+ All Categories
Home > Documents > Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using...

Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using...

Date post: 11-Aug-2020
Category:
Upload: others
View: 12 times
Download: 0 times
Share this document with a friend
16
Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor, H. V. (2020). Secure UAV-Enabled Communication Using Han-Kobayashi Signaling. IEEE Transactions on Wireless Communications, 19(5), 2905 - 2919. https://doi.org/10.1109/TWC.2020.2968317 Published in: IEEE Transactions on Wireless Communications Document Version: Peer reviewed version Queen's University Belfast - Research Portal: Link to publication record in Queen's University Belfast Research Portal Publisher rights © 2020 The Authors. This work is made available online in accordance with the publisher’s policies. Please refer to any applicable terms of use of the publisher. General rights Copyright for the publications made accessible via the Queen's University Belfast Research Portal is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The Research Portal is Queen's institutional repository that provides access to Queen's research output. Every effort has been made to ensure that content in the Research Portal does not infringe any person's rights, or applicable UK laws. If you discover content in the Research Portal that you believe breaches copyright or violates any law, please contact [email protected]. Download date:10. Nov. 2020
Transcript
Page 1: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

Secure UAV-Enabled Communication Using Han-Kobayashi Signaling

Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor, H. V. (2020). Secure UAV-Enabled CommunicationUsing Han-Kobayashi Signaling. IEEE Transactions on Wireless Communications, 19(5), 2905 - 2919.https://doi.org/10.1109/TWC.2020.2968317

Published in:IEEE Transactions on Wireless Communications

Document Version:Peer reviewed version

Queen's University Belfast - Research Portal:Link to publication record in Queen's University Belfast Research Portal

Publisher rights© 2020 The Authors.This work is made available online in accordance with the publisher’s policies. Please refer to any applicable terms of use of the publisher.

General rightsCopyright for the publications made accessible via the Queen's University Belfast Research Portal is retained by the author(s) and / or othercopyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associatedwith these rights.

Take down policyThe Research Portal is Queen's institutional repository that provides access to Queen's research output. Every effort has been made toensure that content in the Research Portal does not infringe any person's rights, or applicable UK laws. If you discover content in theResearch Portal that you believe breaches copyright or violates any law, please contact [email protected].

Download date:10. Nov. 2020

Page 2: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

1

Secure UAV-Enabled Communication UsingHan-Kobayashi Signaling

Zhichao Sheng, Hoang D. Tuan, A. A. Nasir, Trung Q. Duong, and H. Vincent Poor

Abstract—This paper proposes Han-Kobayashi signaling (HK-S), under which each pair of users decodes a common message toimprove their throughput, for UAV-enabled multi-user communi-cation. Given that only a single transmit antenna is used and thusthere is no null space of users’ channels for inserting an artificialnoise that would effectively help to jam an eavesdropper withoutinterfering the users’ desired signals, a new information andartificial noise transfer scheme to address physical layer security(PLS) for the considered networks is investigated. Under thisscheme, the UAV sends the confidential information to its userswithin a fraction of the time slot and sends the artificial noisewithin the remaining fraction. Accordingly, the problem of jointlyoptimizing the time-fraction, bandwidth and power allocationto maximize the users’ worst secrecy throughput is formulated.New inner approximations are proposed for developing path-following algorithms for its computation. Simulation shows thatthe proposed information and artificial noise transfer enables notonly HKS but also orthogonal multi-access and nonorthogonalmulti-access to provide PLS for UAV-enabled communicationeven when the eavesdropper is in the best channel condition.HKS outperforms the other two in terms of users’ worst secrecythroughput.

