logo

SCIENCE CHINA Information Sciences, Volume 62 , Issue 8 : 080304(2019) https://doi.org/10.1007/s11432-019-9928-5

Optimal power allocation for secure directional modulation networks with a full-duplex UAV user

More info
  • ReceivedApr 5, 2019
  • AcceptedJun 28, 2019
  • PublishedJul 12, 2019

Abstract

This paper makes an investigation of a secure unmanned aerial vehicle (UAV)-aided communication network based on directional modulation (DM). In this network, ground base station (GBS) acts as a control center to transmit confidential message and artificial noise (AN). The UAV user, moving along a linear flight trajectory, is intended to receive the useful information from GBS. At the same time, it also sends AN signals to further interference eavesdropper's channel. Aiming at maximizing secrecy rate during the UAV flight process, a joint optimization problem is formulated with respect to power allocation (PA) factors, beamforming vector and AN projection matrices. For simplicity, maximum rate transmission, null-space projection and the leakage-based method are applied to form the transmit beamforming vector, AN projection matrix at GBS, and AN projection vector at UAV user, respectively. Following this, the optimization problem reduces to a bivariate optimization programme with two PA factors. An alternating iterative algorithm (AIA) is proposed to optimize the two PA factors. Simulation results demonstrate that, compared to the half-duplex (HD) mode, the proposed strategy for full-duplex (FD) mode achieves a higher secrecy rate (SR) and outperforms the FD mode with fixed PA strategy.


Acknowledgment

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61771244, 61501238, 61702258, 61472190, 61801453, 61271230), in part by Open Research Fund of National Key Laboratory of Electromagnetic Environment, China Research Institute of Radiowave Propagation (Grant No. 201500013), in part by Jiangsu Provincial Science Foundation (Grant No. BK20150786), in part by Specially Appointed Professor Program in Jiangsu Province, 2015, in part by Fundamental Research Funds for the Central Universities (Grant No. 30916011205), and in part by Open Research Fund of National Mobile Communications Research Laboratory, Southeast University, China (Grant Nos. 2017D04, 2013D02).


References

[1] Zeng Y, Zhang R, Lim T J. Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag, 2016, 54: 36-42 CrossRef Google Scholar

[2] Wu Q Q, Zeng Y, Zhang R. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks. IEEE Trans Wireless Commun, 2018, 17: 2109-2121 CrossRef Google Scholar

[3] Li A, Zhang W. Mobile jammer-aided secure UAV communications via trajectory design and power control. China Commun, 2018, 15: 141-151 CrossRef Google Scholar

[4] Zhang G C, Wu Q Q, Cui M, et al. Securing UAV communications via trajectory optimization. In: Proceedings of IEEE Global Communications Conference, 2017. Google Scholar

[5] Chen Y, Zhao N, Ding Z. Multiple UAVs as Relays: Multi-Hop Single Link Versus Multiple Dual-Hop Links. IEEE Trans Wireless Commun, 2018, 17: 6348-6359 CrossRef Google Scholar

[6] Yang D C, Wu Q Q, Zeng Y. Energy Trade-off in Ground-to-UAV Communication via Trajectory Design. IEEE Trans Veh Technol, 2018, : 1-1 CrossRef Google Scholar

[7] Xu Y F, Ren G C, Chen J. A One-Leader Multi-Follower Bayesian-Stackelberg Game for Anti-Jamming Transmission in UAV Communication Networks. IEEE Access, 2018, 6: 21697-21709 CrossRef Google Scholar

[8] Cheng F, Zhang S, Li Z. UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells. IEEE Trans Veh Technol, 2018, 67: 6732-6736 CrossRef Google Scholar

[9] Zhang G, Yan H, Zeng Y. Trajectory Optimization and Power Allocation for Multi-Hop UAV Relaying Communications. IEEE Access, 2018, 6: 48566-48576 CrossRef Google Scholar

[10] Zhou X B, Yan S H, Hu J S, et al. Joint optimization of a UAV's trajectory and transmit power for covert communications. 2018,. arXiv Google Scholar

[11] Zhong C, Yao J, Xu J. Secure UAV Communication With Cooperative Jamming and Trajectory Control. IEEE Commun Lett, 2019, 23: 286-289 CrossRef Google Scholar

[12] Zhou X B, Wu Q Q, Yan S H. UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization. IEEE Trans Veh Technol, 2019, 68: 4069-4073 CrossRef Google Scholar

[13] Cai Y, Cui F, Shi Q. Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling. IEEE J Sel Areas Commun, 2018, 36: 1972-1985 CrossRef Google Scholar

