Secure UAV communication against cooperative adaptive eavesdroppers

Wireless Networks - Tập 28 - Trang 1113-1128 - 2022
Jue Liu1,2, Weiwei Yang1
1College of Communications Engineering, Army Engineering University of PLA, Nanjing, China
2School of Information Science and Engineering, Jinshen College of Nanjing Audit, University, Nanjing, China

Tóm tắt

The flexibility of the adaptive eavesdropper (AE) who can act as a passive eavesdropper or active jammer adaptively makes the attack mode more powerful, which will bring new security threats for unmanned aerial vehicle (UAV) communications. In this paper, we investigate secure UAV communications under multiple cooperative AEs. A cooperative attack game (CAG) is proposed to get the optimal joint attack action of multiple AEs according to the position of the aerial base station (ABS) and the Nash equilibrium (NE) point of CAG exist by proving the game as an exact potential game with at least one NE. Then, a Stackelberg game is applied to derive the ABS’s optimal position based on its own sensing according to AEs’ joint attack action by constructing the interactions between ABS and multiple AEs. Finally, a hierarchical learning algorithm is proposed to optimize the ABS’s position for enhancing the secrecy rate under the cooperative AEs. The simulation results show that the secrecy performance can be degraded severely by the cooperative AEs, and the ABS’s position promotes the enhancement of secrecy rate greatly within reasonable iteration times.

