Professional Documents
Culture Documents
2018 Secure UAV-to-UAV Systems With Spatially Random UAVs
2018 Secure UAV-to-UAV Systems With Spatially Random UAVs
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters
2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters
γP
II. S YSTEM MODEL Lemma 1. The CDF of γi = d2
can be expressed as
i
√
3
( γP ) γP
1− , x≥
3 D2
Fγi (x) = x 2 D3 . (1)
0, γP
x< D2
3
Proof: Using fW (w) = 4πD 3
, we have the CDF of di as
Zx Zπ Z2π
3
Fdi (x) = sin φi d2i dθi dφi d (di )
4πD3
0 0 0
0, x < D
= x3
D3
, 0≤x≤D . (2)
1, x > D
Fig. 1: System model
Therefore, we can achieve the CDF of γi as
In this work, we consider a A2A communication system, as ( r )
shown in Fig. 1, where a UAV with a single omni transmitting γP
Fγi (x) = Pr {γi ≤ x} = 1 − Pr di ≤ . (3)
antenna acts as the source (S) trying to transmit its information x
to a legitimate UAV2 . Furthermore, there are also a group of
UAVs distributed in the coverage space (in which the received Then, the proof is completed.
signal strength is equal or above the threshold at the receiver
Corollary 1. Accordingly, the PDF of γi can be expressed as
to demodulate and decode the received signal) of S trying
√
3
to eavesdrop the information transmission between S and the 3( γP )
, x≥ γP
5 D2
legitimate UAV. For tractability purpose, in this work we treat fγi (x) = 2x 2 D3 . (4)
0, γP
the coverage space of S as a sphere, V, with radius, D (D > 0) x< D2
W , the PDF of which can be given by using Eq. (1) in Fxi (x) is the CDF of xi . As the eavesdropping channels are
[17] as fW (w) = 4πD 3 independent with each other, we can derive the CDF of γmax
3 . In this work, we assume that the
γi ≤ vmax = ∞ for simplification, where vmin and vmax means III. T HE S ECRECY O UTAGE P ROBABILITY
the minimum and maximum values of γi respectively. In this letter, SOP is defined as the probability that the
2 In this work, we only consider omni transmitting antenna to introduce the instantaneous secrecy capacity is below a threshold secrecy
analysis method for A2A systems and the system with directional antenna is a rate, Cth (Cth ≥ 0). Therefore, the instantaneous secrecy
special case of the one with omni transmitting antenna: the coverage space of capacity from S to the legitimate UAV is
directional antenna is a part of the one of omni antenna, leading to a portion
of the sphere for eavesdroppers to distribute, as indicated in Fig. 1. CS (γ0 , γmax ) = max {log2 (1 + γ0 ) − log2 (1 + γmax ) , 0} , (7)
2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters
N
where γmax = max {γi }. Thus, we can calculate C̄s1 as
i∈{1,...,N }
Then, let ν = 2 Cth
. SOP can be written as Z∞
N
C̄s1 = ln (1 + x) f0 (x)
1 + γ0
Pr (Cth ) = Pr {Cs ≤ Cth } = Pr ≤ 2Cth vmin
1 + γmax
Zx √ 3 N −1 √ 3j
= Pr {γ0 ≤ νγmax + ν − 1} . (8) 3 γP X γP
× N (−1)j CN
j
−1 3 5 dydx
2D3 j=0 y 2 j+ 2 D3j
vmin
−1 √ 3j+6 Z∞
Theorem 1. Using the Corollary 1 and Corollary 2, we can N
X 9N (−1)j γP 5
express Pr (Cth ) as follows: = j
CN −1 3 3 x− 2 ln (1 + x)dx
√ 3j+6 j=0 2(3j + 3) vmin 2 j+ 2 D3j+6
∞
"N −1 vmin
X µV −µV X j j 3N γP √ 3j+6 Z∞
Pr (Cth )= e (−1) CN −1 3 j+3
N −1
9N (−1) γP j
N =1
N! j=0 (3j + 3) vmin 2 D3j+6 −
X j
CN
3
x− 2 j−4 ln (1 + x)dx.
