You are on page 1of 8

SAFEGUARDING 5G-AND-BEYOND NETWORKS WITH PHYSICAL LAYER SECURITY

Physical Layer Security in UAV Systems:


Challenges and Opportunities
Xiaofang Sun, Derrick Wing Kwan Ng, Zhiguo Ding, Yanqing Xu, and Zhangdui Zhong

Abstract narios where legacy or fixed infrastructures are


destroyed or do not exist, including disaster res-
Unmanned aerial vehicle (UAV) wireless com- cue, remote sensing, firefighting, and others.
munications has experienced an upsurge of inter- The deployment of UAV facilitates cost-efficient
est in both military and civilian applications, due and uninterrupted communications.
to its high mobility, low cost, on-demand deploy- • High flexibility: Due to fully controllable 3D
ment, and inherent line-of-sight air-to-ground mobility, UAVs can either stay quasi-stationary
channels. However, these benefits also make or cruise continuously to a dedicated location,
UAV wireless communication systems vulnerable depending on the requirements of wireless
to malicious eavesdropping attacks. In this arti- communication systems. The movement of
cle, we aim to examine the physical layer secu- UAVs provides a new degree of freedom to
rity issues in UAV systems. In particular, passive offer efficient communications.
and active eavesdropping are two primary types • High probability of line-of-sight (LoS) air-
of attack in UAV systems. We provide an over- to-ground channel: According to field trial
view on emerging techniques, such as trajecto- results [2], the LoS component dominates
ry design, resource allocation, and cooperative the air-to-ground channels in many practical
UAVs, to fight against both types of eavesdrop- scenarios, especially for rural areas or moder-
ping in UAV wireless communication systems. ate-height UAV altitude. This channel charac-
Moreover, the applications of non-orthogonal teristic leads to the fact that the channel state
multiple access, multiple-input multiple-output, information (CSI) can be directly determined
and millimeter-wave in UAV systems are also pro- by the position of each node and used to
posed to improve the system spectral efficiency facilitate the design of high-speed communi-
and to guarantee security simultaneously. Finally, cation systems.
we discuss some potential research directions and • Limited resources: It is noted that onboard
challenges in terms of physical layer security in batteries of UAVs have limited energy storage.
UAV systems. Moreover, the sizes of UAVs are usually small
for on-demand deployment, and the weights
Introduction of UAVs for communications typically do not
In the past few years, heterogeneous data applica- exceed 25 kg for both safety and energy con-
tions have emerged in wireless communications, sumption issues [1]. These limitations directly
including video streaming, e-health monitoring, restrict the communication, computation, and
video conferencing, and so on. However, tradi- cruising duration capabilities of UAVs.
tional communication networks with fixed infra- Despite the promising gains brought by UAVs,
structures are unable to meet the increasingly the open nature of air-to-ground wireless channels
stringent quality of service (QoS) requirements makes secure information transfer a challenging
in the fifth generation (5G) and beyond 5G net- issue. Specifically, on one hand, information sig-
works. As a result, the development of unmanned nals transmitted over wireless LoS channels are
aerial vehicles (UAVs) has created a fundamental likely to be intercepted by some undesired receiv-
paradigm shift in wireless communication systems ers, which leads to a risk of information leakage.
to facilitate fast and highly flexible deployment of On the other hand, wireless UAV transceivers are
communication infrastructures. In particular, by vulnerable to malicious jamming attacks. Hence,
exploiting the high maneuverability of UAV, com- security plays an extremely important role in UAV
munication links can be established ubiquitously, wireless communications. Unfortunately, tradi-
especially in temporary hotspots, disaster areas, tional encryption techniques require high com-
and complex terrains. Compared to traditional putational complexity leading to a large amount
terrestrial wireless communications, UAV wireless of energy consumption [3], which may not be
communications have the following unique fea- suitable to UAV systems. As an alternative, phys-
tures [1]: ical layer security is computationally efficient and
• On-demand and swift deployment: UAV effective in safeguarding wireless communication
enables fast establishment of temporal com- networks via exploiting the inherent randomness
munication infrastructures in emergency sce- of wireless channels. As a result, various physical

Xiaofang Sun, Yanqing Xu, (corresponding author) and Zhangdui Zhong are with the State Key Lab of Rail Traffic Control and Safety and
Digital Object Identifier: the Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications; Derrick Wing Kwan Ng is with the
10.1109/MWC.001.1900028 University of New South Wales; Zhiguo Ding is with the University of Manchester.

