UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI (2306.06686v2)
Abstract: This paper tackles the fundamental passive eavesdropping problem in modern wireless communications in which the location and the channel state information (CSI) of the attackers are unknown. In this regard, we propose deploying an unmanned aerial vehicle (UAV) that serves as a mobile aerial relay (AR) to help ground base station (GBS) support a subset of vulnerable users. More precisely, our solution (1) clusters the single-antenna users in two groups to be either served by the GBS directly or via the AR, (2) employs optimal multi-user beamforming to the directly served users, and (3) optimizes the AR's 3D position, its multi-user beamforming matrix and transmit powers by combining closed-form solutions with machine learning techniques. Specifically, we design a plain beamforming and power optimization combined with a deep reinforcement learning (DRL) algorithm for an AR to optimize its trajectory for the security maximization of the served users. Numerical results show that the multi-user multiple input, single output (MU-MISO) system split between a GBS and an AR with optimized transmission parameters without knowledge of the eavesdropping channels achieves high secrecy capacities that scale well with increasing the number of users.
- M. Mozaffari, X. Lin, and S. Hayes, “Toward 6g with connected sky: Uavs and beyond,” IEEE Communications Magazine, vol. 59, no. 12, pp. 74–80, 2021.
- H. Tataria, M. Shafi, A. F. Molisch, M. Dohler, H. Sjöland, and F. Tufvesson, “6g wireless systems: Vision, requirements, challenges, insights, and opportunities,” Proceedings of the IEEE, vol. 109, no. 7, pp. 1166–1199, 2021.
- A. S. Abdalla, K. Powell, V. Marojevic, and G. Geraci, “UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks,” IEEE Wireless Commun., vol. 27, no. 4, pp. 40–47, 2020.
- A. S. Abdalla and V. Marojevic, “Communications Standards for Unmanned Aircraft Systems: The 3GPP Perspective and Research Drivers,” IEEE Commun. Standards Mag., vol. 5, no. 1, pp. 70–77, 2021.
- A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. G. Giordano, A. Garcia-Rodriguez, and J. Yuan, “Survey on uav cellular communications: Practical aspects, standardization advancements, regulation, and security challenges,” IEEE Communications surveys & tutorials, vol. 21, no. 4, pp. 3417–3442, 2019.
- H. V. Poor and R. F. Schaefer, “Wireless physical layer security,” Proceedings of the National Academy of Sciences, vol. 114, no. 1, pp. 19–26, 2017.
- M. Yang, D. Guo, Y. Huang, T. Q. Duong, and B. Zhang, “Physical layer security with threshold-based multiuser scheduling in multi-antenna wireless networks,” IEEE Transactions on Communications, vol. 64, no. 12, pp. 5189–5202, 2016.
- X. Jiang, P. Li, Y. Zou, B. Li, and R. Wang, “Physical layer security for cognitive multiuser networks with hardware impairments and channel estimation errors,” IEEE Transactions on Communications, 2022.
- J. Bai, T. Dong, Q. Zhang, S. Wang, and N. Li, “Coordinated Beamforming and Artificial Noise in the Downlink Secure Multi-Cell MIMO Systems Under Imperfect CSI,” IEEE Wireless Communications Letters, vol. 9, no. 7, pp. 1023–1026, 2020.
- M. A. Teeti, “Downlink Secrecy Rate of One-Bit Massive MIMO System With Active Eavesdropping,” IEEE Access, vol. 8, pp. 37 821–37 842, 2020.
- C. Zhu, J. Xu, and J. Xue, “Secure MISO Beamforming Optimization with Randomly Distributed Eavesdroppers and Interferers,” in 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), 2019, pp. 1–5.
- M. T. Mamaghani and Y. Hong, “Joint Trajectory and Power Allocation Design for Secure Artificial Noise Aided UAV Communications,” IEEE Transactions on Vehicular Technology, vol. 70, no. 3, pp. 2850–2855, 2021.
- Y. Ning and R. Chen, “Secure UAV Relay Communication via Power Allocation and Trajectory Planning,” IEEE Systems Journal, pp. 1–10, 2022.
- A. S. Abdalla, A. Behfarnia, and V. Marojevic, “Aerial Base Station Positioning and Power Control for Securing Communications: A Deep Q-Network Approach,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), 2022, pp. 2470–2475.
- G. Sun, J. Li, A. Wang, Q. Wu, Z. Sun, and Y. Liu, “Secure and Energy-Efficient UAV Relay Communications Exploiting Collaborative Beamforming,” IEEE Transactions on Communications, pp. 1–1, 2022.
