Conference PaperPDF Available

Secrecy Performance of the UAV Enabled Cognitive Relay Network

Authors:

Abstract and Figures

Unmanned aerial vehicles (UAVs) have been recently applied to improve physical-layer security in wireless communication networks. This work considers a cognitive relay network where UAV is used as a mobile relay to bridge the communication from a secondary transmitter to a secondary receiver. Our purpose is to maximize the secrecy rate under certain UAV trajectory and power constraints by designing a joint optimization algorithm. Solving the optimization problem is computationally challenging as the utility functions are nonconcave and constraints are non-convex. Thus, an efficient iterative convex approximation algorithm based on a successive optimization approach is introduced to address the proposed nonconvex optimization problems. The computer simulations show that our algorithm can achieve a rapid coverage rate and the UAV trajectory is optimized successfully. Results in this study demonstrate that the proposed design outperforms conventional schemes.
Content may be subject to copyright.
Secrecy Performance of the UAV enabled Cognitive
Relay Network
Dinh Chi-Nguyen1, Pubudu N. Pathirana1, Ming Ding2, Aruna Seneviratne3
1School of Engineering, Deakin University, Waurn Ponds, VIC 3216, Australia {cdnguyen, pubudu.pathirana@deakin.edu.au}
2Data61, CSIRO, Australia {ming.ding@data61.csiro.au}
3School of Electrical Engineering and Telecommunications, UNSW, NSW, Australia {a.seneviratne@unsw.edu.au}
Abstract—Unmanned aerial vehicles (UAVs) have been re-
cently applied to improve physical-layer security in wireless
communication networks. This work considers a cognitive relay
network where UAV is used as a mobile relay to bridge the
communication from a secondary transmitter to a secondary
receiver. Our purpose is to maximize the secrecy rate under
certain UAV trajectory and power constraints by designing a
joint optimization algorithm. Solving the optimization problem
is computationally challenging as the utility functions are non-
concave and constraints are non-convex. Thus, an efficient
iterative convex approximation algorithm based on a successive
optimization approach is introduced to address the proposed non-
convex optimization problems. The computer simulations show
that our algorithm can achieve a rapid coverage rate and the
UAV trajectory is optimized successfully. Results in this study
demonstrate that the proposed design outperforms conventional
schemes.
Index Terms—UAV, optimization, security, cognitive relay
I. INTRODUCTION
Physical layer security techniques have been applied widely
in secrecy enhancement of communication systems. Coopera-
tive relaying has been exploited as a highly effective technique
to improve wireless physical-layer security [1]. However, most
of the existing relaying schemes rely on static relays or fixed
stations, and such traditional systems can be expensive and
have low secrecy network performance. Thanks to UAVs’
mobility and flexibility, a new paradigm using UAVs enabled
relaying techniques has become a promising solution. The use
of UAVs as mobile relays leads to dynamic models, which
adapts perfectly with various communication environment,
aiming at maximizing secrecy network throughput [2]. The
authors in this work employed the UAV to optimize the source
power allocation and secrecy capacity in the ground wire-
tap channel, while the work [3] focused on the problems of
UAV trajectory design and the source power allocations for
maximizing the secrecy rate of the relay network. Note that the
above studies addressed their iterative optimization problems
through the block coordinate descent algorithm, which can
result in high iteration complexity.
Recently, UAVs have also been considered in cognitive
relay systems. The work [4] employed UAVs to increase
the cognitive radio gain of data link between the primary
user and the secondary user in the network system where a
system of primary base stations was designed through the same
unmanned aerial vehicle (UAV) relay. Moreover, authors in
the study [5] exploited the UAVs mobile capability based on
the trajectory design to enhance the cognitive communication
performance. However, the deployment of UAVs for cognitive
relay networks to improve secrecy network throughput has not
been considered.
In this paper, we introduce a novel secure framework for
the cognitive relaying network by employing the UAV’s high
mobility. The system consists of a secondary transmitter (S),
a secondary receiver (D), a primary user (P) and an eaves-
dropper (E), all with a single antenna. The UAV operates as a
mobile relay to bridge the communication from the secondary
transmitter to the secondary receiver. Specially, the proposed
strategy solves the joint optimization of the transmit power and
UAV trajectory via the successive approximation method in
order to maximize the secrecy rate for the secondary network.
The rest of this paper is organized as follows. The Section
II will introduce the system model and problem formulation
of UAV based cognitive relay network. In Section III, a novel
iterative algorithm using the successive convex optimization
method is proposed for trajectory optimization and power
allocations problems. Simulation results will be presented to
demonstrate the secrecy performance of the proposed algo-
rithms in Section IV. Finally, our conclusions are drawn in
Section V.
II. SYSTEM MODEL AND PROBLEM FORMULATION
In this section, we present the system model and problem
formulation considered in our paper.
A. System Model
We consider an UAV enabled cognitive relay network where
a secondary transmitter (S) sends information to a secondary
receiver (D) in the presence of a primary user (P) that operates
over the same frequency band and an eavesdropper (E). The
UAV is assumed to have a large buffer and operate as a mobile
relay to receive data from the secondary transmitter and re-
transmit it to the secondary receiver based on the decode-
and-forward (DF) relaying strategy as shown in Fig.1. The
proposed network includes ground nodes whose locations are
assumed to be known and such locations are represented by
three-dimensional (3D) Cartesian coordinates. Specifically, S,
D and P on the ground have coordinates (0,0,0),(D, 0,0)
Fig. 1. System model of UAV enabled cognitive relay system
and (xu, yu,0), respectively. The eavesdropper also has a fixed
location of (xe, ye,0). It is assumed that UAV operates at a
fixed altitude hfor a finite time period T. The duration of
UAV’s operation is Ntime slot, which can be divided into
nsmall slots. Therefore, the dynamic coordinate of the UAV
relay can be defined as (x[n], y[n], h), where x[n]and y[n]
denote the UAV’s x- and y-coordinates with a time index
n, respectively. Also, it is assumed that the initial and final
coordinates of UAV are pre-determined as (x0, y0, h)and
(xF, yF, h), respectively.