40 1536-1284/19/$25.00 © 2019 IEEE IEEE Wireless Communications • October 2019


A typical physical layer
Final location
security communica-
multi-UAV cooperation
Cooperative link Initial location tion problem compris-
Trajectory
Information transmission
es a minimum of three
Information leakage
nodes — a legitimate
Jamming link
transmitter, a legitimate
receiver, and a poten-
tial eavesdropper —
which can be modeled
Legitimate receiver
Legitimate receiver Ground BS by a wiretap channel
Uncertain area
Active eavesdropping [3]. In general, secrecy
Eavesdropper Malicious jammer capacity and secrecy
Passive eavesdropping outage probability are
Legitimate receiver
the two fundamental
FIGURE 1. Illustrations of security issues in UAV wireless communication systems. metrics to evaluate
physical layer security
layer techniques have been proposed in the lit- CS = [CM – CE]+, (1) performance.
erature for guaranteeing communication security

[3–11]. where [x]+ = max{x, 0}. Notably, perfectly secure
Since the channel characteristics determine communication between a legitimate pair is possi-
the performance of physical layer security, the ble, when the eavesdropper’s channel is a degrad-
LoS channels as well as the mobility and flexibility ed version of the main channel.
of UAVs bring both opportunities and challenges In UAV-based communication systems, a UAV
into the physical layer security design in UAV sys- can act as either a transmitter or a receiver. On one
tems. In particular, on one hand, the LoS channel hand, it is noted that when the UAV is a legitimate
condition in UAV-based communication systems transmitter, the associated air-to-ground LoS chan-
may increase the vulnerability to eavesdropping. nels facilitate the signal reception at both the legit-
On the other hand, the fully controllable mobility imate receiver and the eavesdropper, which may
of UAVs can be exploited to enhance communi- increase the vulnerability to potential eavesdropping.
cation security via adjusting its trajectory. Hence, On the other hand, when the UAV acts as a legiti-
introducing UAVs to wireless communication sys- mate receiver, the existence of LoS channels enhance
tems is a double-edged sword that requires care- the physical layer security, especially against passive
ful system design and thorough research. eavesdropping. As such, to investigate the security
Motivated and inspired by the unique challeng- issues in the presence of eavesdroppers, we mainly
es and opportunities brought by UAV, this article focus on the former scenario where the UAV acts as
aims to provide an important overview on physi- a legitimate transmitter. The potential security attacks
cal layer security in UAV wireless communication in UAV systems are illustrated in Fig. 1 and described
systems, which sheds light on potential research in the following sections.
in this field. In particular, potential security attacks,
specifically in UAV wireless communication sys- pAssIve eAvesdroppIng scenArIos
tems, are discussed. Moreover, corresponding In these scenarios, passive eavesdroppers intend
solutions are provided in terms of emerging tech- to intercept some confidential data without
niques by considering both the advantages and degrading the received signal quality at the legit-
limitations of UAVs. To further enhance the phys- imate receiver. Since the eavesdroppers work in
ical layer security, the applications of advanced a passive manner and only intend to intercept the
5G technologies such as non-orthogonal multi- confidential messages, they usually remain silent,
ple access (NOMA), 3D beamforming, and milli- and their position information is not easy for the
meter-wave (mmWave) are investigated in UAV UAV to obtain, which makes the system vulner-
wireless communication systems. Finally, potential able to eavesdropping. In the following, we dis-
research challenges that have not been addressed cuss three cases with different availabilities of the
in the literature and some future directions in eavesdroppers’ position information.
terms of secure communications in UAV systems Full Position Information of Eavesdroppers:
are envisioned. An optical camera or a synthetic aperture radar
equipped on the UAV can help to detect and
securIty AttAcKs In uAv systems track the positions of potential external eaves-
A typical physical layer security communication droppers.
problem comprises a minimum of three nodes, — If the eavesdroppers stay stationary, obtaining
a legitimate transmitter, a legitimate receiver, and the complete positions of these external eaves-
a potential eavesdropper — which can be mod- droppers is possible at the UAV. As such, the
eled by a wiretap channel [3]. In general, secre- security issues are likely to be addressed in such
cy capacity and secrecy outage probability are scenarios via proper resource allocation design
the two fundamental metrics to evaluate physi- and taking advantage of the flexibility of the UAV.
cal layer security performance. Typically, denote However, obtaining such precise position infor-
CM and CE as the Shannon capacities of the main mation requires a high hardware cost. Besides,
channel and eavesdropping channel, respectively. the required new equipments impose an extra
Consequently, the secrecy capacity CS is defined load on the UAV, which may increase its energy
by [3] consumption.

IEEE Wireless Communications • October 2019 41


When eavesdroppers Passive eavesdropping FD/cooperative HD active eavesdropping
hide themselves phys- Security attacks
ically, it is difficult for Full PI Partial PI Absence of PI Full PI Partial PI Absence of PI
the UAV to detect and Joint design ü ü ü ü ü ü
track them. This raises
Robust design ü ü
a problem that the Techniques
completely absence of Artificial noise ü ü ü ü
position information Multi-UAV CoMP ü ü ü ü ü ü
makes the UAV system
Multi-antenna ü ü ü ü ü
extremely vulnerable
to eavesdropping. In Technologies NOMA ü ü
such scenarios, perfect- mmWave ü ü ü ü ü ü
ly secure communica-
PI: Position information
tions cannot be always Joint design: Joint trajectory and resource allocation design
guaranteed.
TABLE 1. Specific security attacks and possible solutions in UAV wireless communication systems.