Index Terms—Secure communication, secrecy throughput, un-manned aerial vehicle (UAV), Han-Kobayshi signaling, non-convex optimization,

I. INTRODUCTION

Interference management is the key to achieving highthroughput in multi-user communication, whose aim is to servemultiple users at the same time within a constrained band-width. In conventional orthogonal multi-access (OMA), eachuser decodes its own message by treating other messages asinterference. Nonorthogonal multiple access (NOMA) [1], [2]

This work was supported in part by National Natural Science Foundation ofChina (NSFC) under Grant 61901254, in part by the Institute for Computation-al Science and Technology, Hochiminh City, Vietnam, in part by the AustralianResearch Councils’ Discovery Projects under Project DP190102501, in partby the U.K. Royal Academy of Engineering Research Fellowship under GrantRF1415\14\22, in part by the U.S. National Science Foundation under GrantsCCF-0939370 and CCF-1908308

Zhichao Sheng was with Queen’s University Belfast, Belfast BT7 1NN,UK. He is now with Shanghai Institute for Advanced Communication andData Science, the Key Laboratory of Specialty Fiber Optics and OpticalAccess Networks, Shanghai University, Shanghai 200444, China (email:[email protected]).

Hoang D. Tuan is with the school of Electrical and Data Engineer-ing, University of Technology, Sydney, NSW 2007, Australia (email: [email protected]).

A. A. Nasir is with the Department of Electrical Engineering, King FahdUniversity of Petroleum and Minerals (KFUPM), Dhahran, Saudi Arabia(email: [email protected]).

Trung Q. Duong is with Queen’s University Belfast, Belfast BT7 1NN,UK (email: [email protected]).

H. V. Poor is with the Department of Electrical Engineering, PrincetonUniversity, Princeton, NJ 08544, USA (email: [email protected]).

allows users with better channel conditions to decode messagesfor users with poorer channel conditions so the former cansubtract these messages for the latter from their interference todecode their own messages with a better throughput outcome.By optimizing all their beamforming vectors, the throughputof all users can be substantially improved [3]. On the otherhand, Han-Kobayashi signaling (HKS) [4] assigns a commonmessage to each pair of users so that they can subtract thiscommon message before decoding their own message to gaintheir throughput. Again, the throughput of all users can besubstantially improved by beamforming optimization [5]–[7].Recently, it has been shown in [8] that both OMA and NOMAare actually particular cases of HKS, and that unlike NOMA,the performance of HKS is not dependent on how the users’channel conditions are differentiated. All these aforementionedworks exploit multiple transmit antennas, under which thewireless channels undergo rich scattering and transmit beam-forming can enjoy the spatial diversity in delivering highthroughput to the users. Rich scattering of wireless channelsalso plays a crucial role for ensuring physical layer security(PLS) [9]–[12], by aiding in achieving high secrecy throughputvia secure beamforming [13]–[15].

Unmanned aerial vehicle (UAV)-enabled communicationhas attracted a lot of attention thanks to its high mobility andconfiguration flexibility [16]–[18]. The air-to-ground (A2G)channel between an UAV and a ground user is dominated bylight-of-sight and thus is sufficiently strong for delivering highthroughput. However, UAV-enabled communication preferablyuses only a single transmit antenna as it is not beneficialto deploy multiple antennas due to A2G poor scattering.Thus, using single-antenna UAV, serving multiple users overorthogonal frequency bands is the only way to suppress themulti-user interference. It has been shown in [19] that theoptimal bandwidth allocation to users’ pairs to accommodateNOMA can bring much better users’ throughput than the opti-mal bandwidth allocation to individual users to accommodateOMA, provided that the A2G channel gains between the UAVand each of the paired users are clearly distinct. A similarNOMA for UAV-enabled communication was also proposed[20].

Poor scattering also gives rise to insecure A2G channels,making them proner to being overheard by a ground eaves-dropper (EV). In addition, the presence of a strong line-of-sight communication link strengthens the chance EV’s attack.So, it is important to provide secure UAV-enabled commu-nication. The closed-form analytical expressions for secrecyoutage probability or average secrecy capacity were derived in[21] and [22]. PLS for a single A2G channel was considered