Let denote Vmax(m/s)as the maximum speed of UAV in
each time slot whose length is specified as τ=T
N(s), we can
calculate the maximum distance that the UAV can fly within
in a single time slot as Lmax =Vmaxτ. Thus, the mobility
constraint can be formulated as
(x[n+ 1] x[n])2+ (y[n+ 1] y[n])2L2
max,
n= 0, ..., N 1,
{x[0], y[0]}={x0, y0},{x[N], y[N]}={xF, yF}.
(1)
Next, we also assume that the legitimate link between the
UAV and ground nodes and the eavesdropping link between
the UAV and the eavesdropper are line-of sight (LoS) channels.
Thus, the LoS channel power gain from UAV to the ground
node in time slot n follows the free-space path loss model,
given by [6]: gUG =β0
d2
UG
, where β0denotes the channel
power gain at the reference distance d0= 1m, and dUG is
the distance from the UAV to the ground node in the time
slot n. Therefore, we can calculate the channel gains of the
secondary transmitter-UAV link, the UAV-secondary receiver
link, the UAV-eavesdropper link as
gRS =β0
dRS2=β0
x[n]2+y[n]2+h2,(2a)
gRD =β0
d2
RD
=β0
(Dx[n])2+y[n]2+h2,(2b)
gRE =β0
d2
RE
=β0
(xex[n])2+ (yey[n])2+h2.(2c)
We denote ps[n]and pr[n]as the transmit power of the
secondary transmitter and UAV in time slot n, respectively. In
practice, the transmit power is constrained by average power,
denoted by ¯
P. Also, at the (n)th time slot, UAV can only
forward data after receiving from secondary transmitter at the
(n1)th time slot. Following these conditions, the transmit
power constraints can be formulated as
1
N1
N1
X
k=1
ps[k]¯
Ps,(3a)
1
N
N
X
k=2
pr[k]¯
Pr,(3b)
ps[k]0, k = 1, ..., N 1; pr[k]0, k = 2, ..., N, (3c)
ps[N] = pr[1] = 0.(3d)
In the absence of the eavesdropper, the achievable rate from
the UAV to the ground node in bits/second/Hertz (bps/Hz)
in time slot n can be defined as
RUG [n] = log2(1 + gU G [n]pr[n]
σ2)
=log2(1 + β0pr[n]
σ2d2
UG
) = log2(1 + γ0pr[n]
d2
UG
),
(4)
where σ2is the additive white Gaussian noise (AWGN) power
at the receiver and γ0=β02is the reference signal-to-noise
ratio (SNR).
It is assumed that processing delay at the relay is one slot, we
have the information causality constraints [3]
n
X
k=2
RD[k]
n1
X
k=1
RR[k], n = 2, ..., N, (5a)
n
X
k=2
RE[k]
n1
X
k=1
RR[k], n = 2, ..., N, (5b)
RS[N] = RR[1] = 0,(5c)
where RD[n], RR[n]and RE[n]denote the optimal data rates
of the secondary receiver, relay and eavesdropper at slot n,
respectively. Besides, we also consider the interference link
from UAV to primary user. At a certain time slot n, the
interference power on UAV-primary user channel is
Pu=pr[n]gRU [n] = β0pr[n]
(x[n]xu)2+ (y[n]yu)2+h2.
(6)
Further, the average interference temperature (IT) constraint
at the primary user also needs to be considered to protect
communications. Applying the result from [7], interference
power at the primary user should be limited below a IT
threshold, denoted by  > 0. Thus we have
N
X
n=1
β0pr[n]
(x[n]xu)2+ (y[n]yu)2+h2. (7)
Now we start to calculate the achievable rate on the main
channel and eavesdropping channel to determine the achiev-
able secrecy rate of the secondary system. The achievable rate
from the UAV to the secondary receiver in bits/second/Hertz
(bps/Hz)in time slot n can be expressed from (4) as
RRD =log2(1 + γ0pr[n]
d2
RD
)
=log2(1 + γ0
(Dx[n])2+y[n]2+h2).
(8)
Similarly, the achievable rate from the UAV to the eavesdrop-
per in bps/Hz in time slot n is given by
RRE =log2(1 + γ0pr[n]
d2
RE
) =
log2(1 + γ0
(xex[n])2+ (yey[n])2+h2).
(9)
From (8) and (9), the average secrecy rate achievable for the
secondary system in bps/Hz over the total Ntime slots is
given by
Rs{ps[n], pr[n], x[n]n, y[n]}=1
N
N
X
n=1
(RRD RRE ).(10)
B. Problem Formulation
In this work, our objective is to maximize the secrecy
rate of the secondary network communication system, by
jointly optimizing the UAV trajectory {x[n], y[n]}and the
transmit power allocation {ps[n], pr[n]}, subject to the UAV
mobility constraints in (1), transmit power constraints in (3),
information causality constraints in (5) and IT constraints in
(7). Therefore, the optimization problem can be formulated as
below
P1 : max
pr[n],x[n],y[n]
1
N
N
X
n=1
(RRD RRE )
s.t. (1),(3),(5),(7).
Note that problem (P1) is a non-convex optimization
problem, as the objective function is non-concave and con-
straint (3) is non-convex with respect to {x[n], y[n]}and
{ps[n], pr[n]}. Therefore, it is challenging to solve the pro-
posed problem. In the next section, we propose an efficient
iterative strategy based on a successive approximation method,
which achieves a fast coverage rate for the designed algorithm.
III. PROP OS ED OPTIMIZATION ALGORITHM
In this section, an efficient optimization algorithm is
presented to solve the problem (P1). Unlike previ-
ous studies [3,5], which partitioned optimization variables
{x[n], y[n], ps[n], pr[n]}into two blocks by the block coordi-
nate descent method, we introduce a single-block optimization
solution through using the successive approximation method.
