Robust Secure UAV Communications With the Aid of Jamming Beamforming

Yalin Zhang, Xiaozheng Gao*, Minwei Shi, Hang Yuan, Jiawen Kang, Dusit Niyato, Kai Yang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

This paper investigates an unmanned aerial vehicle (UAV)-base station (BS) integrated network, where a UAV transmits downlink secrecy data to multiple ground cognitive users while a ground BS utilizes jamming beamforming to help the UAV counter the eavesdropping attack of a ground eavesdropper. In particular, we consider the imperfect eavesdropping and jamming channel state information (CSI) related to the eavesdropper. To maximize the minimum sum secrecy rate of the cognitive users, a robust secure transmission scheme is proposed. The UAV trajectory, UAV transmit power, BS beamforming, and user scheduling are jointly optimized with the constraints of the communication quality of the primary users served by the BS and the UAV available propulsion energy. We formulate a non-convex optimization problem which is challenging to be solved mathematically, and we utilize an alternating optimization technique to divide the original problem into three sub-problems, i.e., UAV trajectory sub-problem, transmit power sub-problem, and user scheduling sub-problem. Besides, they can be solved by the successive convex approximation, semi-definite relaxation and S-procedure, and bivariate relaxation methods, respectively. Moreover, we explore the impact of different parameters of the proposed transmission scheme on the minimum sum secrecy rate of the cognitive users, and verify the superiority of the proposed robust secure transmission scheme design.

Original languageEnglish
JournalIEEE Transactions on Communications
DOIs
Publication statusAccepted/In press - 2025
Externally publishedYes

Keywords

  • jamming beamforming
  • physical layer security
  • Robust secure UAV communications

Fingerprint

Dive into the research topics of 'Robust Secure UAV Communications With the Aid of Jamming Beamforming'. Together they form a unique fingerprint.

Cite this