Professional Documents
Culture Documents
Xiaofang Sun, Yanqing Xu, (corresponding author) and Zhangdui Zhong are with the State Key Lab of Rail Traffic Control and Safety and
Digital Object Identifier: the Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications; Derrick Wing Kwan Ng is with the
10.1109/MWC.001.1900028 University of New South Wales; Zhiguo Ding is with the University of Manchester.
Partial Position Information of Eavesdrop- characteristics, but also consumes more energy
pers: When the eavesdroppers stay quasi-station- to combat the active eavesdropping.
ary or move in certain areas, obtaining precise • Cooperative half-duplex (HD) eavesdroppers:
position information of eavesdroppers is challeng- Multiple HD eavesdroppers can mimic an FD
ing and expensive in terms of hardware cost and eavesdropper via cooperation. For instance,
energy consumption. Then, with the aid of an some eavesdroppers transmit jamming to a
equipped camera or radar on the UAV, it is possi- legitimate receiver, while others intercept con-
ble to obtain partial position information of these fidential signals.
eavesdroppers at the UAV via sensing and track- In both situations, when the CSI of the legit-
ing. In the literature, worst case secrecy capac- imate receiver is available at the active eaves-
ity and secrecy outage probability are the two droppers, the UAV systems become severely
common metrics to evaluate the performance of vulnerable, as the active eavesdroppers can effi-
UAV systems with partial position information of ciently interfere the legitimate receiver.
external eavesdroppers [3, 7, 8].
Absence of Position Information of Eaves-
droppers: When eavesdroppers hide themselves
Physical Layer Security Techniques for
physically, it is difficult for the UAV to detect and UAV Systems
track them. This raises a problem in which the To enhance physical layer security, the unique
complete absence of position information makes properties of UAVs (e.g., high mobility and flexi-
the UAV system extremely vulnerable to eaves- bility in positioning) can be exploited. Moreover,
dropping. In such scenarios, perfectly secure com- by using advanced resource allocation tech-
munications cannot always be guaranteed. niques, the secrecy performance can be further
improved. In the following, we discuss the specific
Active Eavesdropping Scenarios effective physical layer security strategies against
Compared to passive eavesdroppers, active ones the corresponding eavesdroppers listed earlier in
are more dangerous. The reasons are twofold. air-to-ground channels, as shown in Table 1.
On one hand, active eavesdropping intends to
attack the main channel by degrading the channel Anti-Eavesdropping Techniques
capacity. For instance, active eavesdroppers trans- Joint Trajectory and Resource Allocation
mit jamming signals to the legitimate receiver for Design: In UAV systems, various resources need
degrading the capacity of the main channel (i.e., to be allocated, such as transmit power, cruising
C M). On the other hand, the active eavesdrop- speed, time slot, and frequency bandwidth. It is
per may also aim to improve the capacity of the noted that resource allocation affects the signal
eavesdropping channel. As such, eavesdropping strength received at not only the legitimate receiv-
attacks caused by active eavesdroppers are more er, but also the eavesdroppers. In the following,
harmful than those of passive ones. Specifically, we first discuss how trajectory design can be
the LoS channel characteristic can improve the exploited to improve the physical layer security
capacity of the eavesdropping channel when the in UAV systems. We then provide an overview of
UAV is a legitimate transmitter. According to the the joint design of resource allocation and trajec-
duplexing mode, we discuss the following two tory for physical layer security provisioning.
types of jamming attacks in UAV wireless commu- Trajectory Design Approach: UAV trajectory
nication systems: design has become an important research topic
• Full-duplex (FD) eavesdropper: An FD active for realizing efficient UAV-based communica-
eavesdropper transmits jamming noise and tion systems [4–6]. In terms of communication
intercepts confidential signals simultaneous- security, the UAV can fly close to the legitimate
ly and independently [12]. In such scenarios, ground node and away from the eavesdropper if
the UAV would increase its transmit power to it is possible. The principle is to carefully design
improve the quality of the jammed channel, the trajectory of UAV such that the legitimate link
which not only facilitates the eavesdropping at can be enhanced while the eavesdropping link is
the FD eavesdropper due to the LoS channel weakened.