Page 3: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

2

in [23]–[27]. The joint design of UAV trajectory/location andpower optimization to maximize users’ secrecy throughputwas addressed in [23]–[31]. Specifically, multiple potentialeavesdroppers on the ground were considered with imperfectposition information in [23], while in [25], an UAV was em-ployed as a mobile jammer to combat against eavesdropping.In [26], both the downlink and uplink UAV communicationswere studied. In [27], the authors considered millimeter wavesimultaneous wireless information and power transfer in UAVcommunications. Achieving secure communication over A2Gchannels is challenging because there is no null space ofthe user’s channel for inserting an artificial noise (AN) thatwould help to effectively jam the EV without interferingthe users’ desired signals. To ensure secure communication,the authors in [28] optimized the UAV trajectory in such away that would maximize the minimum secrecy throughput(among all users). In [24], [29]–[31], the authors used twoUAVs in providing secure communication with one UAVdelivering only information while the other sending onlyartificial noise to jam the EV(s). It is noteworthy that deployinga dynamic UAV or multiple stationary UAVs is too costlyand thus not practical for secure communication. Beyondsecure throughput, energy efficiency (EE) was considered forsecure UAV-OFDMA systems in [32], where the joint designof transmit power, user scheduling, trajectory, and velocityfor EE maximization was addressed. The main limitaion ofexisting works [23]–[27] is that they do not consider multi-user communication. Specifically, different from the existingrelevant works [23]–[32], we propose the use of HKS for UAV-enabled communication, which will be shown outperformingthe performances of existing OMA and NOMA based UAV-enabled systems.

This paper investigates a multi-user communication system,where a single-antenna UAV aims to provide secure communi-cation to multiple users in the presence of an EV. The locationof the UAV, which can be optimized offline for a certainregion, is fixed in order to save energy consumption that is avery critical issue in UAV-enabled communication. It has beenshown in [33] that the energy consumption of a hovering UAVis the lowest when compared with that of a moving or circlingUAV. The contributions and innovative aspects of this paperare as follows.

• This is the first work to propose HKS for UAV-enabledcommunication. Particularly, by jointly optimizing thebandwidth and power allocation, HKS is shown toachieve a sensible gain in terms of users’ throughputcompared to OMA and NOMA [19].

• This is the first work in PLS that considers an EV whichis placed in the best position to receive the strongestsignal from the UAV. Without PLS, the EV thus caneasily overhear this signal. On the other hand, thereis no null space of users’ channels for inserting anartificial noise to jam the EV. To combat against thepositioning advantage of the EV and to resolve the issueof jamming the EV, the paper proposes an innovativeinformation and AN transfer, under which the UAV sendsthe confidential information to its users within a fraction

of a time slot and then sends the AN to jam the EV in theremaining fraction. The advantages of the time-fraction-wise transfer have been conveyed in [34]. In the contextof PLS, the EV wiretaps the UAV signal on time-slotbase, which is jammed by the inserted AN.

• Under the proposed information and AN transfer, the pa-per addresses the problem of jointly optimizing the time-fraction, power, and bandwidth allocation to maximizethe users’ minimum secrecy throughput, which is seenas an extremely difficult nonconvex optimization prob-lem with its decision variables entangled. Nevertheless,the paper proposes new inner approximation techniquesfor developing efficient path-following algorithms forits computations. The numerical examples demonstratethe advantages the proposed secure transmission, underwhich HKS also outperforms OMA and NOMA. Impor-tantly, all of them offer a secure communication at lowcost, which is not affected by the EV’s positioning.

Notation. [x]+ , max{x, 0} for a scalar x. n ∼ CN (n, σ2)indicates that n is circularly-symmetric complex Gaussianrandom variable with means n and variance σ2. The notation∑Mj 6=i refers to the summation taken over the index set

{1, . . . ,M} \ {i}. Optimization variables are in boldface.The rest of the paper is organized as follows. Section

II is devoted to secure HKS to protect an UAV-enabledcommunication from the EV’s overhearing over the wholebandwidth. Secure HKS to protect the EV’s overhearing inthe allocated bandwidths is developed in Section III. Thesimulation is provided in Section IV to demonstrate theeffectiveness of the proposed solutions and algorithms in theprevious section. Conclusions are given in Section V. Somefundamental deterministic inequalities that are used in SectionsII-III are given in the appendix.