The merits of proposed design consist of reducing significantly
iterative computation cost and achieving a fast coverage rate
for the optimization algorithm. The detailed design is given as
below. Problem P1can be rewritten as
P2 : max
pr[n],ps[n],x[n],y[n]
1
N
N
X
n=1
(RRD RRE )
s.t.
n
X
i=2
log2(1 + γ0pr[n]
d2
RD
)
n1
X
i=1
log2(1 + γ0ps[n]
d2
RS
), n = 2, ..., N,
(11a)
n
X
i=2
log2(1 + γ0pr[n]
d2
RE
)
n1
X
i=1
log2(1 + γ0ps[n]
d2
RS
), n = 2, ..., N,
(11b)
N
X
n=1
β0pr[n]
(x[n]xu)2+ (y[n]yu)2+h2, (11c)
(x[n+ 1] x[n])2+ (y[n+ 1] y[n])2<=L2
max,(11d)
1
N1
N1
X
n=1
ps[n]¯
Ps,1
N
N
X
n=2
pr[n]¯
Pr,(11e)
ps[n]0, n = 1, ..., N 1, pr[n]0, n = 2, ..., N . (11f)
Note that solving the problem (P2) is challenging due to
the non-concavity of the objective function and non-convexity
of constraints (11a),(11b)and (11c). This motivates us to
develop a successive convex approximation algorithm. To that
end, we propose to use the following inequalities whose proof
results have been provided in [8] in the domain {x > 0, y >
0, k > 0}
ln(1 + 1
xy )ln(1 + 1
xkyk)+ xkyk
xkyk+ 1(2 x
xky
yk),(12)
ln(1+ x
y)ln(1+ xk
yk)+( 1
1 + xk
yk
)[1
2(x2
xk+xk)1
yxk
yk].(13)
Firstly, the objective function need to be approximated by
finding the concave lower bound for RRD and convex upper
bound for RRE over the feasible set. Let replace (Dx[n])2+
y[n]2+h2drd and denote x=1
γ0pr, y =drd , using (12)
we can find a concave lower bound at the local point {pk
r, dk
rd}
RRD RRDlb =log2(e)ln(1 + γ0pk
r
dk
rd
) +
log2(e)γ0pk
r
dk
rd +γ0pk
r
(2 pk
r
pr
drd
dk
rd
).
(14)
Similarly, by replacing (Ex[n])2+ (Sy[n])2+h2dre
and let denote x=γ0pr, y =dre , we can also find an upper
bound of RRE at the feasible point {pk
r, dre}based on (13)
RRE RREup =log2(e)ln(1 + γ0pk
r
dk
re
)
log2(e)dk
re
dk
re +γ0pk
r
[1
2dre
(γ0p2
r
pk
r
+γ0pk
r)γ0pk
r
dk
re
].
(15)
In the next step, we develop approximation solutions for non-
convex constraints (11a),(11b)and (11c). By introducing the
slack variable drd1(x[n]D)2+y[n]2+h2, the upper bound
for RRD at the feasible point {pk
r, drd1}can be expressed as
RRD RRDup =log2(e)ln(1 + γ0pk
r
dk
rd1
) +
log2(e)dk
rd1
dk
rd1+γ0pk
r
[1
2drd1
(γ0p2
r
pk
r
+γ0pk
r)γ0pk
r
dk
rd1
].
(16)
At the feasible point {pk
s, drs}, the right hand side of con-
straints (11a),(11b)can also be equivalently expressed as
RRS RRSlb =log2(e)ln(1 + γ0pk
s
dk
rs
) +
log2(e)γ0pk
s
dk
rs +γ0pk
s
(2 pk
s
ps
drs
dk
rs
),
(17)
where drs x[n]2+y[n]2+h2is the slack variable
introduced to simplify the problem. Note that the constraints
dre[n](Ex[n])2+ (Sy[n])2+h2and dr d1[n]
(x[n]D)2+y[n]2+h2are non-convex with respect to
{x[n], y[n]}variables. Following the first order Taylor expan-
sion of quadratic function respect to two variables x > 0
and y > 0:f(x, y)f(xk, y k) + Ofx(xk, yk)(xxk) +
Ofy(xk, yk)(yyk), we can find the convex upper bound for
the above constraints at any local point {x[n]k, y[n]k}
dre[n](x[n]kE)2+ (y[n]kS)2+h2+
2(x[n]kE)(x[n]x[n]k) + 2(y[n]kS)(y[n]y[n]k),
(18)
drd1[n](x[n]kD)2+ (y[n]k)2+h2+
2(x[n]kD)(x[n]x[n]k)+2y[n]k(y[n]y[n]k).(19)
Finally, (11c)can be equivalently replaced by
N
X
n=1
β0pr[n]
dru[n], (20)
by introducing a new slack variable dru[n](x[n]xu)2+
(y[n]yu)2+h2. Analogously, by using the first order Taylor
expansion of quadratic function with two variables x[n]and
y[n], we have
dru[n](xk[n]xu)2+ (yk[n]yu)2+h2+
2(xk[n]xu)(x[n]xk[n]) + 2(yk[n]yu)(y[n]yk[n]).
(21)
From results (14) (21), (P2) can be reformulated as a more
tractable problem
P3 : max
pr[n],ps[n],drd[n],dr e [n],
drd1[n],dru [n],x[n],y[n]
1
N
N
X
n=1
(RRDlb RREup )
s.t.
n
X
i=2
RRDup
n1
X
i=1
RRSlb ,(22a)
n
X
i=2
RREup
n1
X
i=1
RRSlb ,(22b)
drs x[n]2+y[n]2+h2, n = 1, ..., N , (22c)
drd (Dx[n])2+y[n]2+h2, n = 1, ..., N , (22d)
(18) (21) satisfied, (22e)
(11d)(11f)satisfied. (22f)
Note that from inner approximated objective function and
constraints, the objective value of problem (P3) must be equal
or lower than that of problem (P2). Also, the solution to
problem (P3) must be a feasible solution to problem (P2) [2].