0
2
-1 0
0 100 200 300 400 500
20
1
km
0 10
-1 0
0 100 200 300 400 500
-2 0 2 4 6
km
FIGURE 2. The optimized UAV trajectories for the eavesdropper move a) counterclockwise; b) clockwise around the legitimate receiv-
er with radius 1 km; c) the achieved system rate and d) the corresponding cruising speed via joint trajectory and resource alloca-
tion design to enhance the physical layer security in UAV-aided wireless communication scenarios.
250 150
200
100
150
100 50
50
0
0
0 50 100 150 200 250 300 -2 -1 0 1 2
FIGURE 3. a) The rate region achieved by NOMA and OMA with different maximum cruising durations; b) the accumulated data for
the internal eavesdropper vs. its displacement with different accumulated confidential data rate targets.
spectral efficiency, one needs to jointly optimize nel, and hence the information can be safely con-
the transmission scheme, resource allocation, and veyed. However, it is obvious that this approach
UAV’s trajectory. may not achieve the best secrecy performance of
Under the aforementioned optimization frame- the system as the degrees of freedom are not fully
work, Fig. 3a depicts the optimal rate region utilized to improve the received signal powers at
achieved by NOMA and OMA, respectively, with the legitimate users. Therefore, there is a trade-off
different cruising durations. Figure 3b depicts the between improving the received signal strength
maximum accumulated public data rate achieved of the legitimate users and degrading the signal
at the eavesdropper vs. the horizontal displace- qualities of the eavesdroppers.
ment of the eavesdropper from the legitimate 3D Beamforming: Compared to the traditional
receiver. From Fig. 3, we find that NOMA always 2D beamforming, 3D beamforming can generate
outperforms OMA in all the considered scenar- separated beams in the 3D space simultaneous-
ios, which demonstrates the spectral efficiency ly to provide better service coverage [14]. Thus,
advantage brought by NOMA in striking a bal- 3D beamforming yields higher system throughput
ance between public data rate and confidential and can support more legitimate users than 2D
data rate. Moreover, based on Fig. 3b, we find beamforming. Generally, the 3D beamforming
that the accumulated rate drops rapidly when the technique is more suitable for scenarios where
eavesdropper is sufficiently close to the legitimate the users are distributed in 3D space with differ-
receiver. In fact, when the secrecy rate require- ent elevation angles to their transmitter. Due to
ment cannot be satisfied, we set the accumulated the high altitude of UAVs, the legitimate receiv-
public data rate as zero to account for the penalty ers and potential eavesdroppers can easily be
of the failure in guaranteeing secure communica- separated by their different altitudes and eleva-
tions. tion angles to the UAVs. Furthermore, the LoS
channel characteristic in UAV systems enables
enhAncIng physIcAl lAyer securIty by effective beamforming in both azimuth and ele-
multI-AntennA technology vation domains. Specifically, a narrow and precise
Multi-antenna technologies have been widely beamformer can be created to improve the trans-
considered in wireless communications due to mission efficiency with respect to the desired legit-
spatial degrees of freedom for achieving high imate receivers while reducing the possibilities of
spectral efficiency [13]. Recently, in order to con- information leakage to potential eavesdroppers.
