Jiang, X;
Chen, X;
Tang, J;
Zhao, N;
Yin Zhang, X;
Niyato, D;
Wong, KK;
(2021)
Covert Communication in UAV-Assisted Air-Ground Networks.
IEEE Wireless Communications
10.1109/MWC.001.2000454.
Preview |
Text
Mag0108.pdf - Accepted Version Download (451kB) | Preview |
Abstract
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by malicious users. Especially compared to the encryption and physical layer security that prevent eavesdropping, covert communication aims at hiding the existence of transmission, which is able to satisfy the more critical requirement of security. Thus, in this article, we focus on the covert communication issues of UAV-assisted wireless networks. First, the preliminaries of secure communications including encryption, physical layer security and covert communication are discussed. Then, current works and typical applications of UAV in covert communications are demonstrated. We then propose two schemes to enhance the covertness of UAV-assisted networks for some typical scenarios. Specifically, to improve the covert rate in UAV-assisted data dissemination, an iterative algorithm is proposed to jointly optimize the time slot, transmit power and trajectory. For the covertness of ground-air communication, a friendly jammer is employed to confuse the wardens, where the location of the jammer, the jamming power and the legitimate transmit power are jointly optimized. Numerical results are presented to validate the performance of these two proposed schemes. Finally, several challenges and promising directions are pointed out.
Type: | Article |
---|---|
Title: | Covert Communication in UAV-Assisted Air-Ground Networks |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1109/MWC.001.2000454 |
Publisher version: | http://dx.doi.org/10.1109/MWC.001.2000454 |
Language: | English |
Additional information: | This version is the author accepted manuscript. For information on re-use, please refer to the publisher’s terms and conditions. |
Keywords: | Encryption, Communication system security, Physical layer security, Wireless networks, Jamming, Eavesdropping, Trajectory |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Electronic and Electrical Eng |
URI: | https://discovery.ucl.ac.uk/id/eprint/10125811 |
Archive Staff Only
View Item |