You are on page 1of 8

SAFEGUARDING 5G-AND-BEYOND NETWORKS WITH PHYSICAL LAYER SECURITY

UAV-Involved Wireless Physical-Layer


Secure Communications:
Overview and Research Directions
Hui-Ming Wang, Xu Zhang, and Jia-Cheng Jiang

Abstract also been considered to play an important role


in future communication systems [2]. On one
Due to their flexible deployment and on-de- hand, since UAVs are generally exploited to carry
mand mobility, small-scale unmanned aerial vehi- out tasks at a relatively high altitude, the aerial-
cles (UAVs) are anticipated to be involved in to-ground (A2G) line-of-sight (LoS) channels are
widespread communication applications in the likely to provide channel superiority compared to
forthcoming fifth-generation networks. However, ground communication channels in cellular net-
the confidentiality of UAV communication appli- works, which are significantly affected by severe
cations is vulnerable to security threats due to the fading and shadowing effects. On the other
broadcast nature and dominant line-of-sight chan- hand, due to their on-demand mobility character-
nel conditions, and physical-layer security can be istic, UAVs can be flexibly deployed, which will
applied for secrecy performance enhancement in introduce new degrees of freedom (DoFs) with
such a context. On the other hand, it is also prom- respect to their positions. To facilitate efficient
ising to exploit UAVs to cooperatively protect and reliable transmission, the established UAV-in-
secure communications. This article provides an volved communication links can be categorized
overview of the recent research efforts on UAV-in- as payload communication and control and
volved secure communications at the physical non-payload communication (CNPC), the specific
layer. We focus on the design of secure transmis- requirements of which can be totally different and
sion schemes according to different roles of UAVs thus have been specified by the Third Generation
and the optimization of introduced degrees of Partnership Project (3GPP) recently.
freedom by the unique characteristics of UAVs. Due to the openness of the wireless environ-
We also propose some future research directions ment, the security and privacy of wireless com-
on this topic. munication applications are of utmost concern.
In particular, the confidentiality of UAV wireless
Introduction communications is more challenging to protect
Equipped with various kinds of sensors and actu- under LoS propagations, which potentially pro-
ators like the inertial measurement unit (IMU), vide strong quality of A2G wiretap channels for
range sensors (ultrasonic, infrared, laser), barom- hostile entities. Therefore, effective methods are
eter, magnetometer, GPS, cameras, and visual urgently needed for secure UAV communications.
systems, unmanned aerial vehicles (UAVs) are Traditionally, the cryptography-based methods
promising to support a wide range of appli- are exploited to protect the confidentiality of
cations due to their characteristics of flexible secure communications by using shared secret
deployment, low acquisition and maintenance keys. However, the high mobility characteristic
costs, high maneuverability, and hovering ability of UAVs makes the corresponding key manage-
[1]. Historically, UAVs have been considered for ment and distribution more challenging. Besides,
military applications from the beginning to carry ultra-reliable and low-latency communication
out some simple but risky tasks, such as moni- links between UAVs and the associated ground
toring and attacking hostile targets. Thereafter, control stations (GCSs) are required to support
This work was supported in further attention has been paid to applying small- their two-way on-demand control to ensure safe
part by the National Natural scale UAVs for emerging civilian tasks, including and efficient operation of UAVs. Therefore, the
Science Foundation of China
under Grant 61671364,
aerial photography, emergency search and res- cryptography-based methods are unsuitable due
in part by the Outstanding cue, resource exploration, cargo transport, and to the significant processing delay. In addition, a
Young Research Fund of so on. The U.S. Federal Aviation Administration general drawback of cryptography-based methods
Shaanxi Province under (FAA) has released operational rules to guideline is that these methods are dependent on the com-
Grant 2018JC 003, in part
by the Innovation Team
the working definition of low-altitude small-scale putational complexity, and thus perfect secrecy
Research Fund of Shaanxi UAVs with aircraft weight less than 55 pounds cannot be guaranteed. The methods will be inval-
Province under Grant and maximum altitude less than 400 feet above id if the hostile entity has powerful computing
2019TD 013, and in part ground level. FAA has launched a further national devices. Under this condition, physical-layer secu-
by the HuaWei Develop-
ment Fund under Grant
program, the “Drone Integration Pilot Program,” rity (PLS) has been proposed and developed as a
YBN2018115166 2. to explore the expanded use of UAVs. Motivat- key complementary technique for secure wireless
ed by their unique characteristics, UAVs have communications [3]. The basic idea of PLS is to
Digital Object Identifier:
10.1109/MWC.001.1900045 Hui-Ming Wang (corresponding author), Xu Zhang and Jia-Cheng Jiang are with Xi’an Jiaotong University.