Tài liệu tham khảo

Wu, Q., Zeng, Y., & Zhang, R. (2018). Joint trajectory and communication design for multi-UAV enabled wireless networks[J]. IEEE Transactions on Wireless Communications, 17(3), 2109–2121. Wu, Q., & Zhang, R. (2018). Common throughput maximization in UAV-enabled OFDMA systems with delay consideration[J]. IEEE Transactions on Communications, 66(12), 6614–6627. Wu, Q., Xu, J., & Zhang, R. (2018). Capacity characterization of UAV enabled two-user broadcast channel[J]. IEEE Journal on Selected Areas in Communications, 36(9), 1955–1971. Zeng, Y., Zhang, R., & Lim, T. J. (2016). Throughput maximization for UAV-enabled mobile relaying systems[J]. IEEE Transactions on Communications, 64(12), 4983–4996. Yang, W., Tao, L., Sun, X., et al. (2019). Secure on-off transmission in mmWave systems with randomly distributed eavesdroppers[J]. IEEE Access, 7, 32681–32692. Xiang, Z., Yang, W., Cai, Y., et al. (2020). Secure transmission design in HARQ assisted cognitive NOMA networks[J]. IEEE Transactions on Information Forensics and Security, 15, 2528–2541. Xiang, Z., Yang, W., Pan, G., et al. (2019). Secure transmission in HARQ-assisted non-orthogonal multiple access networks[J]. IEEE Transactions on Information Forensics and Security, 15, 2171–2182. Ma, R., Yang, W., Sun, X., et al. (2019). Secure communication in millimetre wave relaying networks[J]. IEEE Access, 7, 31218–31232. Xue, Q., Zhou, P., Fang, X., et al. (2018). Performance analysis of interference and eavesdropping immunity in narrow beam mmWave networks[J]. IEEE Access, 6, 67611–67624. Liu, Y., Fang, X., & Xiao, M. (2020). Resource management for maximizing the secure sum rate in dense millimetre-wave networks[J]. IEEE Access, 8, 158416–158431. Huang, J., & Swindlehurst, A. L. (2011). Robust secure transmission in MISO channels based on worst-case optimization[J]. IEEE Transactions on Signal Processing, 60(4), 1696–1707. Yuan, Q., Hu, Y., Wang, C., et al. (2019). Joint 3D beamforming and trajectory design for UAV-enabled mobile relaying system[J]. IEEE Access, 7, 26488–26496. Zhang, G., Wu, Q., Cui, M., et al. (2017). Securing UAV communications via trajectory optimization[C]. IEEE Global Communications Conference. IEEE, 1–6. Zhang, G., Wu, Q., Cui, M., et al. (2019). Securing UAV communications via joint trajectory and power control[J]. IEEE Transactions on Wireless Communications, 18(2), 1376–1389. Wang, Q., Chen, Z., Li, H., et al. (2018). Joint power and trajectory design for physical-layer secrecy in the UAV-aided mobile relaying system[J]. IEEE Access, 6, 62849–62855. Zhong, C., Yao, J., & Xu, J. (2018). Secure UAV communication with cooperative jamming and trajectory control[J]. IEEE Communications Letters, 23(2), 286–289. Sun, X., Shen, C., Ng, D. W. K., et al. (2019). Robust trajectory and resource allocation design for secure UAV-aided communications[C]. In 2019 IEEE international conference on communications workshops (ICC Workshops). IEEE, 1–6. Li, A., Wu, Q., & Zhang, R. (2018). UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel[J]. IEEE Wireless Communications Letters, 8(1), 181–184. Abedi, M. R., Mokari, N., Saeedi, H., et al. (2016). Robust resource allocation to enhance physical layer security in systems with full-duplex receivers: Active adversary[J]. IEEE Transactions on Wireless Communications, 16(2), 885–899. Li, L., Petropulu, A. P., & Chen, Z. (2017). MIMO secret communications against an active eavesdropper[J]. IEEE Transactions on Information Forensics and Security, 12(10), 2387–2401. Al-Nahari, A. (2016). Physical layer security using massive multiple-input and multiple-output: Passive and active eavesdroppers[J]. IET Communications, 10(1), 50–56. Liu, J., Sha, N., Yang, W., et al. (2020). Hierarchical Q-Learning based UAV secure communication against multiple UAV adaptive eavesdroppers[J]. Wireless Communications and Mobile Computing. Li, C., et al. (2018). Protecting secure communication under UAV smart attack with imperfect channel estimation [J]. IEEE Access, 6, 76395–76401. Xiao, L., et al. (2017). User-centric view of unmanned aerial vehicle transmission against smart attacks[J]. IEEE Transactions on Vehicular Technology, 67(4), 3420–3430. Xiao, L., et al. (2018). UAV relay in VANETs against smart jamming with reinforcement learning[J]. IEEE Transactions on Vehicular Technology, 67(5), 4087–4097. Rappaport, T. S. (2002). Wireless communications-principles and practice, (The Book End) [J]. Microwave Journal, 45(12), 128–129. Monderer, D., & Shapley, L. S. (1996). Potential games[J]. Games and Economic Behaviour, 14(1), 124–143. Lucchetti, R., Mignanego, F., & Pieri, G. (1987). Existence theorems of equilibrium points in Stackelberg. Optimization, 18(6), 857–866. Kawamoto, Y., Takagi, H., Nishiyama, H., et al. (2018). Efficient resource allocation utilizing Q-learning in multiple UAV communications[J]. IEEE Transactions on Network Science and Engineering, 6(3), 293–302. Jia, L., Xu, Y., Sun, Y., et al. (2018). A game-theoretic learning approach for anti-jamming dynamic spectrum access in dense wireless networks[J]. IEEE Transactions on Vehicular Technology, 68(2), 1646–1656. Zheng, J., Cai, Y., Lu, N., et al. (2014). Stochastic game-theoretic spectrum access in distributed and dynamic environment[J]. IEEE Transactions on Vehicular Technology, 64(10), 4807–4820. Liu, Y., Fang, X., Xiao, M., et al. (2018). Decentralized beam pair selection in multi-beam millimetre-wave networks[J]. IEEE Transactions on Communications, 66(6), 2722–2737. Liu, Y., Fang, X., & Xiao, M. (2017). Discrete power control and transmission duration allocation for self-backhauling dense mmWave cellular networks[J]. IEEE Transactions on Communications, 66(1), 432–447. Ruan, L., Chen, J., Guo, Q., et al. (2018). Group buying-based data transmission in flying ad-hoc networks: A coalition game approach[J]. Information, 9(10), 253. Xu, Y., Wang, J., Wu, Q., et al. (2011). Opportunistic spectrum access in cognitive radio networks: Global optimization using local interaction games[J]. IEEE Journal of Selected Topics in Signal Processing, 6(2), 180–194. Sutton, R. S. and Barto, A. G. (2018). Reinforcement learning: An introduction. MIT press. Xu, Y., Ren. G., Chen. J. et al. (2017). Anti-jamming transmission in UAV communication networks: a Stackelberg game approach[C].In IEEE/CIC international conference on communications in China (ICCC). IEEE, 1–6.