Covert communication in UAV-assisted air-ground networks

Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by maliciou...

Full description

Bibliographic Details
Main Authors: Jiang, Xu, Chen, Xinying, Tang, Jie, Zhao, Nan, Zhang, Xiu Yin, Niyato, Dusit, Wong, Kai-Kit
Other Authors: School of Computer Science and Engineering
Format: Journal Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/160318
_version_ 1811686959453569024
author Jiang, Xu
Chen, Xinying
Tang, Jie
Zhao, Nan
Zhang, Xiu Yin
Niyato, Dusit
Wong, Kai-Kit
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Jiang, Xu
Chen, Xinying
Tang, Jie
Zhao, Nan
Zhang, Xiu Yin
Niyato, Dusit
Wong, Kai-Kit
author_sort Jiang, Xu
collection NTU
description Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by malicious users. Especially compared to the encryption and physical layer security that prevent eavesdropping, covert communication aims at hiding the existence of transmission, which is able to satisfy the more critical requirement of security. Thus, in this article, we focus on the covert communication issues of UAV-assisted wireless networks. First, the preliminaries of secure communications including encryption, physical layer security and covert communication are discussed. Then, current works and typical applications of UAV in covert communications are demonstrated. We then propose two schemes to enhance the covertness of UAV-assisted networks for some typical scenarios. Specifically, to improve the covert rate in UAV-assisted data dissemination, an iterative algorithm is proposed to jointly optimize the time slot, transmit power and trajectory. For the covertness of ground-air communication, a friendly jammer is employed to confuse the wardens, where the location of the jammer, the jamming power and the legitimate transmit power are jointly optimized. Numerical results are presented to validate the performance of these two proposed schemes. Finally, several challenges and promising directions are pointed out.
first_indexed 2024-10-01T05:08:42Z
format Journal Article
id ntu-10356/160318
institution Nanyang Technological University
language English
last_indexed 2024-10-01T05:08:42Z
publishDate 2022
record_format dspace
spelling ntu-10356/1603182022-07-19T05:09:51Z Covert communication in UAV-assisted air-ground networks Jiang, Xu Chen, Xinying Tang, Jie Zhao, Nan Zhang, Xiu Yin Niyato, Dusit Wong, Kai-Kit School of Computer Science and Engineering Engineering::Computer science and engineering Encryption Communication System Security Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by malicious users. Especially compared to the encryption and physical layer security that prevent eavesdropping, covert communication aims at hiding the existence of transmission, which is able to satisfy the more critical requirement of security. Thus, in this article, we focus on the covert communication issues of UAV-assisted wireless networks. First, the preliminaries of secure communications including encryption, physical layer security and covert communication are discussed. Then, current works and typical applications of UAV in covert communications are demonstrated. We then propose two schemes to enhance the covertness of UAV-assisted networks for some typical scenarios. Specifically, to improve the covert rate in UAV-assisted data dissemination, an iterative algorithm is proposed to jointly optimize the time slot, transmit power and trajectory. For the covertness of ground-air communication, a friendly jammer is employed to confuse the wardens, where the location of the jammer, the jamming power and the legitimate transmit power are jointly optimized. Numerical results are presented to validate the performance of these two proposed schemes. Finally, several challenges and promising directions are pointed out. This research was supported in part by the National Key R&D Program of China under Grant 2020YFB1807002; the China Postdoctoral Science Foundation under Grant 2020M680949; and the National Natural Science Foundation of China (NSFC) under Grant 61871065. 2022-07-19T05:09:50Z 2022-07-19T05:09:50Z 2021 Journal Article Jiang, X., Chen, X., Tang, J., Zhao, N., Zhang, X. Y., Niyato, D. & Wong, K. (2021). Covert communication in UAV-assisted air-ground networks. IEEE Wireless Communications, 28(4), 190-197. https://dx.doi.org/10.1109/MWC.001.2000454 1536-1284 https://hdl.handle.net/10356/160318 10.1109/MWC.001.2000454 2-s2.0-85103259402 4 28 190 197 en IEEE Wireless Communications © 2020 IEEE. All rights reserved.
spellingShingle Engineering::Computer science and engineering
Encryption
Communication System Security
Jiang, Xu
Chen, Xinying
Tang, Jie
Zhao, Nan
Zhang, Xiu Yin
Niyato, Dusit
Wong, Kai-Kit
Covert communication in UAV-assisted air-ground networks
title Covert communication in UAV-assisted air-ground networks
title_full Covert communication in UAV-assisted air-ground networks
title_fullStr Covert communication in UAV-assisted air-ground networks
title_full_unstemmed Covert communication in UAV-assisted air-ground networks
title_short Covert communication in UAV-assisted air-ground networks
title_sort covert communication in uav assisted air ground networks
topic Engineering::Computer science and engineering
Encryption
Communication System Security
url https://hdl.handle.net/10356/160318
work_keys_str_mv AT jiangxu covertcommunicationinuavassistedairgroundnetworks
AT chenxinying covertcommunicationinuavassistedairgroundnetworks
AT tangjie covertcommunicationinuavassistedairgroundnetworks
AT zhaonan covertcommunicationinuavassistedairgroundnetworks
AT zhangxiuyin covertcommunicationinuavassistedairgroundnetworks
AT niyatodusit covertcommunicationinuavassistedairgroundnetworks
AT wongkaikit covertcommunicationinuavassistedairgroundnetworks