Joint Information-Theoretic Secrecy and Covertness for UAV-Assisted Wireless Transmission With Finite Blocklength

被引:6
|
作者
Liu, Pengpeng [1 ]
Li, Zan [1 ]
Si, Jiangbo [1 ]
Al-Dhahir, Naofal [2 ]
Gao, Yang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Texas Dallas, Dept Elect & Comp Engn, Richardson, TX 75080 USA
[3] Air Force Engn Univ, Coll Informat & Nav, Xian 710071, Peoples R China
基金
中国博士后科学基金;
关键词
Optimization; Wireless communication; Three-dimensional displays; Jamming; Trajectory; Security; Physical layer security; Unmanned aerial vehicles; physical layer security; covert communication; finite blocklength; 3D trajectory optimization; power optimization; RESOURCE-ALLOCATION; TRAJECTORY DESIGN; POWER; COMMUNICATION; OPTIMIZATION; PROBABILITY; THROUGHPUT; NETWORKS; SYSTEM;
D O I
10.1109/TVT.2023.3254882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study a novel joint information-theoretic secrecy and covertness model for an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which an UAV delivers classified information to a ground user (Bob) in the presence of two unauthorized users (Eve and Willie). Specifically, Eve tries to decode the legitimate information while Willie tries to detect if the UAV's transmission is present or not. Firstly, we assume that the perfect location knowledge of both Eve and Willie is known at the UAV. In this scenario, to guarantee security and covertness, the average secrecy rate maximization problem is formulated via joint design of the UAV's transmit power and three dimensional (3D) trajectory under Willie's covertness constraint. Technically speaking, the optimization problem is non-convex and mathematically intractable to tackle owing to the coupling of multiple variables. To address this non-convex problem, an iterative alternating optimization (AO) algorithm is developed with the assistance of the successive convex approximation (SCA) technique. After that, we extend the system model to both Eve's and Willie's imperfect location knowledge case, which is more sophisticated compared to the perfect location knowledge case due to the uncertain location constraints. We still utilize the iterative AO algorithm combined with SCA and S-procedure techniques to cope with the nonconvex problem. Numerical results indicate that our proposed 3D optimization algorithm performs better than the conventional two dimensional (2D) scheme and the benchmark scheme for both perfect and imperfect location knowledge cases.
引用
收藏
页码:10187 / 10199
页数:13
相关论文
共 50 条
  • [1] Secrecy Throughput of ANECE Assisted Transmission of Information in Finite Blocklength
    Zabir, Ishmam
    Swami, Ananthram
    Hua, Yingbo
    2022 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2022, : 1981 - 1986
  • [2] Resource Allocation for UAV-Assisted Industrial IoT User with Finite Blocklength
    Rezaei, Atefeh
    Khalili, Ata
    Dressler, Falko
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [3] A Joint Blocklength and Location Optimization Scheme For UAV-Assisted Smart Port Communication
    Pei, Jianhua
    Li, Zeping
    Jiang, Peng
    Li, Suchen
    Feng Renhai
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 124 - 129
  • [4] Secrecy capacity maximization for untrusted UAV-assisted cooperative communications with wireless information and power transfer
    Van Phu Tuan
    Nguyen Quang Sang
    Hyung Yun Kong
    Wireless Networks, 2020, 26 : 2999 - 3010
  • [5] Secrecy capacity maximization for untrusted UAV-assisted cooperative communications with wireless information and power transfer
    Van Phu Tuan
    Nguyen Quang Sang
    Kong, Hyung Yun
    WIRELESS NETWORKS, 2020, 26 (04) : 2999 - 3010
  • [6] Joint Trajectory Design and Resource Optimization in UAV-Assisted Caching-Enabled Networks with Finite Blocklength Transmissions
    Yang, Yang
    Gursoy, Mustafa Cenk
    DRONES, 2024, 8 (01)
  • [7] Joint Information-Theoretic Secrecy and Covert Communication in the Presence of an Untrusted User and Warden
    Forouzesh, Moslem
    Azmi, Paeiz
    Kuhestani, Ali
    Yeoh, Phee Lep
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (09) : 7170 - 7181
  • [8] On the Secrecy Performance of UAV-assisted Wireless Communication System With Hardware Impairments and Protected Zone
    Li, Minglu
    Yu, Xiangbin
    He, Ansu
    Teng, Tao
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 993 - 998
  • [9] Joint optimization of traffic and computation offloading in UAV-assisted wireless networks
    Hu, Xianlang
    Zhuang, Xiaoxiao
    Feng, Guangsheng
    Lv, Haibin
    Wang, Huiqiang
    Lin, Junyu
    2018 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2018, : 475 - 480
  • [10] MIMO transmissions with information-theoretic secrecy for secret-key agreement in wireless networks
    Li, Xiaohua
    Ratazzi, E. Paul
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1353 - 1359