Partial Position Information of Eavesdrop- characteristics, but also consumes more energy
pers: When the eavesdroppers stay quasi-station- to combat the active eavesdropping.
ary or move in certain areas, obtaining precise • Cooperative half-duplex (HD) eavesdroppers:
position information of eavesdroppers is challeng- Multiple HD eavesdroppers can mimic an FD
ing and expensive in terms of hardware cost and eavesdropper via cooperation. For instance,
energy consumption. Then, with the aid of an some eavesdroppers transmit jamming to a
equipped camera or radar on the UAV, it is possi- legitimate receiver, while others intercept con-
ble to obtain partial position information of these fidential signals.
eavesdroppers at the UAV via sensing and track- In both situations, when the CSI of the legit-
ing. In the literature, worst case secrecy capac- imate receiver is available at the active eaves-
ity and secrecy outage probability are the two droppers, the UAV systems become severely
common metrics to evaluate the performance of vulnerable, as the active eavesdroppers can effi-
UAV systems with partial position information of ciently interfere the legitimate receiver.
external eavesdroppers [3, 7, 8].
Absence of Position Information of Eaves-
droppers: When eavesdroppers hide themselves
Physical Layer Security Techniques for
physically, it is difficult for the UAV to detect and UAV Systems
track them. This raises a problem in which the To enhance physical layer security, the unique
complete absence of position information makes properties of UAVs (e.g., high mobility and flexi-
the UAV system extremely vulnerable to eaves- bility in positioning) can be exploited. Moreover,
dropping. In such scenarios, perfectly secure com- by using advanced resource allocation tech-
munications cannot always be guaranteed. niques, the secrecy performance can be further
improved. In the following, we discuss the specific
Active Eavesdropping Scenarios effective physical layer security strategies against
Compared to passive eavesdroppers, active ones the corresponding eavesdroppers listed earlier in
are more dangerous. The reasons are twofold. air-to-ground channels, as shown in Table 1.
On one hand, active eavesdropping intends to
attack the main channel by degrading the channel Anti-Eavesdropping Techniques
capacity. For instance, active eavesdroppers trans- Joint Trajectory and Resource Allocation
mit jamming signals to the legitimate receiver for Design: In UAV systems, various resources need
degrading the capacity of the main channel (i.e., to be allocated, such as transmit power, cruising
C M). On the other hand, the active eavesdrop- speed, time slot, and frequency bandwidth. It is
per may also aim to improve the capacity of the noted that resource allocation affects the signal
eavesdropping channel. As such, eavesdropping strength received at not only the legitimate receiv-
attacks caused by active eavesdroppers are more er, but also the eavesdroppers. In the following,
harmful than those of passive ones. Specifically, we first discuss how trajectory design can be
the LoS channel characteristic can improve the exploited to improve the physical layer security
capacity of the eavesdropping channel when the in UAV systems. We then provide an overview of
UAV is a legitimate transmitter. According to the the joint design of resource allocation and trajec-
duplexing mode, we discuss the following two tory for physical layer security provisioning.
types of jamming attacks in UAV wireless commu- Trajectory Design Approach: UAV trajectory
nication systems: design has become an important research topic
• Full-duplex (FD) eavesdropper: An FD active for realizing efficient UAV-based communica-
eavesdropper transmits jamming noise and tion systems [4–6]. In terms of communication
intercepts confidential signals simultaneous- security, the UAV can fly close to the legitimate
ly and independently [12]. In such scenarios, ground node and away from the eavesdropper if
the UAV would increase its transmit power to it is possible. The principle is to carefully design
improve the quality of the jammed channel, the trajectory of UAV such that the legitimate link
which not only facilitates the eavesdropping at can be enhanced while the eavesdropping link is
the FD eavesdropper due to the LoS channel weakened.

42 IEEE Wireless Communications • October 2019


6
1
4
km

0
2

-1 0
0 100 200 300 400 500

20
1
km

0 10

-1 0
0 100 200 300 400 500
-2 0 2 4 6

km
FIGURE 2. The optimized UAV trajectories for the eavesdropper move a) counterclockwise; b) clockwise around the legitimate receiv-
er with radius 1 km; c) the achieved system rate and d) the corresponding cruising speed via joint trajectory and resource alloca-
tion design to enhance the physical layer security in UAV-aided wireless communication scenarios.