II. SECURE HKS FOR UAV-ENABLED COMMUNICATION

Consider a single-antenna UAV to serve K ground users(UEs) in a certain out-door location such as stadium, trafficjam, concert, etc., as depicted in Fig. 1. Obviously, these KUEs can be categorized into two groups of K/2 UEs nearer(nearer UEs) to the UAV (in terms of Euclidean distance) andK/2 UEs farther (farther UEs) to the UAV. Without loss ofgenerality, we index the nearer UEs by k ∈ {1, . . . ,K/2}, andthe farther UEs by k ∈ {K/2 + 1, . . . ,K}. Table I providesthe nomenclature.

The channel between the UAV and UE k ∈ {1, 2, . . . ,K},denoted by gk is given by

gk =

√γogk

θ(‖zk − zu‖2 + h2)α/4, (1)

where γo is the channel power gain at a reference distanceof 1 m, zk = (xk, yk) and zu = (xu, yu) respectively arethe coordinates of UE k and UAV on the horizontal groundplane, h is the UAV altitude, θ is the UAV transmit-antennabeamwidth such that the UAV’s coverage radius R ≤ h tan θ,α is the path loss exponent, and gk ∼ CN (µ, 2σ2) representsthe Rician distributed small-scale fading channel co-efficientwith Rician factor KR = |µ|2/2σ2 and normalized powerE(|gk|2) = 1 [35].

Page 4: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

3

TABLE INOMENCLATURE.

Notation DescriptionK number of ground usersgk channel between the UAV and UE kgE wiretap channelB total bandwidthτk the portion of allocated bandwidth shared by UEs k and j(k)

sk / sj(k) private information for UE k / j(k)sk,j(k) common message for both UEs k and j(k)pk / pj(k) power allocated to sk / sj(k)pk,j(k) power allocated to sk,j(k)rk / rj(k) UE k’s / j(k)’s throughput by decoding sk / sj(k)ρk / ρj(k) secrecy throughput for UE k / j(k)

ρρρk,c / ρρρj(k),c UE k’s / j(k)’s portion of secrecy throughput by decoding sk,j(k)

Over the total bandwidth B, UE k ∈ {1, . . . ,K/2} is pairedwith UE j(k) = k +K/2 in sharing the allocated bandwidthportion

bk = τkB, (2)

with 0 < τk < 1, for their service by the UAV.

farther users

nearer users

eavesdropperh

R

Fig. 1. A system model showing UAV-BS and the ground users.

Under HKS [4], the information intended for UEs k andj(k) is split as

sk + sj(k) + sk,j(k), (3)

where sk and sj(k) contain private information for UEs k andj(k) while sk,j(k) contains information for both UEs k andj(k), which is called their common message. Accordingly, theequation for the received signals at UEs k and j(k) over the

shared bandwidth Bτk is[ykyj(k)

]=

[gkgj(k)

] (√pksk +

√pj(k)sj(k) +

√pk,j(k)sk,j(k)

)+

[nknj(k)

], (4)

where nk ∼ CN (0, σBτk) and nj(k) ∼ CN (0, σBτk) are thebackground noise at the receiver of UEs k and j(k), whilepk, pj(k), and pk,j(k) are the power allocated to sk, sj(k),and sk,j(k), respectively. Also, σ2

n is the noise power densityso σB , σ2

nB is the noise power over the bandwidth B andσBτk is the noise power over the bandwidth Bτk.

Let τττ , (τ1, . . . , τK/2)T and p ,(pk, pj(k), pk,j(k))k=1,...,K/2. Under HKS [5], [7], bothUEs k and j(k) decode their common message sk,j(k) firstwith the throughput

rk,j(k)(τττ ,p) , min{r1,k,j(k)(τττ ,p), r2,k,j(k)(τττ ,p)}, (5)

where

ri,k,j(k)(τττ ,p) = τk ln

(1 +

pk,j(k)

νi,k,j(k)(τττ ,p)

), i = 1, 2,

ν1,k,j(k)(τττ ,p) =σB|gk|2

τk + pk + pj(k),

ν2,k,j(k)(τττ ,p) =σB|gj(k)|2

τk + pk + pj(k).