32 1536-1284/19/$25.00 © 2019 IEEE IEEE Wireless Communications • October 2019


exploit the randomness characteristics of wireless
channels, which is key-less and thus promising
for UAV secure communications to overcome
the aforementioned drawbacks. In addition, since
secrecy performance is highly dependent on
the superiority of legitimate channels to wiretap
channels, additional DoFs provided by the on-de-
mand mobility of UAVs can be exploited to guar-
antee the expected channel superiority and thus
improve secrecy performance.
In such a context, UAV-involved physi-
cal-layer secure wireless communications has
attracted increasing interest in recent years. In
general, they could be categorized as UAV-en-
abled secure communications and UAV-aided
secure cooperation, according to different roles FIGURE 1. Specific applications for UAV-involved secure communications.
of UAVs in secure communications. Specifically,
UAVs can be exploited as legitimate transceiv-
ers for the former typical scenario to establish UAVs can also be exploited as aerial terminals
direct communication links, such as aerial base with their own missions such as aerial surveillance
stations providing temporary wireless connec- and video streaming. UAV aerial terminals are
tions for ground users or aerial terminals carrying under the control of associated GCSs through
on other specific tasks (e.g., surveillance). For CNPC links for automatic operation and are will-
the latter typical scenario, UAVs are exploited ing to establish data transmission links with ground
to enable friendly relaying or jamming, so as to base stations (GBSs) for information exchange. In
cooperatively enhance the secrecy performance both cases, however, the confidentiality of UAV
of secure communications. Compared to the communications is vulnerable to security threats
existing traditional PLS research, the most signif- from hostile entities due to the broadcast nature
icant difference is that extra security DoFs have of wireless transmissions. As a result, enhancing
been introduced in UAV wireless communica- the corresponding secrecy at the physical layer
tions, inspired by the flexible deployment and becomes critical for the above application sce-
on-demand mobility of UAVs. Specifically, 3D narios.
deployment of static UAVs and trajectory design To further improve secrecy performance,
of mobile UAVs together with transmit power UAV-aided secure cooperation is recognized as
can be jointly optimized for secrecy perfor- another typical application scenario and can be
mance enhancement. Efficient secure transmis- generally categorized as UAV-enabled mobile
sion schemes should be carefully designed, and relaying and UAV-enabled friendly jamming. Due
position/trajectory/power should be optimized. to their on-demand mobility, UAVs could be
However, a well-organized overview of recent deployed as mobile relays to enhance the supe-
research progress on this topic is still absent as riority of legitimate channels in the dynamic envi-
far as we know, which motivates this article. ronment, and the dominant LoS conditions can
The article is organized as follows. The typi- also be exploited for UAV-enabled friendly jam-
cal application scenarios of UAV-involved secure ming to effectively degrade the quality of wiretap
wireless communications as well as the main channels. As a result, both will improve secrecy
design considerations brought in by the mobility capacity according to the basic principles of PLS.
of UAVs are introduced. Then we focus on the The most significant observation is that new
recent research efforts on UAV-involved secure security DoFs, including 3D position design of
communications under various typical applica- static UAVs and trajectory design of mobile UAVs,
tion scenarios. Finally, we propose some future have been introduced by the on-demand mobility
research directions on this topic. characteristic of UAVs. Together with the tradi-
tional DoF, transmit power design, they could be
Typical Application Scenarios and exploited jointly to enhance secrecy performance
of UAV-involved transmission schemes under dif-
Main Design Considerations ferent typical application scenarios. The corre-
As mentioned above, the typical application sce- sponding issues on these aspects are discussed
narios can essentially be summarized as UAV-en- below.
abled secure communications and UAV-aided Under the secure communication scenarios
secure cooperation according to different roles involving static UAVs, the 3D position design will
of UAVs in secure communications. Furthermore, significantly affect the secrecy performance of
a hybrid secure transmission scheme could be secure transmissions. For a tractable analysis, the
obtained by combining the two typical applica- optimal 3D position can be determined by joint
tion scenarios. Figure 1 depicts the methodology design of UAV horizontal position and flight alti-
of UAV-involved secure communications. tude. The design of horizontal position is related
For the first typical scenario, UAVs can be to the distributions of both legitimate users and
exploited as aerial base stations to potentially pro- ground eavesdroppers. Intuitively, UAVs should
vide temporary connectivity services for the area be positioned horizontally close to legitimate
without cellular infrastructure coverage. It may users and far away from potential eavesdrop-
happen due to natural disasters in emergency sit- pers when providing communication services or
uations or data traffic offloading in a hotspot area cooperative relaying, while in a reverse manner
with densely distributed users. On the other hand, when providing friendly jamming. On the other