It is easy to see that the approximate problem (P3) is convex
and the feasible region is convex, thus it can be solved
effectively by convex solvers to find the optimal solution
through employing the iterative algorithm. The path-following
method is described in the Algorithm 1, which is guaranteed
to converge to its locally optimal solution.
Algorithm 1: Optimal UAV trajectory and power allocation
Initialization: Set k= 0 and initiate the feasible point
x[n]k, y[n]k, pr[n]k, ps[n]k
1: repeat
2: Solve (22) to obtain the optimal solutions:
x[n], y[n], pr[n], ps[n], drd [n], dre[n], drd1[n], dru[n]
3: Update: x[n]k+1 := x[n], y[n]k+1 :=
y[n], pr[n]k+1 := pr[n], ps[n]k+1 := ps[n], drd[n]k+1 :=
drd[n], dr e[n]k+1 := dre [n], drd1[n]k+1 :=
drd1[n], dru [n]k+1 := dru[n].
4: Set k:= k+ 1
5: until Convergence
IV. NUMERICAL RES ULT S
This section will demonstrate the performance of the pro-
posed algorithm via simulations. MOSEK [9], the state-of-
the-art convex solver, is employed in the Matlab environment
using the YALMIP toolbox [10]. A cognitive network whose
communication bandwidth per link is 20MHz and carrier fre-
quency is 5GHz. The receiver noise power is set to σ2=104
dBm. The channel power gain at the reference distance at
d0= 1mis assumed to be 1. The IT threshold is set at 103.
The average transmit power at UAV and secondary transmitter
are ¯
Pr=¯
Ps= 30dBm. The UAV is assumed to fly at an
altitude H= 100mwith a speed V= 50m/s during a period
T= 100s. The number of time slots used in simulation is
N= 100. The distance between secondary transmitter Sand
secondary receiver Dis set to D= 2000m, while the primary
user Uis at coordinate (3000,3000,0). The Eavesdropper E
are located at three different locations, namely (500,300,0),
(1000,300,0),(1500,300,0), respectively.
Fig. 2. UAV trajectories under different Eavesdropper’s locations
The Algorithm 1 is employed to optimize the UAV trajec-
tory. The initial and final coordinates of UAV are assumed at
(0, 0, 0) and (2000, 0, 0), respectively. As shown in Fig.2,
the UAV trajectories are adjusted in an adaptive manner cor-
responding to the change of Eavesdropper’s location, aiming
at staying away from the eavesdropper in order to improve
the transmitter-UAV and UAV-receiver links and impair the
Eavesdropper-UAV link. Also, the UAV always follows a
downward curved path to bridge the communication from
transmitter to receiver. The optimal UAV trajectory is achieved
after several iterations.
Fig.3 illustrates the secrecy rate (bps/Hz)versus the num-
ber of iterations. We demonstrate the performance of our
design by comparing with other two schemes. Case 1: only
UAV’s trajectory optimization is considered, while UAV is
kept at a static position (0, D/2, 0) and Case 2: only power
allocation is optimized. The illustrated results demonstrate the
superior performances of the proposed joint optimization algo-
rithm. Clearly, the designed scheme achieves a stable secrecy
throughput gain after six iterations, while the conventional
model with static relay shows its limitation in improving
secrecy network performance. The results confirm that the
optimization of both trajectory and power allocation improves
significantly the secrecy rate of the considered cognitive relay
network, which exhibits the advantage of our algorithm.
Fig. 3. Secrecy rates versus iterations
V. CONCLUSIONS
In this paper, we propose a new secure scheme for the
UAV enabled cognitive relay network by developing a joint
optimization algorithm to achieve an optimal secrecy rate.
Unfortunately, the optimization problem is highly non-convex,
which is very difficult to be solved effectively. Therefore, our
work presents a novel single-block optimization solution by
using the successive approximation method with respect to
both trajectory and power variables. Our simulation results
demonstrate the superiority of our joint optimization algorithm
in secrecy throughput enhancement in comparison with the
traditional benchmarks.
ACKNOWLEDGMENT
This work was supported by CSIRO Data61, Australia.
REFERENCES
[1] L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, ”Improving wireless
physical layer security via cooperating relays,” IEEE Transaction on
Signal Processing, vol. 58, no. 3, pp. 1875-1888, 2010.
[2] Qian Wang, Zhi Chen, Weidong Mei, Jun Fang, ”Improving Physical
Layer Security Using UAV-Enabled Mobile Relaying,” IEEE Wireless
Communications Letters, vol.6, pp. 310-313, 2017.
[3] Qian Wang, Zhi Chen, Shaoqian Li, ”Joint Power and Trajectory Design
for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System,”
arXiv:1803.07874, Mar. 2018.
[4] Lokman Sboui, Hakim Ghazzai, Zouheir Rezki, Mohamed-Slim Alouini,
”Achievable Rates of UAV-Relayed Cooperative Cognitive Radio MIMO
Systems,” IEEE Access, vol.5, pp. 5190-5204, 2017.
[5] Yuwei Huang, Jie Xu, Ling Qiu, Rui Zhang, ”Cognitive UAV Commu-
nication via Joint Trajectory and Power Control,” [Online]. Available:
https://arxiv.org/abs/1802.05090, 2018.
[6] Guangchi Zhang, Qingqing Wu, Miao Cui, Rui Zhang, ”Securing UAV
Communications via Joint Trajectory and Power Control,” [Online].
Available: https://arxiv.org/abs/1801.06682, 2018.
[7] R. Zhang, ”On peak versus average interference power constraints for
protecting primary users in cognitive radio networks,” IEEE Transaction
on Wireless Communication, vol. 8, no. 4, pp. 21122120, 2009.
[8] H. Tuy, Convex Analysis and Global Optimization (second edition),
Springer, 2017.
[9] I. MOSEK ApS, 2014, [Online]. Available: www.mosek.com.
[10] J. Lofberg, ”YALMIP: A toolbox for modeling and optimization in
MATLAB,” in Proceedings of the CACSD Conference, Taipei, Taiwan,
2004.