[14] Liu C, Quek T Q S, Lee J. Secure UAV communication in the presence of active eavesdropper (invited paper). In: Proceedings of International Conference on Wireless Communications and Signal Processing, 2017. Google Scholar

[15] Babakhani A, Rutledge D B, Hajimiri A. Transmitter Architectures Based on Near-Field Direct Antenna Modulation. IEEE J Solid-State Circuits, 2008, 43: 2674-2692 CrossRef ADS Google Scholar

[16] Chen X M, Chen X F, Liu T. A Unified Performance Optimization for Secrecy Wireless Information and Power Transfer Over Interference Channels. IEEE Access, 2017, 5: 12726-12736 CrossRef Google Scholar

[17] Zou Y, Champagne B, Zhu W P. Relay-Selection Improves the Security-Reliability Trade-Off in Cognitive Radio Systems. IEEE Trans Commun, 2015, 63: 215-228 CrossRef Google Scholar

[18] Lee H, Eom S, Park J. UAV-Aided Secure Communications With Cooperative Jamming. IEEE Trans Veh Technol, 2018, 67: 9385-9392 CrossRef Google Scholar

[19] Khuwaja A A, Chen Y, Zhao N. A Survey of Channel Modeling for UAV Communications. IEEE Commun Surv Tutorials, 2018, 20: 2804-2821 CrossRef Google Scholar

[20] Negi R, Goel S. Secret communication using artificial noise. In: Proceedings of IEEE Vehicular Technology Conference, 2005. 3: 1906--1910. Google Scholar

[21] Wu Y P, Wang J B, Wang J. Secure Transmission with Large Numbers of Antennas and Finite Alphabet Inputs. IEEE Trans Commun, 2017, : 1-1 CrossRef Google Scholar

[22] Ding Y, Fusco V F. A Vector Approach for the Analysis and Synthesis of Directional Modulation Transmitters. IEEE Trans Antennas Propagat, 2014, 62: 361-370 CrossRef ADS Google Scholar

[23] Shu F, Xu L, Wang J. Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems. IEEE Trans Veh Technol, 2018, 67: 6658-6662 CrossRef Google Scholar

[24] Wan S M, Shu F, Lu J H. Power Allocation Strategy of Maximizing Secrecy Rate for Secure Directional Modulation Networks. IEEE Access, 2018, 6: 38794-38801 CrossRef Google Scholar

[25] Shu F, Qin Y L, Liu T T. Low-Complexity and High-Resolution DOA Estimation for Hybrid Analog and Digital Massive MIMO Receive Array. IEEE Trans Commun, 2018, 66: 2487-2501 CrossRef Google Scholar

[26] Shu F, Zhu W, Zhou X B. Robust Secure Transmission of Using Main-Lobe-Integration-Based Leakage Beamforming in Directional Modulation MU-MIMO Systems. IEEE Syst J, 2018, 12: 3775-3785 CrossRef ADS arXiv Google Scholar

[27] Shu F, Wu X M, Hu J S. Secure and Precise Wireless Transmission for Random-Subcarrier-Selection-Based Directional Modulation Transmit Antenna Array. IEEE J Sel Areas Commun, 2018, 36: 890-904 CrossRef Google Scholar

[28] El Shafie A, Niyato D, Al-Dhahir N. Artificial-Noise-Aided Secure MIMO Full-Duplex Relay Channels With Fixed-Power Transmissions. IEEE Commun Lett, 2016, 20: 1591-1594 CrossRef Google Scholar

[29] Lee J H. Full-Duplex Relay for Enhancing Physical Layer Security in Multi-Hop Relaying Systems. IEEE Commun Lett, 2015, 19: 525-528 CrossRef Google Scholar

[30] Chen G J, Gong Y, Xiao P. Physical Layer Network Security in the Full-Duplex Relay System. IEEE TransInformForensic Secur, 2015, 10: 574-583 CrossRef Google Scholar

[31] Li Y Z, Tao C, Liu L. Energy-efficiency-aware relay selection in distributed full duplex relay network with massive MIMO. Sci China Inf Sci, 2017, 60: 22309 CrossRef Google Scholar

[32] Li S, Li Q, Shao S H. Robust secrecy beamforming for full-duplex two-way relay networks under imperfect channel state information. Sci China Inf Sci, 2018, 61: 022307 CrossRef Google Scholar

[33] Shu F, Wang M M, Wang Y X. An Efficient Power Allocation Scheme for Leakage-Based Precoding in Multi-Cell Multiuser MIMO Downlink. IEEE Commun Lett, 2011, 15: 1053-1055 CrossRef Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号