UEs k and j(k) then subtract sk,j(k) from their receivedsignal to decode sk and sj(k) with the throughput

rk(τττ ,p) = τk ln

(1 +

pkνk(τττ ,p)

),

νk(τττ ,p) =σB|gk|2

τk + pj(k), (6)

and

rj(k)(τττ ,p) = τk ln

(1 +

pj(k)

νj(k)(τττ ,p)

),

νj(k)(τττ ,p) =σB|gj(k)|2

τk + pk. (7)

We introduce the most challenging scenario for PLS when theUAV-enabled communication is overheard by an EV, whichis located at the best position to wiretap the UAV signal as

Page 5: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

4

shown by Fig. 1. Moreover, the wiretap channel gE is assumedstrongest as

gE =

√γo

θhα/2. (8)

In this scenario, the EV does not know that the UEs are servedin individual bandwidths, so it overhears sk,j(k), sk and sj(k)over the whole bandwidth with the wiretapped throughput1

ρEk,j(k)(p) = ln

(1 +

pk,j(k)

λk,j(k)(p)

), (9)

and

ρEk (p) = ln

(1 +

pk

λk(p)

), (10)

and

ρEj(k)(p) = ln

(1 +

pj(k)

λj(k)(p)

), (11)

where

λk,j(k)(p) ,K/2∑6=k

(p` + pj(`) + p`,j(`)) + pk + pj(k) +σE|gE |2

,

and

λk(p) ,K/2∑` 6=k

(p` + pj(`) + p`,j(`)) + pk,j(k) + pj(k) +σE|gE |2

,

and

λj(k)(p) ,K/2∑` 6=k

(p` + pj(`) + p`,j(`)) + pk,j(k) + pk +σE|gE |2

,

which are affine functions. Also σE , σ2eB for σ2

e being thenoise power density is the background noise power at the EV.

The secrecy throughput for UE k is

ρk(τττ ,p) , [rk(τττ ,p)− ρEk (p)]+ + ρρρk,c, (12)

and the secrecy throughput for UE j(k) is

ρj(k)(τττ ,p) , [rj(k)(τττ ,p)− ρEj(k)(p)]+ + ρρρj(k),c, (13)

where ρρρk,c and ρρρj(k),c satisfy

ρρρk,c + ρρρj(k),c ≤ [rk,j(k)(τττ ,p)− ρEk,j(k)(p)]+, (14)

because [rk,j(k)(τττ ,p)−ρEk,j(k)(p)]+ is the secrecy throughputby decoding sk,j(k) [4], [8].

1In some works such as [36], the denominator of (9) is incorrectly definedas

∑K/26=k τ`(p` + pj(`) + p`,j(`)) + τkpk + τkpj(k) +

σE|gE |2 .

Let ρρρc , (ρρρk,c, ρρρj(k),c)k=1,...,K/2. The problem of max-minUEs’ secrecy throughput optimization is formulated as

maxτττ∈RK/2

+ ,p∈R3K/2+ ,

ρρρc∈RK+

f(τττ ,p, ρρρc) ,

mink=1,...,K/2

min{ρk(τττ ,p), ρj(k)(τττ ,p)

}(15a)

s.t. (14), (15b)K/2∑k=1

τk ≤ 1, (15c)

K/2∑k=1

(pk + pj(k) + pk,j(k)

)≤ P, (15d)

where the objective function in (15a) is the minimum ofUEs’ secrecy throughput, the constraints (15c) and (15d)respectively are the sum-bandwidth and sum transmit powerconstraints given a power budget P , and the constraint (14)splits the common secrecy throughput into individual secrecythroughput.