IEEE Wireless Communications • October 2019 33


UAV Aerial Base Stations
Due to their high mobility, UAVs can be flexibly
deployed as aerial base stations to provide tem-
porary communication services for a certain area,
as depicted in Fig. 2. Due to the broadcast nature
of wireless transmissions and the dominating
strong LoS channels, there are severe eavesdrop-
ping threats on secure transmissions. Based on
the location information of legitimate users and
potential eavesdroppers, the on-demand mobil-
ity of UAVs can be exploited to simultaneously
enhance the quality of legitimate channels and
reduce the quality of wiretap channels as much as
possible, and thus improve secrecy performance.
FIGURE 2. UAV aerial base stations to provide temporary secure communica- The corresponding problem involving UAV
tion services for certain areas. aerial base stations was first investigated in [4].
Assuming that the position of the ground eaves-
dropper was available under LoS propagations,
hand, with the increase of UAV flight height, the the trajectory and transmit power of the UAV
effect of large-scale path loss is enhanced while aerial base station were jointly optimized to max-
the probability of the LoS path being blocked is imize the average achievable secrecy rate. Fig-
reduced. Therefore, the optimal flight altitude ure 3 depicts the optimal UAV trajectory designs
generally exists under different conditions. and the corresponding achievable secrecy rates
Due to their on-demand mobility characteris- for different flight periods. It is observed that the
tic, the trajectory design of mobile UAVs is further flight period is of great importance on the fea-
considered to be exploited for secure commu- sibility in designing an efficient trajectory. If the
nications. It is expected to enhance the superi- flight period is sufficiently large, the optimal fly-
ority of legitimate channels to wiretap channels hover-fly scheme is adopted where a UAV aerial
by proper trajectory design, which is beneficial base station always flies at the maximum speed
to improve secrecy capacity according to the to reach the optimal position and then hovers (for
basic principles of PLS. To facilitate the trajecto- rotary-wing UAV without minimum flying speed
ry design, the periodic flight duration is general- limit) for better secrecy performance.
ly discretized into multiple short time slots, and However, the actual locations of passive
mobile UAVs are approximately assumed static in eavesdroppers are difficult to accurately estimate
each time slot. It is worth noting that the length in practice. Therefore, dealing with the position
of each time slot should be carefully chosen since uncertainty becomes more challenging. In [6],
a short time slot will simultaneously lead to high only the estimated locations of the ground eaves-
approximation accuracy of static UAVs and high droppers were available, and their exact loca-
complexity of the designing problems. tions were assumed in an area with a bounded
Combined with the positions and trajecto- estimation error. In this case, the authors jointly
ries of UAVs, the power-domain DoFs should be optimized the trajectory and transmit power to
jointly optimized to further improve secrecy per- maximize the average worst case secrecy rate.
formance. The quality of both legitimate chan- To effectively solve the non-convex optimization
nels and wiretap channels is time-variant during problem, S-procedure was introduced to deal with
the flight period, which significantly affects the the channel uncertainty problem, and the block
transmit power design. Generally, under differ- coordinate descent method with successive con-
ent application scenarios of UAV-involved secure vex approximation (SCA) was exploited to itera-
communications, the purpose of transmit power tively obtain a sub-optimal solution. The proposed
design is to sufficiently make use of the channel robust transmission scheme is validated to signifi-
superiority of legitimate channels to improve the cantly improve the secrecy performance in the
secrecy capacity or to increase the channel supe- case of imperfect location estimation.
riority in an opportunistic manner. As for static UAV aerial base stations, the
Based on the aforementioned application sce- multi-antenna technology is potential to enhance
narios and main design considerations, the recent the superiority of equivalent legitimate channels
research efforts on both UAV-enabled secure by proper beamforming design. In [6], the authors
communications and UAV-aided secure cooper- investigated millimeter-wave (mmWave) secure
ation are provided subsequently. After that, we transmissions in Nakagami-m fading environment
provide some valuable future research directions with mixed LoS/non-LoS (NLoS) A2G channels, and
according to the comprehensive analysis of the the 3D antenna gains of UAV aerial base stations
recent research efforts. were considered in a stochastic geometry frame-
work. To incorporate the UAV minimum separation
UAV-Enabled Secure Communications distance requirements, the matérn hardcore process
In this section, we provide the recent research was used to characterize the locations of UAV aeri-
efforts on UAV-enabled secure communications. al base stations. In addition, some of the random
Based on different roles of UAVs, the specific distributed UAVs were further exploited as friendly
applications in this scenario can be separately jammers to improve the secrecy performance, and
categorized as UAV aerial base stations and UAV the analytical expressions of the target user’s aver-
aerial legitimate terminals, which are discussed in age secrecy rate were derived. It has been shown
the following parts. that although the achievable rates of both legitimate