... At the same time, as aforementioned, exploiting CR technique in UAV system is a spectrum-efficient method. With this consideration, the works of Zhou et al. and Chi-Nguyen et al. 15,16 designed an optimal UAV trajectory and resource allocation by specially considering the interference power constraint at primary receiver (PR). The work of Zhou et al. 15 considered single-hop communication case, while the work of Chi-Nguyen et al. 16 did the two-hop one. ...
... With this consideration, the works of Zhou et al. and Chi-Nguyen et al. 15,16 designed an optimal UAV trajectory and resource allocation by specially considering the interference power constraint at primary receiver (PR). The work of Zhou et al. 15 considered single-hop communication case, while the work of Chi-Nguyen et al. 16 did the two-hop one. The work of Tian et al. focused on a UAV-relay assisted device-to-device (D2D) network with an Eve overhearing the confidential information delivered from the relay. ...
... Although the maximal secure rate is achieved, the secure EE was not investigated for such deployment in the work of Ji et al. 19 Similarly, we see that in this work of Ji et al., 19 the UAV acts as a relay when the request content is not cached in the UAV. While the aforementioned works considered the case where the UAV acts as a mobile relay or BS, [8][9][10][11][12][13][14][15][16][17][19][20][21] the works of Chen et al. and Xiong et al. [20][21][22] investigated the UAV data collection paradigm. In practice, the UAV-assisted wireless data collection model can be regarded as the same type as the case where the UAV acts as relay or BS. ...
Article
Full-text available
This work focuses on the optimal trajectory of a rotary‐wing unmanned aerial vehicle (UAV) jammer and the system power allocation with the objective of maximizing the total secure energy efficiency (EE) of a slotted relay‐assisted millimeter wave (mm‐Wave) cognitive radio system. The UAV flies from starting location to final one in a round of communication mission that is overheard by a malicious eavesdropper. The network terminals are equipped with multiple‐input multiple‐output (MIMO) antenna array. This work first develops a practical approximation propagation model by addressing three key challenges: path loss, small‐scale Nakagami‐m fading channel gains, and transceiver antenna beamforming gains. By using the approximate model, the upper and lower bounds of the ergodic rate of each communication link are derived. Second, with the objective of maximizing secure EE, the optimal UAV trajectory and system resource allocation framework is established by considering the constraints of interference at primary receiver (PR), information‐causality relationship, rotary‐wing UAV propulsion energy and so forth. The optimal framework is solved with a tractable CVX tool by using the derived upper and lower bounds and successive convex approximation. Finally, an iterative optimizing algorithm is established by using Dinkelbach's method. In the simulation, the work presents the comparison of UAV trajectories, secure rates, and secure EEs of three schemes, that is, the proposed EE scheme, the non‐EE scheme where only the optimal secure rate is considered, and the EE scheme with the consideration of all communication‐related energy consumption. The simulations show that the EE schemes achieve smoother UAV trajectory than non‐EE, but the non‐EE scheme has higher secure rate. The impact of communication energy consumption is negligible. In addition, the effect of MIMO antenna array and mm‐Wave on system performance is exploited.
... In an energy-constrained network, radio frequency (RF) energy harvesting (EH) is an effective and environmentally friendly method for recharging batteries. Consequently, the concept of EH has attracted considerable attention as a viable strategy for overcoming the energy limits of UAV-assisted networks [10]- [13]. For example, [10] focused on a CR network in which a UAV was used as a relay, i.e., a UAV relay (UR), to support communication from an ST to an SR. ...
... Consequently, the concept of EH has attracted considerable attention as a viable strategy for overcoming the energy limits of UAV-assisted networks [10]- [13]. For example, [10] focused on a CR network in which a UAV was used as a relay, i.e., a UAV relay (UR), to support communication from an ST to an SR. Then, an optimization algorithm was proposed to achieve the optimal system performance for the UAV CR network. ...
Article
Full-text available
This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays under system performance and security constraints. We propose a communication protocol that includes an energy harvesting (EH) phase and multiple communication phases. In the EH phase, the multiple UAV relays (URs) harvest energy from a power beacon. In the first communication phase, a secondary transmitter (ST) uses the collected energy to send confidential signals to the first UR using NOMA. Simultaneously, a ground base station communicates with a primary receiver (PR) under interference from the ST. In the subsequent communication phases, the next URs apply the decode-and-forward technique to transmit the signals. In the last communication phase, the Internet of Things destinations (IDs) receive their signals in the presence of an eavesdropper (EAV). Accordingly, the outage probability of the primary network, the throughput of the secondary network, and the leakage probability at the EAV are analyzed. On this basis, we propose a hybrid search method combining particle swarm optimization (PSO) and continuous genetic algorithm (CGA) to optimize the UR configurations and the NOMA power allocation to maximize the throughput of the secondary network under performance and security constraints.
... Notice that UAV-U only partially knows the location of the eavesdropper, so the secrecy rate in the worst-case scenario is calculated [10], [11]. In the relay system, the information transmission of UAV-U is forced by the information causality [17], [25]. It means that the total information bits received by D ξ cannot exceed the total information bits sent by S over n time slot, where n ∈ {1, ..., N }. ...
... In [104], for instance, a DF UAV relay was deployed in CRNs to enhance the security of SUs. Similar UAV functions for CRNs may be seen in [105][106][107]. In [101,102], two UAVs are examined, one acting as a relay and the other as a jammer to reduce the quality of the eavesdropper's channel. ...
... This model relies on a smart contract algorithm that can set sharing constraints by handling RSUs. 9) Aerial Networks: The rapid development of UAVs has created new business opportunities for service companies [189], [190]. Despite the mobility and flexibility of UAVs, there are many risks related to data security, privacy, integrity, and reliability [191]. ...
