Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/160318
Title: Covert communication in UAV-assisted air-ground networks
Authors: Jiang, Xu
Chen, Xinying
Tang, Jie
Zhao, Nan
Zhang, Xiu Yin
Niyato, Dusit
Wong, Kai-Kit
Keywords: Engineering::Computer science and engineering
Issue Date: 2021
Source: Jiang, X., Chen, X., Tang, J., Zhao, N., Zhang, X. Y., Niyato, D. & Wong, K. (2021). Covert communication in UAV-assisted air-ground networks. IEEE Wireless Communications, 28(4), 190-197. https://dx.doi.org/10.1109/MWC.001.2000454
Journal: IEEE Wireless Communications
Abstract: Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by malicious users. Especially compared to the encryption and physical layer security that prevent eavesdropping, covert communication aims at hiding the existence of transmission, which is able to satisfy the more critical requirement of security. Thus, in this article, we focus on the covert communication issues of UAV-assisted wireless networks. First, the preliminaries of secure communications including encryption, physical layer security and covert communication are discussed. Then, current works and typical applications of UAV in covert communications are demonstrated. We then propose two schemes to enhance the covertness of UAV-assisted networks for some typical scenarios. Specifically, to improve the covert rate in UAV-assisted data dissemination, an iterative algorithm is proposed to jointly optimize the time slot, transmit power and trajectory. For the covertness of ground-air communication, a friendly jammer is employed to confuse the wardens, where the location of the jammer, the jamming power and the legitimate transmit power are jointly optimized. Numerical results are presented to validate the performance of these two proposed schemes. Finally, several challenges and promising directions are pointed out.
URI: https://hdl.handle.net/10356/160318
ISSN: 1536-1284
DOI: 10.1109/MWC.001.2000454
Schools: School of Computer Science and Engineering 
Rights: © 2020 IEEE. All rights reserved.
Fulltext Permission: none
Fulltext Availability: No Fulltext
Appears in Collections:SCSE Journal Articles

SCOPUSTM   
Citations 10

44
Updated on Sep 23, 2023

Web of ScienceTM
Citations 10

35
Updated on Sep 12, 2023

Page view(s)

163
Updated on Sep 26, 2023

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.