34 IEEE Wireless Communications • October 2019


60 50
Eavesdropper User
40 Eavesdropper 40

20 Initial Position Final Position


30

20 Initial Position
0

T=40s 10
T=60/80/100/40/200/400s
-20
0

-40
User -10

-60 -20
Final Position
T=60/80/100/200/400s
-80 -30
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200

2.4 2.4

2.2 2.2
Achievable Secrecy Rate(bit/s/Hz)

Achievable Secrecy Rate(bit/s/Hz)


2
2
1.8
1.8
1.6
1.6
1.4
1.4
1.2
1.2
1

0.8 1

0.6 0.8
0 50 100 150 200 250 300 350 400 0 50 100 150 200 250 300 350 400
Flight Period(s) Flight Period(s)

FIGURE 3. The optimal trajectory designs of a UAV aerial base station and the corresponding achievable secrecy rates against an
external eavesdropper for different flight periods. The maximum speed of UAV is 5 m/s and the reference signal-to-noise ratio
(SNR) at the reference distance d0 = 1 m is 80 dB. The flying altitude of UAV is set as 50 m.

users and eavesdroppers increase with the trans- To further take the mobility of UAVs into
mit power of UAV aerial base stations, there is an consideration, the authors in [8] investigated the
optimal transmit power for maximizing the average trajectory planning of the UAV aerial legitimate
secrecy rate under certain conditions. terminal against malicious jamming to enhance
the quality of G2A secure communications. The
UAV Aerial Legitimate Terminals positions and jamming powers of ground attack-
Due to their flexible deployment and high mobili- ers were assumed to be fixed during the flight
ty, UAVs have also been exploited as aerial termi- period, and were empirically estimated by the cor-
nals to carry out some special tasks. Since UAV responding statistical values. Then the 3D trajec-
aerial terminals operate in a practically automatic tory was optimized to maximize the achievable
manner under the control of associated GCSs via throughput over the flight period, and SCA meth-
wireless links, their communication security is a ods were exploited to overcome the non-convex-
critical issue and needs protection. ity of the optimization problem. Moreover, the
In [7], the authors discussed the ground-to-ae- closed-form solution of the optimized 3D deploy-
rial (G2A) secure communications of the static ment of the static UAV aerial legitimate terminal
UAV legitimate terminal in the presence of a was geometrically derived, which was an asymp-
full-duplex ground eavesdropper, where the totic case of the trajectory design with unlimited
eavesdropper simultaneously performed eaves- UAV speed. It is worth noting that the optimal
dropping and malicious jamming. For secrecy hovering position for the trajectory design is rel-
performance enhancement, the null-space-based atively close to the optimal deployment of the
artificial noise was exploited to reduce the qual- UAV aerial legitimate terminal.
ity of wiretap channels. Under the condition
that only the statistical channel state information UAV-Aided Secure Cooperation
(CSI) of the eavesdropper was known, the hybrid The recent research efforts on UAV-aided
outage probability combining both transmission secure cooperation are provided in this section.
outage probability and secrecy outage probabil- According to different roles of UAVs, the specif-
ity (SOP) was derived. Based on the analytical ic applications in this scenario can be separate-
expressions, the optimal power allocation policy ly categorized as UAV-enabled mobile relaying
was obtained by a bisection search. The secrecy and UAV-enabled friendly jamming, which are dis-
performance could be improved by increasing the cussed below.
transmit power and/or equipping more transmit
antennas at the source. In addition, there is an UAV-Enabled Mobile Relaying
optimal operation height of the UAV aerial legit- According to the basic principles of PLS, coop-
imate terminal under different conditions accord- erative relaying can be exploited to achieve the
ing to simulation results. superiority of legitimate channels to wiretap chan-