−1
N −1 √ 3j+6 j=0
2(3j + 3) D3j+6
X 3N γP vmin
− (−1)j CN
j
−1 3 (13)
j=0 2ν 2 D3j+6
In order to facilitate the analysis, we define a new function
B 2 j + 3, 1 2 F1 23 j + 52 , 1; 23 j + 23 ;
3 3
2vmin R∞ m
× q , g1 (m) = x ln (1 + x) dx. Using Eq. (2.6.10.47) in [19],
3 5
vmin 2 j+ 2 1 − ν1 + vmin vmin
we can easily calculate g1 (m) as
(9)
g1 (m) = vmin m+1 B (1, −m − 1) [ln (vmin ) + ψ (−m)
Proof: As the main and eavesdropping channels are
independent with each other, we can calculate Pr (Cth ) with −ψ (−m − 1)] + vmin m B (1, −m)
N eavesdropping UAVs as 1
× 3 F2 −m, 1, 1; 2, −m + 1; − . (14)
Z∞ νy+ν−1
Z vmin
PrN (Cth ) = fγ0 (x) fγmax (y) dxdy N
Then, using (14) in (13), we can easily derive C̄s1 as
vmin vmin
N −1 √ 3j+6
√ 3 9N (−1)j
Z∞ νy+ν−1
N
X j γP
5
3 γP C̄s1 = CN g −
Z
−1 3 3 1
= fγmax (y) 5 dxdy j=0 2(3j + 3) vmin 2 j+ 2 D3j+6 2
2x 2 D3 √
vmin vmin N −1 3j+6
9N (−1)j γP
Z∞ √ 3j+6
X j 3
N −1
3N γP − CN −1 g1 − j − 4 , (15)
X j j 2(3j + 3) D3j+6 2
= (−1) CN −1 3 3 5 dy. (10) j=0
j=0 2vmin 2 D3j+6 y 2 j+ 2
vmin R∞
where g1 (m) = xm ln (1 + x) dx.
vmin
Using Eq. (3.197.2) in [18] and taking the Poisson distribut- N
Similarly, we can also derive C̄s2 by using (14) as
ed number of eavesdroppers into consideration, Pr (Cth ) can
be obtained as (9). Z∞ vZ
max √ 3
N 3 γP
C̄s2 = ln (1 + y) fγmax (y) 5 dxdy
IV. T HE AVERAGE S ECRECY C APACITY 2x 2 D3
vmin y
As the main and eavesdropping channels are independent Finally, ASC can be obtained by substituting (15) and (16)
with each other, we can rewrite ASC as into (12).
X∞
µV V. N UMERICAL RESULTS
N N
C̄s (γ0 , γmax ) = exp (−µV )(C̄s1 − C̄s2 )/ ln 2, (12)
N ! In this section, Monte Carlo simulations are carried out
N =1
to validate our proposed analytical expressions for SOP and
N
R∞ Rx
where C̄s1 = ln(1 + x)fγ0 (x) fγmax (y) dydx and ASC under dominated LoS fading channels and Nakagami-m
υmin υmin
R∞ R∞ fading. The main adopted parameters are set as γ = 80 dB
N
C̄s2 = ln(1 + y)fγmax (y) fγ0 (x)dxdy . [11], P = 10 dBW, Cth = 1 bits/s/Hz and the expectation of
υmin y
channel power gain of the Nakagami-m fading channel is 1
3 The ergodic secrecy capacity aims at a case that the source can gain the dB. Moreover, the coverage distance of the source UAV is set
channel state information (CSI) of the eavesdropping link and transmits the from hundreds of meters to tens of km to reflect the practical
information only when the legitimate channel outperforms the eavesdropping scenarios of UAVs in civil and military applications.
channel. Therefore, the ergodic secrecy capacity is a special case of ASC, as
ASC is calculated for the case that no matter the CSI of the eavesdropping Fig. 2(a) shows the SOP versus λ for various Cth with
channel is available or not at the source. D = 500 m. Since a high threshold secrecy rate means the
2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/LWC.2018.2879842, IEEE Wireless
Communications Letters
10 0 10 0
only experiencing LoS fading serves as the lower bound of
the ASC.
10 -1
Finally, we can also clearly see from Figs. 2-3 that simu-
lation and analysis results match very well with each other,
SOP
SOP
10 -2
10 -3
models.
VI. C ONCLUSION
-100 -98 -96 -94 -92 -90 -88 -86 -84 -82 -80
10 -4
1000 2000 3000 4000 5000 6000 7000 8000 9000 10000 In this letter, we have studied the secrecy performance of
a A2A communication system and derived the closed-form
(a) SOP versus λ (b) SOP versus D analytical expressions for SOP and ASC. We consider the
Fig. 2: SOP randomness of the number and the positions of all UAVs to
10 0
make our system more practical. From the numerical results,
we can obtain that the density of the eavesdropping UAVs and
the radius of the coverage space of S exhibit a negative impact
10 -1
on SOP. However, the ASC can be improved by increasing the
radius of the coverage space of the source UAV.
ASC
ASC
10 -1
R EFERENCES
[1] S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on unmanned aerial
vehicle networks for civil applications: A communications viewpoint,”
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
10 -2
70 71 72 73 74 75 76 77 78 79 80 IEEE Commun. Surveys Tuts., vol. 18, no. 4, pp. 2624-2661, 4th Quart.,
10 4
2016.
[2] M. Erdelj, E. Natalizio, K. R. Chowdhury, and I. F. Akyildiz, “Help from
(a) ASC versus D (b) ASC versus γ the sky: Leveraging UAVs for disaster management,” IEEE Pervasive
Comput., vol. 16, no. 1, pp. 24-32, Jan. 2017.
Fig. 3: ASC [3] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
system requires a large channel secrecy rate, we can see that unmanned aerial vehicles: Opportunities and challenges,” IEEE Commun.
