Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/160318
Title: | Covert communication in UAV-assisted air-ground networks | Authors: | Jiang, Xu Chen, Xinying Tang, Jie Zhao, Nan Zhang, Xiu Yin Niyato, Dusit Wong, Kai-Kit |
Keywords: | Engineering::Computer science and engineering | Issue Date: | 2021 | Source: | Jiang, X., Chen, X., Tang, J., Zhao, N., Zhang, X. Y., Niyato, D. & Wong, K. (2021). Covert communication in UAV-assisted air-ground networks. IEEE Wireless Communications, 28(4), 190-197. https://dx.doi.org/10.1109/MWC.001.2000454 | Journal: | IEEE Wireless Communications | Abstract: | Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless networks due to its characteristics of low cost and flexible deployment. However, the high possibility of line-of-sight (LoS) air-ground channels may result in a great risk of being attacked by malicious users. Especially compared to the encryption and physical layer security that prevent eavesdropping, covert communication aims at hiding the existence of transmission, which is able to satisfy the more critical requirement of security. Thus, in this article, we focus on the covert communication issues of UAV-assisted wireless networks. First, the preliminaries of secure communications including encryption, physical layer security and covert communication are discussed. Then, current works and typical applications of UAV in covert communications are demonstrated. We then propose two schemes to enhance the covertness of UAV-assisted networks for some typical scenarios. Specifically, to improve the covert rate in UAV-assisted data dissemination, an iterative algorithm is proposed to jointly optimize the time slot, transmit power and trajectory. For the covertness of ground-air communication, a friendly jammer is employed to confuse the wardens, where the location of the jammer, the jamming power and the legitimate transmit power are jointly optimized. Numerical results are presented to validate the performance of these two proposed schemes. Finally, several challenges and promising directions are pointed out. | URI: | https://hdl.handle.net/10356/160318 | ISSN: | 1536-1284 | DOI: | 10.1109/MWC.001.2000454 | Schools: | School of Computer Science and Engineering | Rights: | © 2020 IEEE. All rights reserved. | Fulltext Permission: | none | Fulltext Availability: | No Fulltext |
Appears in Collections: | SCSE Journal Articles |
SCOPUSTM
Citations
10
44
Updated on Sep 23, 2023
Web of ScienceTM
Citations
10
35
Updated on Sep 12, 2023
Page view(s)
163
Updated on Sep 26, 2023
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.