IEEE Wireless Communications • October 2019 35


ed relay scenarios to avoid additional secrecy
issues. However, the mobility characteristics of
UAVs cannot be fully utilized since retransmission
occurs at the adjacent time slot, and the ampli-
fied background noise will lead to relative per-
formance loss at high signal-to-noise ratio (SNR)
regime compared with DF mode. Above all, the
best relaying mode can be different and is highly
dependent on the specific application scenario.
Under the scenario where there are multiple
mobile UAV relays, the authors in [10] investi-
gated opportunistic relaying in the presence of
multiple UAV eavesdroppers. Specifically, the
optimal UAV relay was chosen according to the
principle of maximizing the end-to-end SNR,
FIGURE 4. UAV-enabled mobile relaying under the scenario where the ground which is observed as a random selection from the
direct transmission link is severely blocked by fading and shadowing effect. perspective of eavesdroppers. Considering the
wireless backhaul reliability from the GCS to the
UAV-transmitter under Nakagami-m fading condi-
tions, the closed-form expression of SOP was then
derived under the assumption that the maximum
ratio combining (MRC) was applied among multi-
ple UAV eavesdroppers. However, the significant
mobility characteristic of UAV-enabled mobile
relaying was not exploited in this work. Except
for relay selection, cooperative beamforming is
another choice to enhance the quality of equiv-
alent legitimate channels to improve secrecy per-
formance. To our best knowledge, related work
on this topic is still missing, which is an open issue
for future research.

UAV-Enabled Friendly Jamming


Except for relaying the expected messages,
FIGURE 5. UAV-enabled friendly jamming to transmit artificial noise against UAV-enabled friendly jamming is another way to
potential eavesdroppers in a certain area. cooperatively improve the security by transmitting
artificial noise, as depicted in Fig. 5. Compared
to traditional ground jamming, UAVs are able to
nels, which is critical to improve secrecy capacity. adjust their jamming power dynamically accord-
However, the locations of traditional ground relay ing to their relative positions with legitimate users
nodes are time-invariant, which makes it difficult and potential eavesdroppers due to their flexi-
for them to flexibly adapt to the dynamic environ- ble deployment and high mobility. In addition,
ment. On the contrary, UAVs can move close to the dominant strong LoS A2G channels are more
the related nodes for secure communications due beneficial for jamming. On one hand, the quality
to their on-demand mobility when serving as relay of wiretap channels is significantly degraded since
nodes, as depicted in Fig. 4. In such scenarios, LoS A2G channels are less impaired by fading and
the quality of legitimate A2G channels can be shadowing effects compared to ground jamming
enhanced while that of wiretap channels may be channels. On the other hand, the CSI of A2G
degraded due to their distinct geometrical loca- jamming channels is easier to obtain under LoS
tions. As a result, UAV-enabled mobile relaying conditions since it is highly dependent on the rela-
is promising to further improve secrecy perfor- tive distances between UAV mobile jammers and
mance. ground eavesdroppers. Therefore, UAV-enabled
UAV-enabled mobile relaying was first investi- friendly jamming has potential for secrecy perfor-
gated in [9] to maximize the average achievable mance enhancement.
secrecy rate by optimizing the transmit power The basic idea of UAV-enabled friendly jam-
allocation among the flight periods. Then a similar ming was discussed in [12]. The average achiev-
idea was extended in [10] to further include the able secrecy rate was maximized by jointly
joint design of dynamic UAV trajectory. It is worth designing the trajectory and transmit power of a
noting that decode-and-forward (DF) mode is UAV jammer. It is observed that the time-variant
adopted in the above works, where UAV mobile positions are determined by the flight period of
relays are promising to approach GBSs for better a UAV mobile jammer, which has an important
decoding capability. However, due to their limited impact on the optimal design of UAV trajectory
velocity, the adopted DF-mode UAV relays are and thus significantly affects secrecy performance.
implicitly required to be equipped with a large In addition, it is worth noting that an improper
buffer to store the decoded messages, which jamming power design is even harmful to secrecy
causes significant transmission delay. Instead, performance since the quality of legitimate chan-
amplify-and-forward (AF) mode is an effective nels can be more severely degraded.
choice for UAV-enabled mobile relaying with less In practice, the exact locations of eavesdrop-
processing complexity and transmission delay. pers are generally difficult to perfectly estimate.
Moreover, AF mode is appropriate for untrust- The estimation error has a significant impact on

36 IEEE Wireless Communications • October 2019


the design of secure transmission schemes. Tak- 0.8
ing this into consideration, a potential eavesdrop-
pers’ target area model was established in [13] for
UAV-enabled friendly jamming scheme design. 0.7
Hybrid transmission scheme
Based on different assumptions on A2G channels, Static jammer