The objective function (15a) is nonconcave while the con-straint (14) is nonconvex, making (15) a difficult nonconvexproblem. To provide an efficient computation procedure wedevelop a technique of successive lower-bounding approxima-tion for these functions, which is based on a lower-boundingconcave function approximation for the UE throughput func-tion and an upper-bounding convex function approximation forthe wiretapped throughput function.

Let (τ (κ), p(κ)) be the feasible point for (15) that is foundfrom the (κ− 1)th iteration.

A. Successive UE’s throughput function lower bounding ap-proximation

Applying the inequality (69) in the appendix yields thefollowing lower-bounding approximations:

rk(τττ ,p) ≥ r(κ)k (τττ ,p)

, a(κ)k − b

(κ)k

(νk(τττ ,p)

νk(τ (κ), p(κ))+p(κ)k

pk

)−c(κ)k

τk,

(16)

and

rj(k)(τττ ,p) ≥ r(κ)j(k)(τττ ,p)

, a(κ)j(k) − b

(κ)j(k)

νj(k)(τττ ,p)

νj(k)(τ (κ), p(κ))+p(κ)j(k)

pj(k)

−c(κ)j(k)

τk, (17)

and

rk,j(k)(τττ ,p) ≥ r(κ)k,j(k)(τττ ,p)

, min{r(κ)1,k,j(k)(τττ ,p), r(κ)2,k,j(k)(τττ ,p)}, (18)

Page 6: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

5

with

r(κ)i,k,j(k)(τττ ,p) , a

(κ)i,k,j(k) − b

(κ)i,k,j(k)

(νi,k,j(k)(τττ ,p)

νi,k,j(k)(τ (κ), p(κ))

+p(κ)k,j(k)

pk,j(k)

− c(κ)i,k,j(k)

τk, i = 1, 2,

where

0 < a(κ)k = 2rk(τ (κ), p(κ)) + 2b

(κ)k ,

0 < b(κ)k = τ

(κ)k p

(κ)k /(p

(κ)k + νk(τ (κ), p(κ))),

0 < c(κ)k = rk(τ (κ), p(κ))(τ

(κ)k )2,

and

0 < a(κ)j(k) = 2rj(k)(τ

(κ), p(κ)) + 2b(κ)j(k),

0 < b(κ)j(k) = τ

(κ)k p

(κ)j(k)/(p

(κ)j(k) + νj(k)(τ

(κ), p(κ))),

0 < c(κ)j(k) = rj(k)(τ

(κ), p(κ))(τ(κ)k )2,

and

0 < a(κ)i,k,j(k) = 2ri,k,j(k)(τ

(κ), p(κ)) + 2b(κ)i,k,j(k),

0 < b(κ)i,k,j(k) = τ

(κ)k p

(κ)k,j(k)/(p

(κ)k,j(k) + νi,k,j(k)(τ

(κ), p(κ))),

0 < c(κ)i,k,j(k) = ri,k,j(k)(τ

(κ), p(κ))(τ(κ)k )2, i = 1, 2.

Note that the functions r(κ)k , r(κ)j(k) in (16) and (17), and

r(κ)i,k,j(k) are concave. Then the function r(κ)k,j(k) in (18) is also

concave as minimum of two concave functions [37].

B. Successive EV’s wiretapped throughput function upperbounding approximation

Applying the inequality (70) in the appendix yields

ρEk (p) ≤ −aE,(κ)k +0.5b

E,(κ)k (p2k/p

(κ)k + p

(κ)k )

λk(p)

, ρE,(κ)k (p), (19)

where 0 < aE,(κ)k = x

E,(κ)k b

E,(κ)k − ln

(1 + x

E,(κ)k

), 0 <

bE,(κ)k = 1/(1 + x

E,(κ)k ), xE,(κ)k = p

(κ)k /λk(p(κ)).