currently improve the received signal power at
the legitimate receiver and degrade the signal enhAncIng physIcAl lAyer securIty by mmWAve
strength received at eavesdroppers, multi-antenna mmWave communications have been widely
technologies have also been investigated from studied in the literature [13], since they are able
the physical layer security aspect to enhance the to support high data rate by utilizing the abundant
secrecy performance and robustness of the sys- frequency bands. One of the major challenges for
tem. When speaking of the UAV wireless commu- mmWave communications is that its performance
nication systems, the applications of multi-antenna depends on the availability of LoS channels. Thus,
technology can be realized from the following compared to conventional terrestrial communica-
two approaches (Fig. 4). tions, the inherent LoS channels in UAV systems
Traditional 2D Beamforming: Traditional 2D facilitate the use of mmWave for high data rate
beamforming is an effective way to improve physi- communications.
cal layer security. For example, when the UAV has As demonstrated in [13], the mmWave chan-
complete knowledge of the CSI, the beamform- nels in UAV systems are very sparse in the angular
ing direction can simply be set pointing toward domain, as there are generally not many scat-
the orthogonal space of an eavesdropper’s chan- terers around UAVs in the sky. Hence, one can
Moreover, we propose to apply NOMA, mul- [11] N. Yang et al., “Safeguarding 5G Wireless Communication
Networks Using Physical Layer Security,” IEEE Commun.
tiple-input multiple-output, and mmWave tech- Mag., vol. 53, no. 4, Apr. 2015, pp. 20–27.
niques in UAV systems to further enhance the [12] C. Liu, J. Lee, and T. Q. S. Quek, “Safeguarding UAV Com-
physical layer security and spectral efficiency. munications Against Full-Duplex Active Eavesdropper,” IEEE
Finally, some potential research directions and Trans. Wireless Commun., vol. 18, no. 6, June 2019, pp.
2919–31.
challenges are envisioned. [13] V. W. Wong et al., Key Technologies for 5G Wireless Sys-
tems, Cambridge Univ. Press, 2017.
AcKnoWledgments [14] Y. Zeng, J. Lyu, and R. Zhang, “Cellular-Connected UAV:
This work was supported in part by the Funda- Potential, Challenges, and Promising Technologies,” IEEE
Wireless Commun., vol. 26, no. 1, Feb. 2019, pp. 120–27.
mental Research Funds for the Central Univer- [15] X. Zhou, B. Maham, and A. Hjorungnes, “Pilot Contamina-
sities, China, under grant number 2019RC041, tion for Active Eavesdropping,” IEEE Trans. Wireless Com-
in part by funding from the UNSW Digital mun., vol. 11, no. 3, Mar. 2012, pp. 903–07.
Grid Futures Institute, UNSW, Sydney, under a
cross-disciplinary fund scheme, in part by the bIogrAphIes
XIAOFANG SUN [S’14, M’19] (xiaofangsun@bjtu.edu.cn) is cur-
Australian Research Council’s Discovery Project rently a lecturer at Beijing Jiaotong University, China. She
(DP190101363), in part by the UK EPSRC under received her B.E. and Ph. D degrees from Beijing Jiaotong
grant number EP/P009719/2, in part by H2020- University in 2013 and 2019, respectively. From August 2014
MSCA-RISE-2015 under grant number 690750, to July 2015, she was a visiting student with the University of
Nebraska Lincoln, Omaha. From September 2016 to September
in part by the National Key R\&D Program of 2017, she was a visiting student with the Australian National
China under Grant number 2018YFB1201500 University, Canberra. Her current research interests focus on
and 2016YFE0200900, and in part by the Proj- resource allocation of wireless communication networks and
ect of China Railway Corporation (N2018G025, UAV-enabled wireless communications.
N2018G072 and P2018G052). DERRICK WING KWAN NG [S’06, M’12, SM’17] (w.k.ng@nusw.
edu.au) is now working as a senior lecturer and an ARC DECRA
references research fellow at the University of New South Wales, Sydney,
[1] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless Communications Australia. His research interests include convex and non-convex
with Unmanned Aerial Vehicles: Opportunities and Chal- optimization, physical layer security, wireless information and
lenges,” IEEE Commun. Mag., vol. 54, no. 5, May 2016, pp. power transfer, and green (energy-efficient) wireless commu-
36–42. nications. He is listed as a 2018 Highly Cited Researcher by
[2] 3GPP, “Technical Specification Group Radio Access Net- Clarivate Analytics.
work: Study on Enhanced LTE Support for Aerial Vehicles,”
TR 36.777, v. 15.0.0, 2017. ZHIGUO DING [S’03, M’05, SM’15] (zhiguo.ding@manchester.