Preprint
Full-text available
p>Fifth-generation and beyond (5G and xG) wireless networks are envisioned to meet the requirements of vertical applications like high traffic throughput, ultra-massive connectivity, extremely low latency, and high quality of service. Disruptive technologies, such as massive multiple-input multiple-output, millimeter wave, and multiple access are being deployed to meet these requirements. However, their deployment poses several challenges, including a lack of network transparency, management decentralization, and reliability. Moreover, the heterogeneity of future networks raises security concerns, e.g., confidentiality, privacy, and trustworthiness. Indeed, due to the emergence of novel paradigms, e.g., quantum computing, traditional security approaches are no longer sufficient to protect over-the-air communications. Hence, 5G/xG networks must consider smart security techniques to operate seamlessly and efficiently. Within this context, physical layer security (PLS) and blockchain represent promising solutions to complement existing methods. By exploiting the characteristics of wireless links, PLS can enhance the security of communications, while blockchain may enable networks' decentralization, integrity, and trustworthiness. Motivated by these advancements, we provide an in-depth review of the existing PLS and blockchain literature. Then, for the first time in the literature, we present a framework to integrate PLS with blockchain in 5G/xG systems. We first provide a thorough discussion about the potential of PLS and blockchain for 5G/xG systems. Then, we present our vision of a cross-layer architecture that leverages PLS and blockchain. Through a case study, we demonstrate the high potential of cross-layer design to improve the security of vehicular networks. Finally, we identify related challenges and shed light on future research directions.</p
... This model relies on a smart contract algorithm that can set sharing constraints by handling RSUs. 9) Aerial Networks: The rapid development of UAVs has created new business opportunities for service companies [189], [190]. Despite the mobility and flexibility of UAVs, there are many risks related to data security, privacy, integrity, and reliability [191]. ...
Preprint
Full-text available
p>Fifth-generation and beyond (5G and xG) wireless networks are envisioned to meet the requirements of various vertical applications that require higher traffic throughput, ultra-massive connectivity, extremely low latency, and high quality of service. Disruptive technologies, such as massive multiple-input multiple-output, millimeter wave, and multiple access are being deployed to meet these requirements. However, the deployment of these technologies poses several challenges, including the lack of network transparency, management decentralization, and reliability. In addition, the heterogeneity of these networks raises security concerns, particularly, confidentiality, privacy, and trustworthiness. Typically, networks rely on encryption techniques at higher layers to ensure security and privacy. However, due to the emergence of novel computing paradigms, such as quantum computing, traditional security approaches are no longer sufficient to protect over-the-air communications. Therefore, 5G/xG networks must consider smarter and more efficient security techniques to operate seamlessly and efficiently. Within this context, physical layer security (PLS) and blockchain represent promising solutions to complement existing methods. By exploiting the characteristics of wireless links, PLS can enhance the security of wireless communications, while blockchain can guarantee the decentralization, integrity, and trustworthiness of networks. Motivated by these technological advancements, this paper provides an in-depth review of the existing literature on PLS and blockchain. Then, for the first time, we present a framework for the integration of PLS with blockchain in 5G/xG systems. We begin by providing a thorough discussion about the potential of PLS and blockchain for 5G/xG systems. Next, we present our vision of a cross-layer architecture that leverages both PLS and blockchain in 5G/xG networks. Finally, we identify related challenges and open issues and shed light on future research directions. </p
Article
This paper investigates the secrecy performance of a cognitive relay non-orthogonal multiple access system based on an unmanned aerial vehicle (UAV). In particular, a UAV works as an aerial secondary relay to assist in securing transmissions from a terrestrial secondary source to secondary users in the presence of terrestrial eavesdroppers by sharing the licensed wireless spectrum designated for terrestrial primary systems. The minimum average secrecy rate (MASR) of the secondary users is taken as the main criterion to evaluate the security of the system under the assumption that the location information of the eavesdroppers and successive interference cancellations are imperfect. To maximize MASR, an efficient iterative algorithm is proposed to optimize key system parameters while keeping interference powers within tolerable limits. Since the total MASR problem is non-convex, the successive convex approximation technique is applied to find efficient approximate solutions. Simulation results demonstrate that the proposed algorithm substantially improves the MASR of the system in comparison to benchmark schemes and the orthogonal multiple access system.
Preprint
Full-text available
p>Fifth-generation and beyond (5G and xG) wireless networks are envisioned to meet the requirements of vertical applications like high traffic throughput, ultra-massive connectivity, extremely low latency, and high quality of service. Disruptive technologies, such as massive multiple-input multiple-output, millimeter wave, and multiple access are being deployed to meet these requirements. However, their deployment poses several challenges, including a lack of network transparency, management decentralization, and reliability. Moreover, the heterogeneity of future networks raises security concerns, e.g., confidentiality, privacy, and trustworthiness. Indeed, due to the emergence of novel paradigms, e.g., quantum computing, traditional security approaches are no longer sufficient to protect over-the-air communications. Hence, 5G/xG networks must consider smart security techniques to operate seamlessly and efficiently. Within this context, physical layer security (PLS) and blockchain represent promising solutions to complement existing methods. By exploiting the characteristics of wireless links, PLS can enhance the security of communications, while blockchain may enable networks' decentralization, integrity, and trustworthiness. Motivated by these advancements, we provide an in-depth review of the existing PLS and blockchain literature. Then, for the first time in the literature, we present a framework to integrate PLS with blockchain in 5G/xG systems. We first provide a thorough discussion about the potential of PLS and blockchain for 5G/xG systems. Then, we present our vision of a cross-layer architecture that leverages PLS and blockchain. Through a case study, we demonstrate the high potential of cross-layer design to improve the security of vehicular networks. Finally, we identify related challenges and shed light on future research directions.</p
Article
This paper considers a multiple-input multiple-output (MIMO) non-orthogonal multiple access (NOMA) cognitive radio (CR) system with an unmanned aerial vehicle relay (UR). In this system, a secondary transmitter (ST) uses licensed spectrum from the primary network to transmit signals to its secondary receivers (SRs) based on NOMA. The UR is used as a relay to forward the signals from the ST to the SRs. As a result, the system can achieve significant improvements in spectral efficiency and network capacity. However, such a MIMO NOMA CR system faces issues of interference and security, i.e., eavesdropping attacks, due to the shared spectrum use and the UR. Therefore, we aim to minimize the outage probability of the secondary network, subject to constraints on the outage probability of the primary network and the intercept probabilities of eavesdroppers. Then, we attempt to optimize the transmit power of the UR, the coordinates of the UR, and the power allocation factors for NOMA. We further derive closed-form expressions for the outage probabilities of the secondary and primary networks and the intercept probabilities at the eavesdroppers. We propose using a machine learning algorithm based on a constrained continuous genetic algorithm to solve the optimization problem.
