Professional Documents
Culture Documents
2019 UAV-Involved Wireless Physical-Layer Secure Communications - Overview and Research Directions
2019 UAV-Involved Wireless Physical-Layer Secure Communications - Overview and Research Directions
20 Initial Position
0
T=40s 10
T=60/80/100/40/200/400s
-20
0
-40
User -10
-60 -20
Final Position
T=60/80/100/200/400s
-80 -30
0 20 40 60 80 100 120 140 160 180 200 0 20 40 60 80 100 120 140 160 180 200
2.4 2.4
2.2 2.2
Achievable Secrecy Rate(bit/s/Hz)
0.8 1
0.6 0.8
0 50 100 150 200 250 300 350 400 0 50 100 150 200 250 300 350 400
Flight Period(s) Flight Period(s)
FIGURE 3. The optimal trajectory designs of a UAV aerial base station and the corresponding achievable secrecy rates against an
external eavesdropper for different flight periods. The maximum speed of UAV is 5 m/s and the reference signal-to-noise ratio
(SNR) at the reference distance d0 = 1 m is 80 dB. The flying altitude of UAV is set as 50 m.
users and eavesdroppers increase with the trans- To further take the mobility of UAVs into
mit power of UAV aerial base stations, there is an consideration, the authors in [8] investigated the
optimal transmit power for maximizing the average trajectory planning of the UAV aerial legitimate
secrecy rate under certain conditions. terminal against malicious jamming to enhance
the quality of G2A secure communications. The
UAV Aerial Legitimate Terminals positions and jamming powers of ground attack-
Due to their flexible deployment and high mobili- ers were assumed to be fixed during the flight
ty, UAVs have also been exploited as aerial termi- period, and were empirically estimated by the cor-
nals to carry out some special tasks. Since UAV responding statistical values. Then the 3D trajec-
aerial terminals operate in a practically automatic tory was optimized to maximize the achievable
manner under the control of associated GCSs via throughput over the flight period, and SCA meth-
wireless links, their communication security is a ods were exploited to overcome the non-convex-
critical issue and needs protection. ity of the optimization problem. Moreover, the
In [7], the authors discussed the ground-to-ae- closed-form solution of the optimized 3D deploy-
rial (G2A) secure communications of the static ment of the static UAV aerial legitimate terminal
UAV legitimate terminal in the presence of a was geometrically derived, which was an asymp-
full-duplex ground eavesdropper, where the totic case of the trajectory design with unlimited
eavesdropper simultaneously performed eaves- UAV speed. It is worth noting that the optimal
dropping and malicious jamming. For secrecy hovering position for the trajectory design is rel-
performance enhancement, the null-space-based atively close to the optimal deployment of the
artificial noise was exploited to reduce the qual- UAV aerial legitimate terminal.
ity of wiretap channels. Under the condition
that only the statistical channel state information UAV-Aided Secure Cooperation
(CSI) of the eavesdropper was known, the hybrid The recent research efforts on UAV-aided
outage probability combining both transmission secure cooperation are provided in this section.
outage probability and secrecy outage probabil- According to different roles of UAVs, the specif-
ity (SOP) was derived. Based on the analytical ic applications in this scenario can be separate-
expressions, the optimal power allocation policy ly categorized as UAV-enabled mobile relaying
was obtained by a bisection search. The secrecy and UAV-enabled friendly jamming, which are dis-
performance could be improved by increasing the cussed below.
transmit power and/or equipping more transmit
antennas at the source. In addition, there is an UAV-Enabled Mobile Relaying
optimal operation height of the UAV aerial legit- According to the basic principles of PLS, coop-
imate terminal under different conditions accord- erative relaying can be exploited to achieve the
ing to simulation results. superiority of legitimate channels to wiretap chan-