Achievable Secrecy Rate(bit/s/Hz)


the mixed LoS/NLoS model was adopted to char- 0.6 Static BS
acterize the average path loss of UAV jamming
links. Then the jamming coverage was determined
0.5
by comparing the location-dependent intercep-
tion probability of the potential eavesdropper with
a predetermined threshold. Subject to the outage 0.4
probability constraint of the legitimate user, the
optimal 3D deployment of the static UAV-enabled 0.3
jammer was designed to maximize the jamming
coverage. To facilitate a tractable analysis, a large
sample set of discrete eavesdropper locations and 0.2
binary integer variables were introduced to repre-
sent the target area and the jamming coverage, 0.1
respectively. To overcome the non-convexity of
the problem, a sub-optimal solution in an alternat-
0
ing manner was proposed by considering the mul- 20 40 60 80 100 120 140 160 180 200
tiple circles placement problem in each iteration.
Flight Period (s)
It is worth noting that different definitions of the
jamming coverage will lead to different design of FIGURE 6. The achievable secrecy rate of the scheduled legitimate user against
transmission schemes. potential internal eavesdropping vs. the flight period of UAV aerial base sta-
tion and/or UAV-enabled friendly jammer. The maximum speed of UAV is
UAV-Enabled Hybrid Secure 10 m/s, the reference SNR at the reference distance d0 = 1 m is 80 dB, and
the flying altitude of UAV is set as 50 m. The locations of K = 4 users are
Transmission Scheme Pos = {(40, 30), (–30, 20), (–20, 40), (10, –30)}. The location of the static
Under the scenario involving multiple UAVs for friendly jammer or base station is set as (0, 0).
secure communications, different UAVs can be
assigned different tasks to provide a hybrid trans-
mission scheme. In [14], UAV-enabled friendly schemes due to the mobility characteristics of
jamming was exploited to assist secure communi- UAVs. So far, the corresponding research related
cations between the UAV aerial base station and to UAV-enabled hybrid secure transmission is lim-
multiple legitimate ground users. Time-division ited, so it is still an open issue.
multiple access (TDMA) was adopted so that one
legitimate user was scheduled in each time slot Research Challenges and Future Directions
while other unscheduled users were treated as In this section, some open issues of research chal-
potential eavesdroppers. In such a scenario, the lenges and future directions on UAV-involved
worst case average secrecy rate among legitimate secure wireless communications are highlighted.
users was maximized, and the optimization prob- To reduce the complexity of trajectory design,
lem was solved in an alternating iterative man- the existing works on this subject roughly fall
ner. In each iteration, the closed-form expressions into two categories: static 3D deployment design
of the user scheduling binary integer variables under mixed LoS/NLoS conditions and horizontal
were obtained given fixed transmit powers and trajectory design with minimum allowable flight
trajectories of dual UAVs, and then SCA methods height to avoid collision under dominant LoS sce-
were exploited to deal with the non-convexity of narios. However, static UAV deployment design is
other sub-problems. In [15], a similar idea was an asymptotic case of dynamic trajectory design
investigated in the presence of multiple exter- with unlimited velocity given predetermined initial
nal ground eavesdroppers. Given the constant and final locations (e.g., for energy charge), and
transmit power, the collision avoidance constraint is unable to efficiently adapt to the dynamic envi-
was further taken into consideration for the safe- ronment. On the other hand, the dominant LoS
ty of dual UAVs. To deal with the non-convexity scenarios are oversimplified and thus impractical,
caused by the user scheduling binary integer vari- especially in suburban, urban, and metropolitan
ables, the discrete binary user scheduling con- areas. Therefore, probabilistic LoS/NLoS channels
straints were first transformed into the equivalent should be accurately modeled to reflect the prac-
equality constraints by introducing auxiliary con- tical characteristics of different actual communi-
tinuous variables. The penalty concave-convex cation environments. Moreover, the distribution
procedure (P-CCCP) method was then exploited of obstacles should be taken into consideration,
to solve the obtained problem by incorporating leading to the practical constraints to design opti-
the corresponding penalty terms into the objec- mal UAV 3D trajectory. In such a context, effec-
tive function in a double-loop manner. It has been tive approaches are urgently needed to overcome
indicated that this design could be directly extend- the high complexity introduced by practical chan-
ed to the general scenarios where there are multi- nel models and constraints as mentioned above.
ple UAV-friendly jammers. Due to their cost-effective and payload-limit-
Compared to other transmission schemes ed characteristics, multiple UAVs are promising
with a static friendly jammer or base station, Fig. to collaboratively carry out complicated tasks in
6 validates the significant secrecy performance the future, which is expected to further enhance
improvement brought by hybrid transmission secrecy performance of UAV-involved secure