Chapter
Throughput Optimization for NOMA Cognitive Radios with Multi-UAV Assisted Relay Le-Mai-Duyen Nguyen, Van Nhan Vo, Tran Thi Thanh Lan, Nguyen Minh Nhat, Anand Nayyar & Viet-Hung Dang Conference paper First Online: 14 June 2022 1 Accesses Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 444) Abstract In this paper, we investigate the throughput optimization for the non-orthogonal multiple access (NOMA) cognitive radio (CR) system with multi-unmanned aerial vehicle (UAV) assisted relays. We propose the communication protocol as follows: in the first phase, a secondary transmitter (ST) transmits the signals to the first UAV relay (UR) using non-orthogonal multiple access (NOMA); meanwhile, a ground base station (GBS) communicates with a primary receiver (PR) under the interference of the ST. In the second phase, the first UR applies the decode-and-forward (DF) technique to transfer the signals to the second UR. Simultaneously, the GBS communicates with PR under the interference of the first UR. Similarly, in the next phase, the UR forwards the signals, while the PR receives the information from the GBS without the interference. In the last two phases, the UR and the SRs receive the signals under the GBS’s interference. Accordingly, the outage probability of the primary network and the throughput of the secondary network is analyzed. Moreover, we propose constraint genetic algorithm (CGA) aided obtaining UR’s configurations to optimize the throughput of the secondary network under the constraints of the system performance of the primary network.
Article
Full-text available
Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles (UAVs). In this paper, we study secure transmission in a four-node (source, destination, mobile relay, and eavesdropper) system, wherein we focus on maximizing the secrecy rate via jointly optimizing the relay trajectory and the source/relay transmit power. Nevertheless, due to the coupling of the trajectory designing and the power allocating, the secrecy rate maximization (SRM) problem is intractable to solve. Accordingly, we propose an alternating optimization (AO) approach, wherein the trajectory designing and the power allocating are tackled in an alternating manner. Unfortunately, the trajectory designing is a nonconvex problem, and thus is still hard to solve. To circumvent the nonconvexity, we exploit sequential convex programming (SCP) to derive an iterative algorithm, which is proven to converge to a Karush-Kuhn-Tucker (KKT) point of the trajectory design problem. The simulation results demonstrate the efficacy of the joint power and trajectory design in improving the secrecy throughput.
Article
Full-text available
Unmanned aerial vehicle (UAV) communication is anticipated to be widely applied in the forthcoming fifth-generation (5G) wireless networks, due to its many advantages such as low cost, high mobility, and on-demand deployment. However, the broadcast and line-of-sight (LoS) nature of air-to-ground wireless channels gives rise to a new challenge on how to realize secure UAV communications with the destined nodes on the ground. This paper aims to tackle this challenge by applying the physical (PHY) layer security technique. We consider both the downlink and uplink UAV communications with a ground node, namely UAV-to-ground (U2G) and ground-to-UAV (G2U) communication, respectively, subject to a potential eavesdropper on the ground. In contrast to the existing literature on wireless PHY layer security only with ground nodes at fixed or quasi-static locations, we exploit the high mobility of the UAV to proactively establish favorable and degraded channels for the legitimate and eavesdropping links, respectively, via its trajectory design. We formulate new problems to maximize the average secrecy rates of the U2G and G2U transmissions, respectively, by jointly optimizing the UAV's trajectory and the transmit power of the legitimate transmitter over a given flight period of the UAV. Although the formulated problems are non-convex, we propose iterative algorithms to solve them efficiently by applying the block coordinate descent and successive convex optimization methods. Specifically, the transmit power and UAV trajectory are each optimized with the other being fixed in an alternating manner, until they converge. Simulation results show that the proposed algorithms can improve the secrecy rates for both U2G and G2U communications, as compared to other benchmark schemes without power control and/or trajectory optimization.
Article
Full-text available
We study the achievable rate of an uplink MIMO cognitive radio system where the primary user (PU) and the secondary user (SU) aim to communicate to the closest primary base station (BS) via a multi-access channel through the same unmanned aerial vehicle (UAV) relay. The SU message is then forwarded from the primary BS to the secondary network with a certain incentive reward as a part of the cooperation protocol between both networks. A special linear precoding scheme is proposed to enable the SU to exploit the PU free eigenmodes. We analyze two scenarios in which the UAV relay gain matrix is either fixed or optimized. We derive the optimal power allocation that maximizes the achievable rate of the SU respecting power budget, interference, and relay power constraints. Numerical results highlight the cognitive rate gain of our proposed scheme with respect to various problem parameters. We also highlight the effect of UAV altitude on the SU and PU rates. Finally, when the relay matrix is optimized, we show that the PU rate is remarkably enhanced and that the SU rate is only improved at high power regime.