Analogously,

ρEj(k)(p) ≤ −aE,(κ)j(k) +0.5b

E,(κ)j(k) (p2j(k)/p

(κ)j(k) + p

(κ)j(k))

λj(k)(p)

, ρE,(κ)j(k) (p) (20)

and

ρEk,j(k)(p) ≤ −aE,(κ)k,j(k) +0.5b

E,(κ)k,j(k)(p

2k,j(k)/p

(κ)k,j(k) + p

(κ)k,j(k))

λk,j(k)(p)

, ρE,(κ)k,j(k)(p) (21)

where 0 < aE,(κ)j(k) = x

E,(κ)j(k) b

E,(κ)j(k) − ln

(1 + x

E,(κ)j(k)

), 0 <

bE,(κ)j(k) = 1/(1 + x

E,(κ)j(k) ), xE,(κ)j(k) = p

(κ)j(k)/λj(k)(p

(κ)), and

0 < aE,(κ)k,j(k) = x

E,(κ)k,j(k)b

E,(κ)k,j(k) − ln

(1 + x

E,(κ)k,j(k)

), 0 < b

E,(κ)k,j(k) =

1/(1 + xE,(κ)k,j(k)), xE,(κ)k,j(k) = p

(κ)k,j(k)/λk,j(k)(p

(κ)).

All functions ρE,(κ)k , ρE,(κ)j(k) and ρEk,j(k) are convex.

C. Path-following algorithm

By using (16), (17), (18) and (19), (20), the secrecy through-put functions defined by (12), (13) are lower bounded byconvex functions as follows:

ρ`(τττ ,p) ≥ ρ(κ)` (τττ ,p)

, r(κ)` (τττ ,p)− ρE,(κ)` (p) + ρρρ`,c, ` ∈ {k, j(k)},

under the trust region

r(κ)` (τττ ,p)− ρE,(κ)` (p) ≥ 0, ` ∈ {k, j(k)}, (22)

while the nonconvex constraint (14) is innerly approximatedby the convex constraint

ρρρk,c + ρρρj(k),c ≤ r(κ)i,k,j(k)(τττ ,p)− ρE,(κ)k,j(k)(p), i = 1, 2. (23)

At the κ-th iteration the following convex optimizationproblem is solved to generate the next feasible point(τ (κ+1), p(κ+1), ρ

(κ+1)c ) for (15):

maxτττ∈RK/2

+ ,p∈R3K/2,ρρρc∈RK+

f (κ)(τττ ,p, ρρρc) =

mink=1,...,K/2

min{ρ(κ)k (τττ ,p), ρ

(κ)j(k)(τττ ,p)

}(24a)

s.t. (15c), (15d), (22), (23). (24b)

The computational complexity of (24) is

O(n2m2.5 +m3.5), (25)

where n = 3K is the number of decision variables, and m =2K + 2 is the number of constraints.

Note that (τ (κ), p(κ), ρ(κ)c ) is feasible for (24), so

f (κ)(τ (κ+1), p(κ+1), ρ(κ+1)c ) > f (κ)(τ (κ), p(κ), ρ(κ)c )

= f(τ (κ), p(κ), ρ(κ)c ).

Therefore,

f(τ (κ+1), p(κ+1), ρ(κ+1)c ) ≥ f (κ)(τ (κ+1), p(κ+1), ρ(κ+1)

c )

> f(τ (κ), p(κ), ρ(κ)c ),

i.e. (τ (κ+1), p(κ+1), ρ(κ+1)c ) is a better feasible for (15) than

(τ (κ), p(κ), ρ(κ)c ). As a result, the sequence {(τ (κ), p(κ), ρ(κ)c )}

converges at least to a locally optimal solution of the noncon-vex problem (15) [38]. Algorithm 1 summarizes the proposedcomputational procedure.

Algorithm 1 Secure HKS Algorithm1: Initialization: Set κ = 0. Take any feasible point

(τ (0), p(0), ρ(0)c ) for the convex constraints (15c) and

(15d).2: Repeat until convergence: Solve the convex optimiza-

tion problem (24) to generate the next feasible point(τ (κ+1), p(κ+1), ρ

(κ+1)c ) for (15). Set κ := κ+ 1.