IEEE Wireless Communications • October 2019 37


Similar to traditional communications. However, there are significant mentioned earlier. However, the corresponding
confidential transmis- variations among different secure communication research is still limited. Therefore, it is a potential
sions, it is expected scenarios, such as the wireless transmission envi- research direction to design the configuration of
that UAVs can play ronment, the distribution of legitimate terminals UAVs and optimize the transmit power and/or
and potential eavesdroppers/attackers, and the UAV trajectory for covert communications.
multiple roles in covert security performance objective of concern. There-
communications as fore, the optimal configuration of multiple UAVs Conclusion
mentioned earlier. can be totally different. In such a context, the In this article, we have provided an overview of
However, the corre- jointly distributed processing of multi-UAV secure recent research efforts on UAV-involved secure
sponding research is communications combined with optimal configu- wireless communications. The typical application
ration design of UAVs for each specific scenario scenarios have been categorized as UAV-en-
still limited. Therefore, it deserves further investigation. On the other hand, abled secure communications and UAV-aided
is a potential research due to the scarcity of public spectrum, some cur- secure cooperation according to different roles
direction to design the rently existing techniques, such as cognitive radio of UAVs. Then the main design considerations,
configuration of UAVs (CR) technology and non-orthogonal multiple including 3D position design of static UAVs,
and optimize the trans- access (NOMA) transmission, are supposed to be trajectory design of mobile UAVs, and transmit
introduced for spectral efficiency enhancement of power design, have been investigated for secre-
mit power and/or UAV multi-UAV secure communications, and the result- cy performance enhancement. Finally, we have
trajectory for covert ing unique security issues should also be taken also provided some valuable research directions
communications. into consideration. on this topic. It is hoped that this overview will
With the rapid development of UAV manufac- lead to more significant and practical research for
turing and antenna miniaturization, UAVs can be UAV-involved secure wireless communications in
equipped with a certain number of antennas in the future.
spite of their limited payload capacity. The intro-
duced spatial diversity gain can be exploited for References
[1] S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on Unmanned
beamforming design, so as to further improve Aerial Vehicle Networks for Civil Applications: A Communi-
secrecy performance, especially for low-altitude cations Viewpoint,” IEEE Commun. Surveys & Tutorials, vol.
UAVs with probabilistic multi-path NLoS trans- 18, no. 4, 4th qtr. 2016, pp. 2624–61.
missions. In addition, it is worth noting that the [2] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless Communications
with Unmanned Aerial Vehicles: Opportunities and Chal-
spatial DoFs newly introduced by multi-antenna lenges,” IEEE Commun. Mag., vol. 54, no. 5, May 2016, pp.
technology effectively compensate for the loca- 36–42.
tion-dependent DoFs of UAVs, and thus the [3] M. Bloch and J. Barros, Physical-Layer Security: From Informa-
trajectory design can be simplified under the sce- tion Theory to Secure Engineering, Cambridge Univ. Press,
Aug. 2008.
narios where there are multiple related practical [4] G. Zhang et al., “Securing UAV Communications Via Joint
constraints. Nevertheless, the performance of Trajectory and Power Control,” IEEE Trans. Wireless Com-
multi-antenna transmission depends on prelimi- mun., vol. 18, no. 2, Jan. 2019, pp. 1376–89.
nary accurate channel estimation results, which [5] M. Cui et al., “Robust Trajectory and Transmit Power Design
for Secure UAV Communications,” IEEE Trans. Vehic. Tech.,
are rather difficult to obtain due to high velocity vol. 67, no. 9, Sept. 2018, pp. 9042–46.
of UAVs and need additional investigation. [6] Y. Zhu, G. Zheng, and M. Fitch, “Secrecy Rate Analysis of
Due to limited power storage capability of UAV-Enabled mmWave Networks Using matérn Hardcore
UAVs, their related energy issues are particularly Point Processes,” IEEE JSAC, vol. 36, no. 7, July 2018, pp.
1397–1409.
critical. In such a context, one of the significant [7] C. Liu et al., “Secure UAV Communication in the Presence
goals of UAV-involved secure communications of Active Eavesdropper,” Proc. Int’l. Conf. Wireless Commun.
is to simultaneously improve secrecy and energy Signal Processing, Nanjing, China, Oct. 2017, pp. 1–6.
performance. Since the energy issues associated [8] H. Wang et al., “Trajectory Planning in UAV Communication
with Jamming,” Proc. Int’l. Conf. Wireless Commun. Signal
with UAVs depend on their movement features, Processing, Hangzhou, China, Oct. 2018, pp. 1–6.
such as velocity and acceleration, the resulting [9] Q. Wang et al., “Improving Physical Layer Security Using
trajectory designs are quite complicated; thus, UAV-Enabled Mobile Relaying,” IEEE Wireless Commun.
effective approaches are needed to deal with the Lett., vol. 6, no. 3, June 2017, pp. 310–13.
[10] Q. Wang et al., “Joint Power and Trajectory Design for
proposed problems. On the other hand, ener- Physical-Layer Secrecy in the UAV-Aided Mobile Relaying
gy harvesting technology can also be exploited System,” IEEE Access, vol. 6, 2018, pp. 62,849–55.
to increase the endurance of UAVs by provid- [11] H. Liu, S. Yoo, and K. S. Kwak, “Opportunistic Relaying
ing a wireless power supplement. Moreover, it is for Low-Altitude UAV Swarm Secure Communications with
Multiple Eavesdroppers,” J. Commun. Net., vol. 20, no. 5,
worth noting that the transmitted energy-bearing Oct. 2018, pp. 496–508.
signals are information-independent, which can [12] A. Li, Q. Wu, and R. Zhang, “UAV-Enabled Cooperative
be equivalently designed as jamming signals to Jamming for Improving Secrecy of Ground Wiretap Chan-
simultaneously degrade the quality of wiretapping nel,” IEEE Wireless Commun. Lett., vol. 8, no. 1, Feb. 2019,
pp. 181–84.
channels; hence, secrecy performance can be fur- [13] Y. Zhou et al., “Improving Physical Layer Security via a
ther improved. UAV Friendly Jammer for Unknown Eavesdropper Loca-
Compared to traditional confidential transmis- tion,” IEEE Trans. Vehic. Tech., vol. 67, no. 11, Nov. 2018,
sions, which prevent the target messages from pp. 11,280–84.
[14] H. Lee et al., “UAV-Aided Secure Communications with
being successfully decoded by potential eaves- Cooperative Jamming,” IEEE Trans. Vehic. Tech., vol. 67, no.
droppers, covert communications can essentially 10, Oct. 2018, pp. 9385–92.
improve secrecy performance with higher require- [15] Y. Cai et al., “Dual-UAV-Enabled Secure Communications:
ments. For UAV-involved covert communication Joint Trajectory Design and User Scheduling,” IEEE JSAC,
vol. 36, no. 9, Sept. 2018, pp. 1972–85.
scenarios, the major requirement is to prevent
the target messages from interception since it is Biographies
difficult to hide UAVs. Similar to traditional confi- Hui-Ming Wang [S’07, M’10, SM’16] (xjbswhm@gmail.com)
dential transmissions, it is expected that UAVs can received his B.S. and Ph.D. degrees in electrical engineering
play multiple roles in covert communications as from Xi’an Jiaotong University, Xi’an, China, in 2004 and 2010,

