Trajectory and Power Design for Aerial Multi-User Covert Communications

被引:0
|
作者
Lei, Hongjiang [1 ,2 ]
Jiang, Jiacheng [1 ,2 ]
Ansari, Imran Shafique [3 ]
Pan, Gaofeng [4 ]
Alouini, Mohamed-Slim [5 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Chongqing Key Lab Mobile Commun Technol, Chongqing 400065, Peoples R China
[3] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Scotland
[4] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[5] King Abdullah Univ Sci & Technol KAUST, CEMSE Div, Thuwal 239556900, Saudi Arabia
基金
中国国家自然科学基金;
关键词
Autonomous aerial vehicles; Jamming; Communication systems; Trajectory; Optimization; Antennas; Monitoring; Cooperative jamming; covert communication; trajectory and power optimization; unmanned aerial vehicle (UAV); SECURING UAV COMMUNICATIONS; OPTIMIZATION; LIMITS;
D O I
10.1109/TAES.2024.3378203
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this article, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits critical information to ground users in the presence of multiple wardens as well as a friendly jammer UAV transmits artificial jamming signals to fight with the wardens. The scenario of wardens being outfitted with a single antenna is considered, and the detection error probability (DEP) of wardens with finite observations is researched. Then, considering the uncertainty of wardens' location, a robust optimization problem with worst-case covertness constraint is formulated to maximize the average covert rate by jointly optimizing power allocation and trajectory. To cope with the optimization problem, an algorithm based on successive convex approximation methods is proposed. Thereafter, the results are extended to the case where all the wardens are equipped with multiple antennas. After analyzing the DEP in this scenario, a tractable lower bound of the DEP is obtained by utilizing Pinsker's inequality. Subsequently, the nonconvex optimization problem was established and efficiently coped by utilizing a similar algorithm as in the single-antenna scenario. Numerical results indicate the effectiveness of our proposed algorithm.
引用
收藏
页码:4574 / 4589
页数:16
相关论文
共 50 条
  • [41] Multi-user detection for DS-CDMA communications
    Moshavi, S
    IEEE COMMUNICATIONS MAGAZINE, 1996, 34 (10) : 124 - 136
  • [42] Interference in multi-user optical wireless communications systems
    Abdalla, Iman
    Rahaim, Michael B.
    Little, Thomas D. C.
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2020, 378 (2169):
  • [43] Multi-User MIMO Satellite Communications for Aviation Networks
    Voelk, Florian
    Schwarz, Robert T.
    Knopp, Andreas
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [44] Multi-User Hybrid Beamforming Design for Physical Layer Secured mmWave LOS Communications
    Li, Jianguo
    Ye, Neng
    Ma, Siqi
    Bu, Xiangyuan
    An, Jianping
    ELECTRONICS, 2021, 10 (21)
  • [45] Energy-Efficient Design for Hybrid RIS Transmitter Enabled Multi-User Communications
    Huang, Ao
    Mu, Xidong
    Guo, Li
    Zhu, Guangyu
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [46] Pilot Design for Multi-User MIMO
    Auer, Gunther
    Cosovic, Ivan
    2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, 2009, : 3621 - 3624
  • [47] The multi-user workspace for collaborative design
    Woo, S
    Lee, E
    Sasada, T
    CAAD FUTURES 1997, 1997, : 443 - 452
  • [48] Distributed secure transmission for covert communication under multi-user network
    Huang, Ying
    Lei, Jing
    IET COMMUNICATIONS, 2022, 16 (16) : 1901 - 1911
  • [49] Joint Optimization of a UAV's Trajectory and Transmit Power for Covert Communications
    Zhou, Xiaobo
    Yan, Shihao
    Hu, Jinsong
    Sun, Jiande
    Li, Jun
    Shu, Feng
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (16) : 4276 - 4290
  • [50] Multi-user lax communications: a multi-armed bandit approach
    Avner, Orly
    Mannor, Shie
    IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, 2016,