Resource Allocation: Specifically, a joint of the legitimate transmitter, legitimate receiver,


design of trajectory and resource allocation is a and eavesdropper, respectively. q0 and qN repre-
promising approach to further enhance physical sent the predetermined initial and final locations
layer security [5, 6]. The basic principle of the of the UAV, respectively. From this figure, we find
joint design is that when a UAV has to fly close that the UAV first flies close to the transmitter
to an eavesdropper, the UAV can decrease or for caching enough data. Then it approaches the
shut down the transmission power to reduce the legitimate receiver and avoids any possible trajec-
potential of information leakage. At the same tories leading close to the eavesdropper. Figures
time, the UAV flies away from the eavesdropper 2c and 2d depict the capacities and the corre-
at its full speed to save more time slots for the sponding cruising speed of the UAV, respectively,
future. In contrast, when the UAV flies close to a via the optimal joint design. In these two figures,
legitimate receiver, the UAV usually slows down the eavesdropper is stationary at (4 km, 0, 0). CU
and increases its transmit power for confidential denotes the instantaneous achievable rate at the
information transmission. UAV. From Figs. 2c and 2d, we find that when
We provide an example to show how UAV the UAV is closer to the eavesdropper than to the
can be adopted as a mobile relay to guarantee legitimate receiver, the UAV either caches data
secure communications via joint trajectory and from the legitimate transmitter by slowing down
resource allocation design. In the considered sce- and then hovering above it or keeps silent and
nario, a legitimate transmitter intends to serve a moves away from the eavesdropper. Differently,
legitimate receiver in the presence of a passive when the UAV is closer to the legitimate receiv-
eavesdropper with the aid of a UAV. The UAV er, the UAV transmits confidential signal with a
is introduced as a mobile relay to complete the positive secrecy rate and tries to hover above
data delivery and to enable physical layer security. the desired receiver as long as possible. These
The ultimate goal of the system design is to max- indicate that joint trajectory and resource alloca-
imize the spectral efficiency of the system, while tion design in UAV systems is an effective way to
guaranteeing secure communications and subject enhance the physical layer security and improve
to certain practical constraints as in [6]. The joint spectral efficiency.
trajectory and resource allocation design can be Robust Joint Design: When only partial or
obtained by iteratively solving the corresponding statistical position information of eavesdroppers
approximated optimization problem. is available, robust joint design can be exploit-
Figure 2 provides some interesting insights ed to facilitate secure UAV communications by
into the trajectory and transmission performance considering the worst case scenario. For exam-
during the operation period. The position of ple, the uncertain location area of the potential
the eavesdropper is assumed to be available at eavesdropper can be modeled by a region with a
the UAV for the optimal design. The maximum center that is the exact location of the eavesdrop-
cruising speed of the UAV is 20 km/h. Figures per where the length of its radius is related to the
2a and 2b depict the optimized trajectories of amount of uncertainty. Then the robust design
a UAV for two interesting scenarios, where the for the worst case communication security is to
eavesdropper dynamically moves counterclock- guarantee the QoS of the system whenever the
wise and clockwise, respectively, around the legit- eavesdropper is located within the region. In gen-
imate receiver with radius 1 km and velocity 50 eral, a UAV with optimized trajectory would fly
km/h. Variables st, sr, and se represent locations as close as possible to the legitimate receiver to

IEEE Wireless Communications • October 2019 43


NOMA is viewed as a enhance the capacity of the legitimate channel • When UAVs have only partial position or statis-
promising technique while cruising away from the uncertain area of the tical information on the eavesdropper, robust
to provide superior eavesdropper(s) as much as possible. Also, a high- joint trajectory and resource allocation design
spectral efficiency by er transmit power from the UAV is adopted when can be introduced into multi-UAV networks to
the UAV is close to the legitimate user to exploit improve the secrecy rate of the system or to
multiplexing informa- the short distance communication between the reduce the secrecy outage probability below a
tion signals at different transceivers. However, when the UAV has to certain level [7].
power levels. Hence, approach the uncertain area of the eavesdrop- • When the position information of an active
it is expected that per(s), it decreases or shuts down the transmit eavesdropper is completely absent at UAVs,
NOMA can bring addi- power and accelerates away from this area to multiple UAVs applying cooperative jamming
reduce the potential of information leakage. to the orthogonal space of the legitimate
tional rate and robust- Artificial Noise: To address the security receiver’s channel and position adjustment is
ness to enhance the issues caused by passive eavesdroppers with the an effective method to degrade the received
achievable rate in UAV absence of their position information, one effec- signals at eavesdroppers and enhance those at
physical layer security tive approach is to transmit artificial noise to the the legitimate receiver [8]. Moreover, multi-an-
communications. null space of the legitimate pair’s channels via tenna techniques can be adopted to utilize spa-
performing cooperation among multiple UAVs tial degrees of freedom, hence enhancing the
and to transmit confidential data only when UAVs quality of the received signal at the legitimate
are close enough to the legitimate receiver via receiver and reducing the potential informa-
joint trajectory and resource allocation design. To tion leakage to active eavesdroppers via pre-
this end, confidential data and artificial noise are cise beamformer design. Furthermore, one can
available among the cooperating UAVs. As such, exploit the huge bandwidth of mmWave fre-
the capacity of the confidential signal through the quency band to avoid potential eavesdropping
legitimate channel (i.e., CM in Eq. 1) is increasedm and take advantage of LoS dominated channels
but that through the eavesdropping channel (i.e., in mmWave systems for realizing highly direc-
CE) is reduced. However, since artificial noise con- tional transmission.
sumes some transmit power, this would leave a Remark: We note that the the aforementioned
smaller amount of system power for allocating anti-jamming techniques can also be adopted
to the confidential information signal. Therefore, to reduce information leakage against passive
power allocation is an important issue in UAV- eavesdropping. Besides, the techniques used for
based wireless communications for improving the addressing security issues in air-to-ground chan-
system secrecy capacity. However, finding the nels can also be applied to ground-to-air ones
optimal power allocation for the UAV-based case where the UAV is a legitimate receiver. For
typically means solving nontrivial NP-hard optimi- instance, the flexibility of the UAV can be lever-
zation problems, which are generally intractable. aged against eavesdropping and jamming attacks
Hence, computationally efficient suboptimal solu- via proper trajectory planning or cooperative
tions should be proposed. receiving.