Article
Full-text available
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel conditions: absent feedback, they are typically feasible only when the source-destination channel is better than the source-eavesdropper channel. Node cooperation is a means to overcome this challenge and improve the performance of secure wireless communications. This paper addresses secure communications of one source-destination pair with the help of multiple cooperating relays in the presence of one or more eavesdroppers. Three cooperative schemes are considered: decode-and-forward (DF), amplify-and-forward (AF), and cooperative jamming (CJ). For these schemes, the relays transmit a weighted version of a reencoded noise-free message signal (for DF), a received noisy source signal (for AF), or a common jamming signal (for CJ). Novel system designs are proposed, consisting of the determination of relay weights and the allocation of transmit power, that maximize the achievable secrecy rate subject to a transmit power constraint, or, minimize the transmit power subject to a secrecy rate constraint. For DF in the presence of one eavesdropper, closed-form optimal solutions are derived for the relay weights. For other problems, since the optimal relay weights are difficult to obtain, several criteria are considered leading to suboptimal but simple solutions, i.e., the complete nulling of the message signals at all eavesdroppers (for DF and AF), or the complete nulling of jamming signal at the destination (for CJ). Based on the designed relay weights, for DF in the presence of multiple eavesdroppers, and for CJ in the presence of one eavesdropper, the optimal power allocation is obtained in closed-form; in all other cases the optimal power allocation is obtained via iterative algorithms. Numerical evaluation of the obtained secrecy rate and transmit power results show that the proposed design ca- - n significantly improve the performance of secure wireless communications.
Article
This paper investigates a new spectrum sharing scenario between unmanned aerial vehicle (UAV) and terrestrial wireless communication systems. We consider that a cognitive/secondary UAV transmitter communicates with a ground secondary receiver (SR), in the presence of a number of primary terrestrial communication links that operate over the same frequency band. We exploit the UAV's controllable mobility via trajectory design, to improve the cognitive UAV communication performance while controlling the co-channel interference at each of the primary receivers (PRs). In particular, we maximize the average achievable rate from the UAV to the SR over a finite mission/communication period by jointly optimizing the UAV trajectory and transmit power allocation, subject to constraints on the UAV's maximum speed, initial/final locations, and average transmit power, as well as a set of interference temperature (IT) constraints imposed at each of the PRs for protecting their communications. However, the joint trajectory and power optimization problem is non-convex and thus difficult to be solved optimally. To tackle this problem, we propose an efficient algorithm that ensures to obtain a locally optimal solution by applying the techniques of alternating optimization and successive convex approximation (SCA). Numerical results show that our proposed joint UAV trajectory and power control scheme significantly enhances the achievable rate of the cognitive UAV communication system, as compared to benchmark schemes.
Article
Mobile relaying has aroused great interest in wireless communications recently, thanks to the rapid development and evolvement of unmanned aerial vehicles. This letter establishes the utility of mobile relaying in facilitating secure wireless communications. In particular, we consider transmit optimization in a four-node (source, destination, buffer-aided mobile relay, and eavesdropper) channel setup, wherein we aim at maximizing the secrecy rate of this system. However, the secrecy rate maximization problem is nonconvex and intractable to solve. To circumvent the nonconvexity, we exploit the difference-of-concave (DC) program to develop an iterative algorithm, which is proven to have Karush–Kuhn–Tucker point convergence guarantee. The algorithm conducts a water-filling-based solution in each DC iteration, and thus is computationally efficient to implement. In addition, for a given special case, we show that each DC iteration could yield a closed-form solution, which further reduces the computational complexity. Simulation results demonstrate that the proposed mobile relaying scheme could significantly outperform the static relaying scheme in terms of secrecy enhancement.
Conference Paper
The use of MATLAB toolbox YALMIP to model and solve optimization problems occuring in systems in control theory was discussed. The toolbox makes development of control oriented SDP problems. Rapid prototyping of an algorithm based on SDP can be done using standard MATLAB commands. YALMIP automatically detects the kind of a problem the user has defined, and selects a suitable solver based on this analysis.
Article
This paper considers spectrum sharing for wireless communication between a cognitive radio (CR) link and a primary radio (PR) link. It is assumed that the CR protects the PR transmission by applying the so-called ldquointerference-temperaturerdquo constraint, whereby the CR is allowed to transmit regardless of the PR's on/off status provided that the resultant interference power level at the PR receiver is kept below some predefined threshold. For the fading PR and CR channels, the interference-power constraint at the PR receiver is usually one of the following two types: one is to regulate the average interference power (AIP) over all different fading states, while the other is to limit the peak interference power (PIP) at each fading state. From the CR's perspective, given the same average and peak power threshold, the AIP constraint is more favorable than the PIP counterpart because of its more flexibility for dynamically allocating transmit powers over different fading states. On the contrary, from the perspective of protecting the PR, the more restrictive PIP constraint appears at a first glance to be a better option than the AIP. Some surprisingly, this paper shows that in terms of various forms of capacity limits achievable for the PR fading channel, e.g., the ergodic and outage capacities, the AIP constraint is also superior over the PIP. This result is based upon an interesting interference diversity phenomenon, where randomized interference powers over the fading states in the AIP case are more advantageous over deterministic ones in the PIP case for minimizing the resultant PR capacity losses. Therefore, the AIP constraint results in larger fading channel capacities than the PIP for both the CR and PR transmissions.
Article
This paper considers spectrum sharing for wireless communication between a cognitive radio (CR) link and a primary radio (PR) link. It is assumed that the CR protects the PR transmission by applying the so-called interference-temperature constraint, whereby the CR is allowed to transmit regardless of the PR's on/off status provided that the resultant interference power level at the PR receiver is kept below some predefined threshold. For the fading PR and CR channels, the interference-power constraint at the PR receiver is usually one of the following two types: One is to regulate the average interference power (AIP) over all the fading states, while the other is to limit the peak interference power (PIP) at each fading state. From the CR's perspective, given the same average and peak power threshold, the AIP constraint is more favorable than the PIP counterpart because of its more flexibility for dynamically allocating transmit powers over the fading states. On the contrary, from the perspective of protecting the PR, the more restrictive PIP constraint appears at a first glance to be a better option than the AIP. Some surprisingly, this paper shows that in terms of various forms of capacity limits achievable for the PR fading channel, e.g., the ergodic and outage capacities, the AIP constraint is also superior over the PIP. This result is based upon an interesting interference diversity phenomenon, i.e., randomized interference powers over the fading states in the AIP case are more advantageous over deterministic ones in the PIP case for minimizing the resultant PR capacity losses. Therefore, the AIP constraint results in larger fading channel capacities than the PIP for both the CR and PR transmissions.