{"title":"大规模无人机无线网络的保密传输能力","authors":"Jianping Yao, Jie Xu","doi":"10.1109/ICCW.2019.8756908","DOIUrl":null,"url":null,"abstract":"This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their respective legitimate receivers on the ground, in the presence of another set of randomly distributed suspicious ground eavesdroppers. We assume that the horizontal locations of legitimate receivers and eavesdroppers are distributed as two independent homogeneous Possion point processes (PPPs), and each of the UAVs is positioned exactly above its corresponding legitimate receiver for efficient secrecy communication. Furthermore, we consider an elevation-angle-dependent line-of-sight (LoS)/non-LoS (NLoS) path-loss model for air-to-ground (A2G) wireless channels and employ the wiretap code for secrecy transmission. Under this setup, we first characterize the secrecy communication performance (in terms of the connection probability (CP), secrecy outage probability (SOP), and secrecy transmission capacity (STC)) in mathematically tractable forms. Next, we optimize the system configurations (i.e., the wiretap code rates and UAV positioning altitude) to maximize the STC, subject to a maximum SOP constraint. Finally, we present numerical results to validate the theoretical analysis.","PeriodicalId":426086,"journal":{"name":"2019 IEEE International Conference on Communications Workshops (ICC Workshops)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Secrecy Transmission Capacity of Large-Scale UAV-Enabled Wireless Networks\",\"authors\":\"Jianping Yao, Jie Xu\",\"doi\":\"10.1109/ICCW.2019.8756908\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their respective legitimate receivers on the ground, in the presence of another set of randomly distributed suspicious ground eavesdroppers. We assume that the horizontal locations of legitimate receivers and eavesdroppers are distributed as two independent homogeneous Possion point processes (PPPs), and each of the UAVs is positioned exactly above its corresponding legitimate receiver for efficient secrecy communication. Furthermore, we consider an elevation-angle-dependent line-of-sight (LoS)/non-LoS (NLoS) path-loss model for air-to-ground (A2G) wireless channels and employ the wiretap code for secrecy transmission. Under this setup, we first characterize the secrecy communication performance (in terms of the connection probability (CP), secrecy outage probability (SOP), and secrecy transmission capacity (STC)) in mathematically tractable forms. Next, we optimize the system configurations (i.e., the wiretap code rates and UAV positioning altitude) to maximize the STC, subject to a maximum SOP constraint. Finally, we present numerical results to validate the theoretical analysis.\",\"PeriodicalId\":426086,\"journal\":{\"name\":\"2019 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Communications Workshops (ICC Workshops)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCW.2019.8756908\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Communications Workshops (ICC Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCW.2019.8756908","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
摘要
本文研究了大规模无人机(UAV)无线网络中的保密传输问题,在另一组随机分布的可疑地面窃听者存在的情况下,空中的一组无人机向其各自的地面合法接收器传输机密信息。我们假设合法接收者和窃听者的水平位置分布为两个独立的同质Possion point processes (ppp),并且每个无人机都精确地定位在其相应的合法接收者的上方,以实现有效的保密通信。此外,我们考虑了空对地(A2G)无线信道的仰角相关视距(LoS)/非视距(NLoS)路径损耗模型,并采用窃听代码进行保密传输。在这种设置下,我们首先用数学上易于处理的形式描述保密通信性能(根据连接概率(CP)、保密中断概率(SOP)和保密传输容量(STC))。接下来,我们在最大SOP约束下,优化系统配置(即窃听码率和无人机定位高度)以最大化STC。最后给出了数值结果来验证理论分析。
Secrecy Transmission Capacity of Large-Scale UAV-Enabled Wireless Networks
This paper considers the secrecy transmission in a large-scale unmanned aerial vehicle (UAV)-enabled wireless network, in which a set of UAVs in the sky transmit confidential information to their respective legitimate receivers on the ground, in the presence of another set of randomly distributed suspicious ground eavesdroppers. We assume that the horizontal locations of legitimate receivers and eavesdroppers are distributed as two independent homogeneous Possion point processes (PPPs), and each of the UAVs is positioned exactly above its corresponding legitimate receiver for efficient secrecy communication. Furthermore, we consider an elevation-angle-dependent line-of-sight (LoS)/non-LoS (NLoS) path-loss model for air-to-ground (A2G) wireless channels and employ the wiretap code for secrecy transmission. Under this setup, we first characterize the secrecy communication performance (in terms of the connection probability (CP), secrecy outage probability (SOP), and secrecy transmission capacity (STC)) in mathematically tractable forms. Next, we optimize the system configurations (i.e., the wiretap code rates and UAV positioning altitude) to maximize the STC, subject to a maximum SOP constraint. Finally, we present numerical results to validate the theoretical analysis.