Anti-Jamming Techniques Advanced Approaches for UAV Systems


To address the security issues caused by jamming To further enhance the system secrecy perfor-
attacks, cooperation among multiple UAVs [9] mance, some advanced techniques can also be
can be exploited to enhance the physical layer incorporated into the UAV systems [11, 13]. In
security, since when multiple UAVs are available the sequel, we discuss the potential applications
(Fig. 1), the degrees of freedom for optimizing the of NOMA, beamforming, and mmWave tech-
system resources are increased. The cooperation niques in UAV systems for improving the perfor-
approaches can be summarized into the following mance of physical layer security.
two cases.
Cooperative multipoint (CoMP) transmission Enhancing Physical Layer Security by NOMA
can be employed at UAVs. In particular, these NOMA is viewed as a promising technique to
multiple UAVs can form a virtual antenna array provide superior spectral efficiency by multiplex-
to enhance the received signal strength at legiti- ing information signals at different power lev-
mate receivers while degrading that at the eaves- els [13]. Hence, it is expected that NOMA can
droppers. Furthermore, with multiple UAVs in the bring additional rate and robustness to enhance
system, one can optimize their trajectories and the achievable rate in UAV physical layer securi-
resource allocations such that some UAVs trans- ty communications. Consider a scenario where
mit confidential signal to the legitimate ground a UAV acts as a relay to facilitate data delivery
receivers while the others send jamming signals to two receivers with different security clearance
to confuse the eavesdroppers. According to the levels within a maximum cruising duration T. The
availability of eavesdroppers’ positions, UAV can receiver with a lower security clearance level is
adopt different transmission schemes against a potential eavesdropper since it has a strong
active eavesdropping: motivation in intercepting signals intended for a
• When UAVs have complete position informa- receiver with a higher security clearance. Then,
tion on the eavesdroppers, multiple UAVs can when the eavesdropper suffers from a bad chan-
be employed to facilitate a joint trajectory and nel condition, NOMA is adopted to forward both
resource allocation design via forming a virtu- confidential and public information simultaneous-
al antenna array. Consequently, the confiden- ly. Otherwise, the UAV only broadcasts the public
tial signal transmission can be enhanced by information for security issues. The mode selec-
focusing the information energy beams on the tion between NOMA and unicast is chosen based
ground legitimate receiver while reducing the on the results of the proposed resource alloca-
possibility of information leakage. tion optimization. In particular, for maximizing the

44 IEEE Wireless Communications • October 2019


400
250
350
200
300

250 150
200
100
150

100 50

50
0
0
0 50 100 150 200 250 300 -2 -1 0 1 2

FIGURE 3. a) The rate region achieved by NOMA and OMA with different maximum cruising durations; b) the accumulated data for
the internal eavesdropper vs. its displacement with different accumulated confidential data rate targets.

