Secrecy and Covert Communications against UAV Surveillance via Multi-Hop Networks

by   Hui-Ming Wang, et al.

The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives rise to the confidential information leakage challenge in both civilian and military environments. The security and covert communication problems for a pair of terrestrial nodes against UAV surveillance are considered in this paper. To overcome the information leakage and increase the transmission reliability, a multi-hop relaying strategy is deployed. We aim to optimize the throughput by carefully designing the parameters of the multi-hop network, including the coding rates, transmit power, and required number of hops. In the secure transmission scenario, the expressions of the connection probability and secrecy outage probability of an end-to-end path are derived and the closed-form expressions of the optimal transmit power, transmission and secrecy rates under a fixed number of hops are obtained. In the covert communication problem, under the constraints of the detection error rate and aggregate power, the sub-problem of transmit power allocation is a convex problem and can be solved numerically. Simulation shows the impact of network settings on the transmission performance. The trade-off between secrecy/covertness and efficiency of the multi-hop transmission is discussed which leads to the existence of the optimal number of hops.


page 2

page 4

page 7

page 9

page 21

page 24

page 27

page 28


Secure Routing with Power Optimization for Ad-hoc Networks

In this paper, we consider the problem of joint secure routing and trans...

Joint 3D Maneuver and Power Adaptation for Secure UAV Communication with CoMP Reception

This paper studies a secrecy unmanned aerial vehicle (UAV) communication...

On Secure Transmission Design: An Information Leakage Perspective

Information leakage rate is an intuitive metric that reflects the level ...

3D Trajectory Optimization for Secure UAV Communication with CoMP Reception

This paper studies a secrecy unmanned aerial vehicle (UAV) communication...

A new secure multi-hop untrusted relaying scheme

Cooperative relaying is utilized as an efficient method for data communi...

Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel

UAVs are capable of improving the performance of next generation wireles...

Physical Layer Security-Aware Routing and Performance Tradeoffs in Ad Hoc Networks

The application of physical layer security in ad hoc networks has attrac...

Please sign up or login with your details

Forgot password? Click here to reset