38 IEEE Wireless Communications • October 2019


respectively. From 2007 to 2008 and 2009 to 2010, he was a sity in 2017. He is currently pursuing an M.S. degree with the
visiting scholar in the Department of Electrical and Computer Department of Information and Communications Engineering,
Engineering, University of Delaware. He is currently a full pro- Xi’an Jiaotong University, and also with the Ministry of Education
fessor with Xi’an Jiaotong University, China. His research inter- Key Laboratory for Intelligent Networks and Network Securi-
ests include 5G communications and networks, physical-layer ty, China. His current research interests include 5G networks,
security of wireless communications, and covert communica- physical-layer security of wireless communications, and convex
tions. He co-authored the book Physical Layer Security in Ran- optimization.
dom Cellular Networks (Springer, 2016), and has authored or
co-authored over 120 IEEE journal and conference papers. He J ia -C heng J iang (j1143484496b@stu.xjtu.edu.cn) received
received the IEEE ComSoc Asia-Pacific Best Young Researcher his B.S. degree in information engineering from Xi’an
Award in 2018, the National Excellent Doctoral Dissertation Jiaotong University, Xi’an, China, in 2018. He is current-
Award in China in 2012, and the Best Paper Award from the ly working toward a Ph.D. degree with the Department
IEEE/CIC International Conference on Communications in China of Information and Communications Engineering, Xi’an
in 2014. He is currently an Associate Editor of IEEE Transactions Jiaotong University, and also with the Ministry of Education
on Communications. Key Laboratory for Intelligent Networks and Network Secu-
rity. His research interests include physical-layer security
Xu Zhang (jcx8008208820@stu.xjtu.edu.cn) received his B.S. techniques, wireless channel acquisition, and multiple-input
degree in information engineering from Xi’an Jiaotong Univer- multiple output techniques.

IEEE Wireless Communications • October 2019 39

You might also like