spectral efficiency, one needs to jointly optimize nel, and hence the information can be safely con-
the transmission scheme, resource allocation, and veyed. However, it is obvious that this approach
UAV’s trajectory. may not achieve the best secrecy performance of
Under the aforementioned optimization frame- the system as the degrees of freedom are not fully
work, Fig. 3a depicts the optimal rate region utilized to improve the received signal powers at
achieved by NOMA and OMA, respectively, with the legitimate users. Therefore, there is a trade-off
different cruising durations. Figure 3b depicts the between improving the received signal strength
maximum accumulated public data rate achieved of the legitimate users and degrading the signal
at the eavesdropper vs. the horizontal displace- qualities of the eavesdroppers.
ment of the eavesdropper from the legitimate 3D Beamforming: Compared to the traditional
receiver. From Fig. 3, we find that NOMA always 2D beamforming, 3D beamforming can generate
outperforms OMA in all the considered scenar- separated beams in the 3D space simultaneous-
ios, which demonstrates the spectral efficiency ly to provide better service coverage [14]. Thus,
advantage brought by NOMA in striking a bal- 3D beamforming yields higher system throughput
ance between public data rate and confidential and can support more legitimate users than 2D
data rate. Moreover, based on Fig. 3b, we find beamforming. Generally, the 3D beamforming
that the accumulated rate drops rapidly when the technique is more suitable for scenarios where
eavesdropper is sufficiently close to the legitimate the users are distributed in 3D space with differ-
receiver. In fact, when the secrecy rate require- ent elevation angles to their transmitter. Due to
ment cannot be satisfied, we set the accumulated the high altitude of UAVs, the legitimate receiv-
public data rate as zero to account for the penalty ers and potential eavesdroppers can easily be
of the failure in guaranteeing secure communica- separated by their different altitudes and eleva-
tions. tion angles to the UAVs. Furthermore, the LoS
channel characteristic in UAV systems enables
enhAncIng physIcAl lAyer securIty by effective beamforming in both azimuth and ele-
multI-AntennA technology vation domains. Specifically, a narrow and precise
Multi-antenna technologies have been widely beamformer can be created to improve the trans-
considered in wireless communications due to mission efficiency with respect to the desired legit-
spatial degrees of freedom for achieving high imate receivers while reducing the possibilities of
spectral efficiency [13]. Recently, in order to con- information leakage to potential eavesdroppers.
currently improve the received signal power at
the legitimate receiver and degrade the signal enhAncIng physIcAl lAyer securIty by mmWAve
strength received at eavesdroppers, multi-antenna mmWave communications have been widely
technologies have also been investigated from studied in the literature [13], since they are able
the physical layer security aspect to enhance the to support high data rate by utilizing the abundant
secrecy performance and robustness of the sys- frequency bands. One of the major challenges for
tem. When speaking of the UAV wireless commu- mmWave communications is that its performance
nication systems, the applications of multi-antenna depends on the availability of LoS channels. Thus,
technology can be realized from the following compared to conventional terrestrial communica-
two approaches (Fig. 4). tions, the inherent LoS channels in UAV systems
Traditional 2D Beamforming: Traditional 2D facilitate the use of mmWave for high data rate
beamforming is an effective way to improve physi- communications.
cal layer security. For example, when the UAV has As demonstrated in [13], the mmWave chan-
complete knowledge of the CSI, the beamform- nels in UAV systems are very sparse in the angular
ing direction can simply be set pointing toward domain, as there are generally not many scat-
the orthogonal space of an eavesdropper’s chan- terers around UAVs in the sky. Hence, one can

