system with coordinated multi-point (CoMP) reception, in which one UAV sends confidential messages to a set of cooperative

Securing Communications With Friendly Unmanned Aerial Vehicle Jammers

The existence of the optimal UAV Jammer location is shown, and the impact of the density of eavesdroppers, the transmission power of the UAV jammer, andThe density of UAV jammers on the optimal location are shown.

Secure UAV-to-Ground MIMO Communications: Joint Transceiver and Location Optimization

A sophisticated physical layer security solution for improving the secrecy rate of multi-antenna aided U2G systems and shows that the joint transceiver and location optimization conceived facilitates secure communications even in the challenging scenario, where the legitimate channel of confidential information is inferior to the eavesdropping channel.

Secure UAV Random Networks With Minimum Safety Distance

The approximations for the coverage probability and secrecy probability of a typical user are derived, with which the secrecy throughput of the whole network is derived, and results show the analytical results can well approximate the simulation results.

Physical Layer Security for UAV Communications in 5G and Beyond Networks

A comprehensive survey on the current achievements of the UAV-aided wireless communications is conducted from the PLS perspective, introducing the widely used secrecy performance metrics and reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems.

3D Trajectory Optimization for Secure UAV Communication with CoMP Reception

Numerical results show that in the scenario with CoMP reception, the proposed 3D trajectory optimization significantly outperforms the conventional 2D horizontal trajectory design, by exploiting the additional degree of freedom in vertical trajectory.

UAV Secure Downlink NOMA Transmissions: A Secure Users Oriented Perspective

An SUs-oriented low-complexity algorithm is proposed by taking advantage of the inherent characteristics of the optimization problem, which can efficiently reduce the computational complexity and can act as a reasonable initial solution for the previous iterative algorithm to achieve better performance.

Secrecy Outage Performance of Ground-to-Air Communications With Multiple Aerial Eavesdroppers and Its Deep Learning Evaluation

A data-driven approach is adopted and a deep learning model is developed that can predict the SOP performance with high accuracy and short computation time and is derived an exact expression of the secrecy outage probability (SOP).

Physical layer security for UAV communications: A comprehensive survey

A comprehensive survey on the current achievements of UAV-PLS is conducted, and the basic concepts including typical static/mobile UAV deployment scenarios, the unique air-to-ground channel and aerial nodes distribution models, as well as various roles that a UAV may act when PLS is concerned are introduced.



Secrecy Transmission Capacity of Large-Scale UAV-Enabled Wireless Networks

  • Jianping YaoJie Xu
  • Computer Science
    2019 IEEE International Conference on Communications Workshops (ICC Workshops)
  • 2019
This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their

Robust Trajectory and Transmit Power Design for Secure UAV Communications

An iterative suboptimal algorithm is proposed to solve a UAV-ground communication system with multiple potential eavesdroppers on the ground by jointly designing the robust trajectory and transmit power of the UAV over a given flight duration by exploiting the mobility of UAV via its trajectory design.

Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes

This paper explores the 3-D antenna gain in the air-to-ground links and uses the Matérn hardcore point process to guarantee the safety distance between the randomly deployed UAV base stations and proposes the transmit jamming strategy to improve the secrecy performance.

Securing UAV Communications via Joint Trajectory and Power Control

The high mobility of the UAV is exploited to proactively establish favorable and degraded channels for the legitimate and eavesdropping links, through its trajectory design, to improve the secrecy rates for both U2G and G2U communications, as compared to other benchmark schemes without power control and/or trajectory optimization.

Improving Physical Layer Security Using UAV-Enabled Mobile Relaying

Simulation results demonstrate that the proposed mobile relaying scheme could significantly outperform the static relays scheme in terms of secrecy enhancement, and the algorithm developed is proven to have Karush–Kuhn–Tucker point convergence guarantee.

On Secrecy Capacity Scaling in Wireless Networks

It is shown that, as long as λe/λ = o((logn)-2), almost all of the nodes achieve a perfectly secure rate of Ω(1/√n) for the extended and dense network models.

Secure UAV Communication With Cooperative Jamming and Trajectory Control

This letter considers a two-UAV scenario when one UAV transmitter delivers the confidential information to a ground node (GN), and the other UAV jammer cooperatively sends the artificial noise to confuse the ground eavesdropper for protecting the confidentiality of the data transmission.

Secrecy outage probability and jamming coverage of UAV-enabled friendly jammer

Simulation and analytical results show that a UAV jammer can significantly improve the jamming coverage compared with a ground jammer.

UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel

Simulation results demonstrate that the proposed joint design can significantly enhance the secrecy rate of the considered wiretap system as compared to benchmark schemes.

Ultra Reliable UAV Communication Using Altitude and Cooperation Diversity

This framework incorporates both height-dependent path loss exponent and small-scale fading, and unifies a widely used ground-to-ground channel model with that of A2G for the analysis of large-scale wireless networks, and derives analytical expressions for the optimal UAV height that minimizes the outage probability of an arbitrary A1G link.