- Y. Zhang, Z. Mou, F. Gao, J. Jiang, R. Ding, and Z. Han, “UAV-Enabled Secure Communications by Multi-Agent Deep Reinforcement Learning,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11 599–11 611, 2020.
- Z. Yin, M. Jia, N. Cheng, W. Wang, F. Lyu, Q. Guo, and X. Shen, “UAV-Assisted Physical Layer Security in Multi-Beam Satellite-Enabled Vehicle Communications,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 3, pp. 2739–2751, 2022.
- H. Wu, Y. Wen, J. Zhang, Z. Wei, N. Zhang, and X. Tao, “Energy-Efficient and Secure Air-to-Ground Communication With Jittering UAV,” IEEE Transactions on Vehicular Technology, vol. 69, no. 4, pp. 3954–3967, 2020.
- S. Sun, T. A. Thomas, T. S. Rappaport, H. Nguyen, I. Z. Kovacs, and I. Rodriguez, “Path Loss, Shadow Fading, and Line-of-Sight Probability Models for 5G Urban Macro-Cellular Scenarios,” in 2015 IEEE Globecom Workshops (GC Wkshps), 2015, pp. 1–7.
- T. Jiang, J. Zhang, P. Tang, L. Tian, Y. Zheng, J. Dou, H. Asplund, L. Raschkowski, R. D’Errico, and T. Jämsä, “3GPP Standardized 5G Channel Model for IIoT Scenarios: A Survey,” IEEE Internet of Things Journal, vol. 8, no. 11, pp. 8799–8815, 2021.
- R. Zhang, C. C. Chai, and Y.-C. Liang, “Joint beamforming and power control for multiantenna relay broadcast channel with qos constraints,” IEEE Transactions on Signal Processing, vol. 57, no. 2, pp. 726–737, 2009.
- B. Li, S. Zhao, R. Zhang, and L. Yang, “Full-duplex UAV relaying for multiple user pairs,” IEEE Internet of Things Journal, vol. 8, no. 6, pp. 4657–4667, 2020.
- B. Li, R. Zhang, and L. Yang, “Joint user scheduling and uav trajectory optimization for full-duplex uav relaying,” in ICC 2021-IEEE International Conference on Communications. IEEE, 2021, pp. 1–6.
- N. Yang, L. Wang, G. Geraci, M. Elkashlan, J. Yuan, and M. D. Renzo, “Safeguarding 5G wireless communication networks using physical layer security,” IEEE Commun. Mag., vol. 53, no. 4, pp. 20–27, 2015.
- J. Wang, C. Jiang, Z. Wei, C. Pan, H. Zhang, and Y. Ren, “Joint UAV Hovering Altitude and Power Control for Space-Air-Ground IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1741–1753, 2019.
- V. Marojevic, R. M. Rao, S. Ha, and J. H. Reed, “Performance analysis of a mission-critical portable lte system in targeted rf interference,” in 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall), 2017, pp. 1–5.
- R. Xu and D. Wunsch, “Survey of clustering algorithms,” IEEE Transactions on Neural Networks, vol. 16, no. 3, pp. 645–678, 2005.
- J. Li, B. Ai, R. He, M. Yang, Z. Zhong, and Y. Hao, “A Cluster-Based Channel Model for Massive MIMO Communications in Indoor Hotspot Scenarios,” IEEE Transactions on Wireless Communications, vol. 18, no. 8, pp. 3856–3870, 2019.
- A. Naveed and S. S. Kanhere, “Cluster-based channel assignment in multi-radio multi-channel wireless mesh networks,” in 2009 IEEE 34th Conference on Local Computer Networks, 2009, pp. 53–60.
- A. Ali et al., “Channel Clustering and QoS Level Identification Scheme for Multi-Channel Cognitive Radio Networks,” IEEE Communications Magazine, vol. 56, no. 4, pp. 164–171, 2018.
- N. Czink et al., “A Framework for Automatic Clustering of Parametric MIMO Channel Data Including Path Powers,” in IEEE Vehicular Technology Conference, 2006, pp. 1–5.
- L.-N. Tran et al., “Fast Converging Algorithm for Weighted Sum Rate Maximization in Multicell MISO Downlink,” IEEE Signal Processing Letters, vol. 19, no. 12, pp. 872–875, 2012.
- Y. Jeon, C. Song, S. Maeng, M. Park, and I. Lee, “MMSE based two-stage beamforming for large-scale multi-user MISO systems,” in 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, pp. 1–6.