IEEE Wireless Communications • October 2019 45


UAV designs an inappropriate transmission strate-
Legitimate receiver gy that benefits the signal reception at the eaves-
Azimuth
Azimut
u h angle
ut
3D Beamforming droppers. For example, the UAV may misjudge
Eavesdropper Azimuth anglee
the actual network environment and fly close to
Elevation
Elevat
a ion angle
at angl
the eavesdropper for confidential data delivery,
which increases the possibility of information leak-
age. Hence, investigating some efficient policies
Null space to eliminate the impact of a pilot contamination
2D Beamforming attack is challenging but important for safeguard-
ing UAV systems.
Physical Layer Security against Malicious
UAV Attacks: The high mobility and flexibility
of UAVs can be exploited not only to enhance
Eavesdropper physical layer security, but also to intercept the
confidential data and even perform jamming to
reduce the quality of the legitimate link, which
FIGURE 4. Illustration of the multi-antenna beamforming technique for enhanc- may bring more challenges than handling conven-
ing physical layer security. tional terrestrial eavesdroppers for safeguarding
UAV systems. However, only limited research has
been devoted to this important aspect from the
take advantages of the specific channel charac- communication theory perspective. Therefore,
teristics in mmWave UAV systems for realizing it is desired to investigate advanced techniques
highly directional transmission and exploit the in terms of the physical layer security to protect
huge bandwidth of mmWave frequency spectrum against malicious UAVs.
to avoid potential eavesdropping. For instance, Optimal Joint Trajectory and Resource Allo-
active eavesdropping attacks in UAV systems can cation Design: Compared to terrestrial systems,
be addressed by adopting frequency hopping the UAV-based system brings a new dimension
(FH) to hide confidential data over an ultra-wide to enhance physical layer security via designing
mmWave frequency spectrum. There are two the trajectory of a UAV. However, the designs of
main advantages of this technique. First, confiden- trajectory and resource allocation are generally
tial data can be hidden from the eavesdropper by coupled, which would make the design optimi-
frequently hopping to different carrier frequencies zation problem intractable. Consequently, most
without exploiting the CSI. Second, frequency existing designs are suboptimal. Unfortunately,
diversity can be exploited in FH to improve the the performance gaps between the optimal solu-
robustness against jamming active attacks. tion and existing suboptimal solutions are unclear.
Therefore, to improve the performance of physi-
open Issues And chAllenges cal layer security in UAV systems for mission-criti-
UAV-based wireless communications is a growing cal applications, efficient algorithms are desired to
research area, and handling the associated securi- strike a balance between computational complex-
ty issues is the key to unlock its potential. Despite ity and system performance.
the fruitful research in this area, there are a variety Limited Onboard Resources: One critical
of challenges to be tackled, as shown in Fig. 5. obstacle in UAV wireless communication sys-
In this section, we provide and list several open tems arises from the restricted flight duration,
issues and challenges for future works. limited onboard energy and computational capa-
Practical UAV Channel Modeling and Position bility, and so on, as the battery capacity, size, and
Acquisition: In the literature, the air-to-ground weight of UAVs are all limited. As such, investi-
channel is generally modeled by an LoS chan- gating advanced techniques to enable sustain-
nel. However, this model may not be accurate able secure UAV communication are desired. For
for some scenarios, such as urban areas. Conse- example, energy harvesting from solar and laser
quently, more efforts should be devoted to realis- provides a viable solution to supply energy to
tic channel modeling verified by practice field test UAVs on the fly. Besides, UAV cooperation can
measurements. Moreover, the mobility of UAVs effectively leverage the onboard resources among
has significant impacts on the CSI acquisition for all cooperative UAVs to enable secure communi-
both legitimate users and eavesdroppers. This cation.
brings challenges from the physical layer security
perspective, as efficient CSI acquisition algorithms conclusIon
usually exploit the physical properties of the wire- This article provides an overview and compre-
less channels. Therefore, it is necessary to design hensive discussions on the specific security issues
a pragmatic CSI acquisition mechanism to detect in UAV systems. Challenges and opportunities
and track positions of legitimate receivers and brought by UAVs for safeguarding UAV-based
eavesdroppers. communication systems via physical layer security
Physical Layer Security against Pilot Contami- are fully exploited. First, key problems in terms
nation Attacks: In practice, efficient beamforming of security attacks are revealed. Then physical
for secure UAV communications requires accu- layer security approaches in UAV systems are
rate CSI, which can be obtained by exploiting the proposed to effectively prevent both passive and
pilot signals. However, in some scenarios, active active eavesdropping. Particularly, we provide an
eavesdroppers intentionally transmit deterministic illustrative example of guaranteeing security pro-
pilot samples that are identical to those transmit- visioning by jointly designing a UAV’s trajecto-
ted by legitimate transmitters to deceive a UAV ry and resource allocation, which demonstrates
for facilitating eavesdropping [15]. As a result, the the advantages brought by the flexibility of UAVs.

46 IEEE Wireless Communications • October 2019


Information transmission

Information leakage Malicious


Blocked Pilot UAV
Jamming link
contamination

Eavesdropper Legitimate receiver Active eavesdropper Legitimate receiver


Legitimate receiver Eavesdropper
Legitimate receiver
Practical UAV channel modeling Pilot contamination attacks Malicious UAV attacks Limited onboard resources

FIGURE 5. Illustration of security challenges in UAV wireless communications.