Mag., vol. 54, no. 5, pp. 36-42, May 2016.
the systems with a small Cth outperforms the one with a [4] M. Mozaffari, W. Saad, M. Bennis and M. Debbah, “Unmanned aerial
large Cth . Fig. 2(b) shows the SOP versus D for various λ. vehicle with underlaid device-to-device communications: Performance
Clearly, there are more eavesdropping UAVs when λ and/or and tradeoffs,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3949-
3963, Jun. 2016.
D increase, resulting in degraded SOP. Because the diversity [5] Y. Chen, W. Feng and G. Zheng, “Optimum placement of UAV as relays,”
gain of the information eavesdropping will increase, while the IEEE Commun. Lett., vol. 22, no. 2, pp. 248-251, Feb. 2018.
number of eavesdropping UAVs enlarging. [6] T. Andre et al., “Application-driven design of aerial communication
networks,” IEEE Commun. Mag., vol. 52, no. 5, pp. 129-137, May 2014.
Fig. 3(a) presents the ASC versus D for various λ, in which [7] G. Pan, J. Ye, Z. Ding, “On secure VLC systems with spatially random
one can see that ASC can be improved in the low λ region and terminals,” IEEE Commun. Lett., vol. 21, no. 3, pp. 492-495, Mar. 2017.
degrades in large λ region when λ decreases or D increases. [8] G. Pan, J. Ye, Z. Ding, “Secure hybrid VLC-RF systems with light energy
harvesting,” IEEE Trans. Commun., vol. 65, no. 10, pp. 4348-4359, Oct.
Because low λ and large D can improve the probability that 2017.
the distance between S and the legitimate UAV is shorter than [9] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE
the ones among S and the eavesdropping UAVs. Then, the Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
[10] P. K. Gopala, L. Lai, and H. E. Gamal, “On the secrecy capacity of
legitimate UAV will suffer weaker eavesdropping, compared fading channels,” IEEE Trans. Inf. Theory., vol. 54, no. 10, pp. 4687-
to the case with high λ and small D. However, it is exactly 4698, Oct. 2008.
opposite for ASC in the high λ and/or low D regions, since [11] G. Zhang, Q. Wu, M. Cui and R. Zhang, “Securing UAV communica-
tions via trajectory optimization,” in Proc. GLOBECOM 2017, Singapore,
there will be more eavesdropping UAVs, leading to poorer 2017, pp. 1-6.
secrecy performance. As shown in Fig. 3(b) with λ = −130 [12] S. W. Kim and S. W. Seo, “Cooperative unmanned autonomous vehicle
dB, we can also see that the reference SNR γ cannot play control for spatially secure group communications,” IEEE J. Sel. Areas
Commun., vol. 30, no. 5, pp. 870-882, June 2012.
a positive role significantly, since the received SNR over the [13] C. Liu, T. Q. S. Quek and J. Lee, “Secure UAV communication in the
eavesdropping links will also be improved when γ increases. presence of active eavesdropper,” in Proc. WCSP 2017, Nanjing, 2017,
Moreover, while suffering both LoS and Nakagami-m fad- pp. 1-6.
[14] H. Sha, F. Jose, R. Fredrik, E. Ove, “Unmanned aerial vehicle assisted
ing, we also present the SOP performance with m = 2 cellular communication,” arXiv:1803.05763, 2018.
and m √ = 3 in Fig.√2(a) and Fig. 2(b), and the ASC with [15] K.Welch, “Evolving cellular technologies for safer drone operation,”
m = 6 and m = 2 in Fig. 3(a) and Fig. 3(b), separately. Qualcomm 5G White Paper Present., San Diego, CA, USA, Tech. Rep.,
Oct. 2016.
One can see that the SOP and ASC suffering both LoS [16] Iskandar, Wireless channel characteristic and its performance for strato-
propagation and Nakagami-m fading outperforms the ones spheric platform communication, doctoral dissertation, Waseda Universi-
only experiencing LoS propagation. This observation can be ty, Tokyo, Japan, 2007.
[17] G. Pan, H. Lei, Z. Ding and Q. Ni, “On 3-D hybrid VLC-RF systems
explained by the fact: Benefiting from the diversity gain of with light energy harvesting and OMA scheme over RF links,” in Proc.
multiple eavesdropping UAVs, the equivalent received SNR at GLOBECOM 2017, Singapore, 2017, pp. 1-6.
eavesdroppers, γmax , will degrade slower compared with the [18] I.S. Gradshteyn and I.M. Ryzhik, Table of integrals, Series and Products,
7 Ed. San Diego: Academic Press, 2007.
received SNR at the legitimated UAV, γ0 , when the channels [19] A. P. Prudnikov, Yu. A. Brychkov, and O. I. Marichev, Integrals and
get worse. Therefore, we can see that the SOP only suffering Series: vol. 1, Elementary Functions, 3rd Ed., New York: Gordon &
LoS fading acts as the upper bound of the SOP, and the ASC Breach Sci. Publ., 1992.
2162-2337 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.