A4 Article in conference proceedings
Achieving Improved Security in UAV-Assisted Covert Communication Networks (2024)


Chen, X., Chang, Z., & Hämäläinen, T. (2024). Achieving Improved Security in UAV-Assisted Covert Communication Networks. In 2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops) (pp. 323-328). IEEE. IEEE/CIC international conference on communications in China - workshops. https://doi.org/10.1109/icccworkshops62562.2024.10693776


JYU authors or editors


Publication details

All authors or editorsChen, Xinying; Chang, Zheng; Hämäläinen, Timo

Parent publication2024 IEEE/CIC International Conference on Communications in China (ICCC Workshops)

Conference:

  • IEEE/CIC International Conference on Communications in China

Place and date of conferenceHangzhou, China7.-9.8.2024

ISBN979-8-3503-7768-2

eISBN979-8-3503-7767-5

Journal or seriesIEEE/CIC international conference on communications in China - workshops

ISSN2474-9133

eISSN2474-9141

Publication year2024

Publication date04/10/2024

Pages range323-328

PublisherIEEE

Publication countryUnited States

Publication languageEnglish

DOIhttps://doi.org/10.1109/icccworkshops62562.2024.10693776

Publication open accessNot open

Publication channel open access


Abstract

Covert communication can hide confidential signals in environmental noise to avoid being detected and provide comprehensive security for wireless transmission. However, there still exists significant risks in the wireless transmission once being detected. In this paper, we propose a more secure covert scheme, where a multiple antennas transmitter assisted by a multi-antenna UAV jammer maximizes the covert secrecy rate under the scenarios of both correct and incorrect detection by a warden with both error detection probability and eavesdropping rate limitations satisfied. The transmitter and jammer adopt maximum ratio transmission (MRT) and zero-forcing to maximize the transmission rate and minimize the interference at the receiver, respectively. First, we analyze the monotonicity of error detection probability to determine the optimal power detection threshold and the corresponding largest error detection probability. Then, under this worst case, we jointly optimize the transmit and jamming power to maximize the covert secrecy rate while guaranteeing the covert and eavesdropping limits meet their respective requirements. Finally, simulation results are presented to prove the correctness of the theoretical conclusion and evaluate the effectiveness of our proposed scheme.


Keywordswireless data transmissionunmanned aerial vehiclesdata securitysignal processing

Free keywordscovert communication; Gaussian signaling; secure transmission; UAV; zero-forcing


Contributing organizations


Ministry reportingYes

VIRTA submission year2024

Preliminary JUFO rating0


Last updated on 2024-02-11 at 20:06