Moreover, we propose to apply NOMA, mul- [11] N. Yang et al., “Safeguarding 5G Wireless Communication
Networks Using Physical Layer Security,” IEEE Commun.
tiple-input multiple-output, and mmWave tech- Mag., vol. 53, no. 4, Apr. 2015, pp. 20–27.
niques in UAV systems to further enhance the [12] C. Liu, J. Lee, and T. Q. S. Quek, “Safeguarding UAV Com-
physical layer security and spectral efficiency. munications Against Full-Duplex Active Eavesdropper,” IEEE
Finally, some potential research directions and Trans. Wireless Commun., vol. 18, no. 6, June 2019, pp.
2919–31.
challenges are envisioned. [13] V. W. Wong et al., Key Technologies for 5G Wireless Sys-
tems, Cambridge Univ. Press, 2017.
AcKnoWledgments [14] Y. Zeng, J. Lyu, and R. Zhang, “Cellular-Connected UAV:
This work was supported in part by the Funda- Potential, Challenges, and Promising Technologies,” IEEE
Wireless Commun., vol. 26, no. 1, Feb. 2019, pp. 120–27.
mental Research Funds for the Central Univer- [15] X. Zhou, B. Maham, and A. Hjorungnes, “Pilot Contamina-
sities, China, under grant number 2019RC041, tion for Active Eavesdropping,” IEEE Trans. Wireless Com-
in part by funding from the UNSW Digital mun., vol. 11, no. 3, Mar. 2012, pp. 903–07.
Grid Futures Institute, UNSW, Sydney, under a
cross-disciplinary fund scheme, in part by the bIogrAphIes
XIAOFANG SUN [S’14, M’19] (xiaofangsun@bjtu.edu.cn) is cur-
Australian Research Council’s Discovery Project rently a lecturer at Beijing Jiaotong University, China. She
(DP190101363), in part by the UK EPSRC under received her B.E. and Ph. D degrees from Beijing Jiaotong
grant number EP/P009719/2, in part by H2020- University in 2013 and 2019, respectively. From August 2014
MSCA-RISE-2015 under grant number 690750, to July 2015, she was a visiting student with the University of
Nebraska Lincoln, Omaha. From September 2016 to September
in part by the National Key R\&D Program of 2017, she was a visiting student with the Australian National
China under Grant number 2018YFB1201500 University, Canberra. Her current research interests focus on
and 2016YFE0200900, and in part by the Proj- resource allocation of wireless communication networks and
ect of China Railway Corporation (N2018G025, UAV-enabled wireless communications.
N2018G072 and P2018G052). DERRICK WING KWAN NG [S’06, M’12, SM’17] (w.k.ng@nusw.
edu.au) is now working as a senior lecturer and an ARC DECRA
references research fellow at the University of New South Wales, Sydney,
[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless Communications Australia. His research interests include convex and non-convex
with Unmanned Aerial Vehicles: Opportunities and Chal- optimization, physical layer security, wireless information and
lenges,” IEEE Commun. Mag., vol. 54, no. 5, May 2016, pp. power transfer, and green (energy-efficient) wireless commu-
36–42. nications. He is listed as a 2018 Highly Cited Researcher by
[2] 3GPP, “Technical Specification Group Radio Access Net- Clarivate Analytics.
work: Study on Enhanced LTE Support for Aerial Vehicles,”
TR 36.777, v. 15.0.0, 2017. ZHIGUO DING [S’03, M’05, SM’15] (zhiguo.ding@manchester.
[3] A. Mukherjee et al., “Principles of Physical Layer Security in ac.uk) is currently a professor in communications at the Univer-
Multiuser Wireless Networks: A survey,” IEEE Commun. Sur- sity of Manchester. Since September 2012 he has also been an
veys & Tutorials, vol. 16, no. 3, 2014, pp. 1550–73. academic visitor at Princeton University. His research interests
[4] Y. Cai et al., “Dual-UAV Enabled Secure Communications: are 5G networks, signal processing, and statistical signal pro-
Joint Trajectory Design and User Scheduling,” IEEE JSAC, cessing. He has been serving as an Editor for IEEE TCOM and
vol. 36, no. 9, Sept. 2018, pp. 1972–85. IEEE TVT, and served as an Editor for IEEE WCL and IEEE CL. He
[5] A. Li, Q. Wu, and R. Zhang, “UAV-Enabled Cooperative Jam- received the EU Marie Curie Fellowship 2012–2014, IEEE TVT
ming for Improving Secrecy of Ground Wiretap Channel,” Top Editor 2017, 2018 IEEE ComSoc Heinrich Hertz Award,
IEEE Wireless Commun. Lett., vol. 8, no. 1, Feb. 2019, pp. 2018 IEEE VTS Jack Neubauer Memorial Award, and 2018 IEEE
181–84. SPS Best Signal Processing Letter Award.
[6] X. Sun et al., “Joint Resource Allocation and Trajectory
Design for UAV-Aided Wireless Physical Layer Security,” Y ANQING X U (yanqing_xu@bjtu.edu.cn) received his Ph.D.
Proc. IEEE GLOBECOM Wksps., Abu Dhabi, UAE, Dec. 2018. degree from the State Key Lab of Rail Traffic Control and Safety,
[7] J. Huang and A. L. Swindlehurst, “Robust Secure Transmis- Beijing Jiaotong University, China, in 2019. His research inter-
sion in MISO Channels Based on Worst-Case Optimization,” ests include NOMA, hybrid ARQ, and ultra-reliable and low-la-
IEEE Trans. Signal Processing, vol. 60, no. 4, Apr. 2012, pp. tency communications.
1696–1707.
[8] Y. Zhou et al., “Improving Physical Layer Security Via A UAV ZHANGDUI ZHONG [SM’16] (zhdzhong@bjtu.edu.cn) received his
Friendly Jammer for Unknown Eavesdropper Location,” IEEE B.E. and M.S. degrees from Beijing Jiaotong University in 1983
Trans. Vehic. Tech., vol. 67, no. 11, Nov. 201, pp. 11,280– and 1988, respectively. He is currently a professor with Beijing
12,848. Jiaotong University, where he is also currently a chief scientist
[9] L. J. Rodriguez et al., “Physical Layer Security in Wireless of the State Key Laboratory of Rail Traffic Control and Safety.
Cooperative Relay Networks: State of the Art and Beyond,” His interests include wireless communications for railways, con-
IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 32–39. trol theory and techniques for railways, and GSM-R systems. He
[10] Y. Wu et al., “Secure Massive MIMO Transmission with an received the Mao YiSheng Scientific Award of China, Zhan Tian-
Active Eavesdropper,” IEEE Trans. Info. Theory, vol. 62, no. 7, You Railway Honorary Award of China, and Top 10 Science/
July 2016, pp. 3880–3900. Technology Achievements Award of Chinese Universities.

IEEE Wireless Communications • October 2019 47

You might also like