[3] A. Mukherjee et al., “Principles of Physical Layer Security in ac.uk) is currently a professor in communications at the Univer-
Multiuser Wireless Networks: A survey,” IEEE Commun. Sur- sity of Manchester. Since September 2012 he has also been an
veys & Tutorials, vol. 16, no. 3, 2014, pp. 1550–73. academic visitor at Princeton University. His research interests
[4] Y. Cai et al., “Dual-UAV Enabled Secure Communications: are 5G networks, signal processing, and statistical signal pro-
Joint Trajectory Design and User Scheduling,” IEEE JSAC, cessing. He has been serving as an Editor for IEEE TCOM and
vol. 36, no. 9, Sept. 2018, pp. 1972–85. IEEE TVT, and served as an Editor for IEEE WCL and IEEE CL. He
[5] A. Li, Q. Wu, and R. Zhang, “UAV-Enabled Cooperative Jam- received the EU Marie Curie Fellowship 2012–2014, IEEE TVT
ming for Improving Secrecy of Ground Wiretap Channel,” Top Editor 2017, 2018 IEEE ComSoc Heinrich Hertz Award,
IEEE Wireless Commun. Lett., vol. 8, no. 1, Feb. 2019, pp. 2018 IEEE VTS Jack Neubauer Memorial Award, and 2018 IEEE
181–84. SPS Best Signal Processing Letter Award.
[6] X. Sun et al., “Joint Resource Allocation and Trajectory
Design for UAV-Aided Wireless Physical Layer Security,” Y ANQING X U (yanqing_xu@bjtu.edu.cn) received his Ph.D.
Proc. IEEE GLOBECOM Wksps., Abu Dhabi, UAE, Dec. 2018. degree from the State Key Lab of Rail Traffic Control and Safety,
[7] J. Huang and A. L. Swindlehurst, “Robust Secure Transmis- Beijing Jiaotong University, China, in 2019. His research inter-
sion in MISO Channels Based on Worst-Case Optimization,” ests include NOMA, hybrid ARQ, and ultra-reliable and low-la-
IEEE Trans. Signal Processing, vol. 60, no. 4, Apr. 2012, pp. tency communications.
1696–1707.
[8] Y. Zhou et al., “Improving Physical Layer Security Via A UAV ZHANGDUI ZHONG [SM’16] (zhdzhong@bjtu.edu.cn) received his
Friendly Jammer for Unknown Eavesdropper Location,” IEEE B.E. and M.S. degrees from Beijing Jiaotong University in 1983
Trans. Vehic. Tech., vol. 67, no. 11, Nov. 201, pp. 11,280– and 1988, respectively. He is currently a professor with Beijing
12,848. Jiaotong University, where he is also currently a chief scientist
[9] L. J. Rodriguez et al., “Physical Layer Security in Wireless of the State Key Laboratory of Rail Traffic Control and Safety.
Cooperative Relay Networks: State of the Art and Beyond,” His interests include wireless communications for railways, con-
IEEE Commun. Mag., vol. 53, no. 12, Dec. 2015, pp. 32–39. trol theory and techniques for railways, and GSM-R systems. He
[10] Y. Wu et al., “Secure Massive MIMO Transmission with an received the Mao YiSheng Scientific Award of China, Zhan Tian-
Active Eavesdropper,” IEEE Trans. Info. Theory, vol. 62, no. 7, You Railway Honorary Award of China, and Top 10 Science/
July 2016, pp. 3880–3900. Technology Achievements Award of Chinese Universities.