On secure UAV communication systems with randomly located eavesdroppers

Hongiiang Lei, Di Wang, Ki Hong Park, Imran Shafique Ansari, Gaofeng Pan, Mohamed Slim Alouini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Citations (Scopus)

Abstract

Unmanned aerial vehicles (UAVs) have been extensively utilized in various scenarios due to their flexible mobility and rapid on-demand deployment. It becomes necessary and urgent to examine the secrecy performance of the UAV communication systems due to the open characteristics of the transmission technologies employed in UAV systems. In this paper, we investigate the physical layer security of the UAV communication system, in which the ground base station sends secret messages to the UAV hovering in the air, while a random number of eavesdroppers are randomly located around the ground base station. Using the Poisson point process theory, we obtain the exact and approximate expressions of the cumulative distribution function for the signal-to-noise ratio of the ground-to-air link, and then the analytical expressions of the secrecy outage probability and the average secrecy rate are derived. Finally, the accuracy of the analytical results is validated by Monte Carlo simulation.

Original languageEnglish
Title of host publication2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-206
Number of pages6
ISBN (Electronic)9781728107325
DOIs
Publication statusPublished - Aug 2019
Event2019 IEEE/CIC International Conference on Communications in China, ICCC 2019 - Changchun, China
Duration: 11 Aug 201913 Aug 2019

Publication series

Name2019 IEEE/CIC International Conference on Communications in China, ICCC 2019

Conference

Conference2019 IEEE/CIC International Conference on Communications in China, ICCC 2019
Country/TerritoryChina
CityChangchun
Period11/08/1913/08/19

Fingerprint

Dive into the research topics of 'On secure UAV communication systems with randomly located eavesdroppers'. Together they form a unique fingerprint.

Cite this