- Q. Shi, M. Razaviyayn, Z.-Q. Luo, and C. He, “An Iteratively Weighted MMSE Approach to Distributed Sum-Utility Maximization for a MIMO Interfering Broadcast Channel,” IEEE Transactions on Signal Processing, vol. 59, no. 9, pp. 4331–4340, 2011.
- S. S. Christensen, R. Agarwal, E. de Carvalho, and J. M. Cioffi, “Weighted Sum-Rate Maximization Using Weighted MMSE for MIMO-BC Beamforming Design,” in 2009 IEEE International Conference on Communications, 2009, pp. 1–6.
- A. S. Abdalla and V. Marojevic, “Securing Mobile Multiuser Transmissions with UAVs in the Presence of Multiple Eavesdroppers,” IEEE Transactions on Vehicular Technology, pp. 1–1, 2021.
- Y. Zhang et al., “UAV-Enabled Secure Communications by Multi-Agent Deep Reinforcement Learning,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11 599–11 611, 2020.
- J. Li et al., “Deep reinforcement learning based computation offloading and resource allocation for mec,” in 2018 IEEE Wireless Communications and Networking Conference (WCNC), 2018, pp. 1–6.
- C. E. Mariano and E. F. Morales, “Dql: A new updating strategy for reinforcement learning based on q-learning,” in Machine Learning: ECML 2001, L. De Raedt and P. Flach, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001, pp. 324–335.
- M. Andrews, C. Dibek, and K. Palyutina, “Evolution of Q Values for Deep Q Learning in Stable Baselines,” 2020.
- B. Jang, M. Kim, G. Harerimana, and J. W. Kim, “Q-Learning Algorithms: A Comprehensive Classification and Applications,” IEEE Access, vol. 7, pp. 133 653–133 667, 2019.
- V. Mnih et al., “Human-level control through deep reinforcement learning,” nature, vol. 518, no. 7540, pp. 529–533, 2015.
- K. Arulkumaran, M. P. Deisenroth, M. Brundage, and A. A. Bharath, “Deep reinforcement learning: A brief survey,” IEEE Signal Processing Magazine, vol. 34, no. 6, pp. 26–38, 2017.
- K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, “Secrecy rate optimizations for a MIMO secrecy channel with a multiple-antenna eavesdropper,” IEEE Transactions on Vehicular Technology, vol. 63, no. 4, pp. 1678–1690, 2013.
- P.-H. Lin, S.-H. Lai, S.-C. Lin, and H.-J. Su, “On secrecy rate of the generalized artificial-noise assisted secure beamforming for wiretap channels,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 1728–1740, 2013.
- M. T. Mamaghani and Y. Hong, “Intelligent trajectory design for secure full-duplex mimo-uav relaying against active eavesdroppers: A model-free reinforcement learning approach,” IEEE Access, vol. 9, pp. 4447–4465, 2020.
- H. Kang, J. Joung, J. Ahn, and J. Kang, “Secrecy-aware altitude optimization for quasi-static uav base station without eavesdropper location information,” IEEE Communications Letters, vol. 23, no. 5, pp. 851–854, 2019.
- D. Wang, B. Bai, G. Zhang, and Z. Han, “Optimal placement of low-altitude aerial base station for securing communications,” IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 869–872, 2019.
- Y. Zhang, Z. Mou, F. Gao, J. Jiang, R. Ding, and Z. Han, “Uav-enabled secure communications by multi-agent deep reinforcement learning,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 11 599–11 611, 2020.
- X. Lin et al., “The sky is not the limit: LTE for unmanned aerial vehicles,” IEEE Communications Magazine, vol. 56, no. 4, pp. 204–210, 2018.
- A. S. Abdalla, A. Yingst, K. Powell, A. Gelonch-Bosch, and V. Marojevic, “Open Source Software Radio Platform for Research on Cellular Networked UAVs: It Works!” IEEE Communications Magazine, vol. 60, no. 2, pp. 60–66, 2022.
- Y. Su, X. Lu, L. Huang, X. Du, and M. Guizani, “Tac-u: A traffic balancing scheme over licensed and unlicensed bands for tactile internet,” Future Generation Computer Systems, vol. 97, pp. 41–49, 2019.
- Y. Su et al., “Cooperative relaying and power control for uav-assisted vehicular networks with deep q-network,” in 2021 IEEE/CIC International Conference on Communications in China (ICCC), 2021, pp. 318–323.