TY - JOUR
T1 - Safeguarding uav communications against full-duplex active eavesdropper
AU - Liu, Chenxi
AU - Lee, Jemin
AU - Quek, Tony Q.S.
N1 - Funding Information:
Manuscript received January 10, 2018; revised June 29, 2018, December 22, 2018, and March 7, 2019; accepted March 7, 2019. Date of publication March 26, 2019; date of current version June 10, 2019. This work was supported in part by the DGIST R&D Program of the Ministry of Science and ICT(17-ST-02), in part by an Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea Government (MSIT) (2018-0-00764, Physical Layer Security with Low Power and Low Latency for Massive IoT Networks), in part by the National Research Foundation of Korea (NRF) grant funded by the Korea Government (MSIT) (NRF-2018R1A5A1060031), in part by the National Natural Science Foundation of China under Grant 61671074, and in part by the Fundamental Research Funds for the Central Universities under Grant 2018XKJC01. This paper was presented in part at the 2017 International Conference on Wireless Communications and Signal Processing [1]. The associate editor coordinating the review of this paper and approving it for publication was S. Yang. (Corresponding author: Jemin Lee.) C. Liu was with the Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore 487372. He is now with the State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China (e-mail: [email protected]).
Publisher Copyright:
© 2002-2012 IEEE.
PY - 2019/6
Y1 - 2019/6
N2 - Unmanned aerial vehicle (UAV) wireless communication has recently been recognized to be inevitable and prevalent in the fifth-generation (5G) wireless networks. In this paper, we propose a secure transmission scheme for a wiretap channel, where a source communicates with a legitimate UAV in the presence of an eavesdropper. We consider the full-duplex active eavesdropper, which performs both eavesdropping and malicious jamming simultaneously. The source transmits artificial noise (AN) signals, in addition to information signals, to confuse this eavesdropper. By considering the ground-To-UAV channel model, we analyze the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration. We further provide the asymptotic hybrid outage probability in a more compact form, where both the transmit power at the source and the jamming power at the eavesdropper become large with a fixed ratio. Through the analysis and the numerical results, we determine the optimal power allocation factor between information signals and AN signals as well as the operating height of UAV that minimize the hybrid outage probability. We also provide the most harmful antenna configuration of the eavesdropper to the UAV communications, and this paper can be a useful framework for the design of confidential UAV communication system.
AB - Unmanned aerial vehicle (UAV) wireless communication has recently been recognized to be inevitable and prevalent in the fifth-generation (5G) wireless networks. In this paper, we propose a secure transmission scheme for a wiretap channel, where a source communicates with a legitimate UAV in the presence of an eavesdropper. We consider the full-duplex active eavesdropper, which performs both eavesdropping and malicious jamming simultaneously. The source transmits artificial noise (AN) signals, in addition to information signals, to confuse this eavesdropper. By considering the ground-To-UAV channel model, we analyze the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration. We further provide the asymptotic hybrid outage probability in a more compact form, where both the transmit power at the source and the jamming power at the eavesdropper become large with a fixed ratio. Through the analysis and the numerical results, we determine the optimal power allocation factor between information signals and AN signals as well as the operating height of UAV that minimize the hybrid outage probability. We also provide the most harmful antenna configuration of the eavesdropper to the UAV communications, and this paper can be a useful framework for the design of confidential UAV communication system.
UR - http://www.scopus.com/inward/record.url?scp=85067125474&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85067125474&partnerID=8YFLogxK
U2 - 10.1109/TWC.2019.2906177
DO - 10.1109/TWC.2019.2906177
M3 - Article
AN - SCOPUS:85067125474
SN - 1536-1276
VL - 18
SP - 2919
EP - 2931
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 6
M1 - 8674764
ER -