3: Output (τ (κ), p(κ), ρ(κ)c ) as the optimal solution of (15).

Page 7: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

6

D. Particular cases of secure HKS

Under HKS, the insecure (normal) throughput for UE k isrk(τττ ,p) + ρρρk,c while the insecure throughput for UE j(k) isrj(k)(τττ ,p) + ρρρj(k),c, where ρρρk,c and ρρρj(k),c satisfy

ρρρk,c + ρρρj(k),c ≤ rk,j(k)(τττ ,p), (26)

instead of (12), (13) and (14). The problem of max-min UEs’throughput optimization is simplified to

maxτττ∈RK/2

+ ,p∈R3K/2+ ,ρρρc∈RK

+

mink=1,...,K/2

min{rk(τττ ,p) + ρρρk,c,

rj(k)(τττ ,p) + ρρρj(k),c}s.t. (15c), (15d), (26). (27)

Thus, Algorithm 2 for solving the problem (27) of max-minthroughput optimization is a particular case of Algorithm 1.Therefore, the proof of convergence of Algorithm 2 can besimilarly shown as that shown for Algorithm 1 below (25).The computational complexity of (27) can be expressed as(25) for n = 3K and m = K + 2.

Algorithm 2 Unsecure HKS Algorithm1: Initialization: Set κ = 0. Take any feasible point

(τ (0), p(0), ρ(0)c ) for the convex constraints (15c) and

(15d).2: Repeat until convergence: For the functions r(κ)k (τττ ,p),r(κ)j(k)(τττ ,p), and r

(κ)k,j(k)(τττ ,p) respectively defined from

(16), (17), and (18), solve the following convex op-timization problem to generate the next feasible point(τ (κ+1), p(κ+1), ρ

(κ+1)c ) for (27):

maxτττ∈RK/2

+ ,p∈R3K/2+ ,ρρρc∈RK

+

mink=1,...,K/2

{r(κ)k (τττ ,p)

+ρρρk,c, r(κ)j(k)(τττ ,p) + ρρρj(k),c} (28a)

s.t. (15c), (15d), (28b)

ρρρk,c + ρρρj(k),c ≤ r(κ)k,j(k)(τττ ,p). (28c)

Set κ := κ+ 1.3: Output (τ (κ), p(κ), ρ

(κ)c ) as the optimal solution.

It is obvious that user-pair-wise OMA is a particular caseof HKS for sk,j(k) = 0 in (3), so √pk,j(k) = 0 in (4).However, such OMA is not better than the user-wise OMA,which allocates bandwidth to each user [19]. Furthermore, aspointed out in [8], NOMA is a particular case of HKS forsj(k) = 0 in (3) so √pj(k) = 0 in (4), and ρρρk,c = 0 in (26) soρρρj(k),c = rk,j(k)(τττ ,p) because both UEs k and j(k) decodethe message intended for UE j(k). In other words, NOMAis a particular case of HKS where the common messageis the entire message for UE j(k), so the UEs’ throughputcan be optimized by Algorithm 2 by setting ρρρk,c ≡ 0 andrj(k)(τττ ,p) ≡ 0 in (27). Similarly, secure NOMA is alsoseen as a particular case of secure HKS, thus its UEs’secrecy throughput can be optimized by Algorithm 1 by settingρρρk,c ≡ 0 and rj(k)(τττ ,p) ≡ 0 in (12), (13) and (14).

III. INFORMATION AND ARTIFICIAL NOISE TRANSFER FORSECURE HKS VERSUS OVERHEARING IN THE ALLOCATED

BANDWIDTHS

One can see from (9)-(11) that PLS is improved withmany more UEs served by the same UAV making the sig-nal transmission over the whole bandwidth look sufficientlyheterogeneous to the EV. In this section, we consider a evenmore favorable circumstance for the EV, under which it isable to detect the frequency center and the bandwidth portionallocated to UEs. The signal transmission over the allocatedbandwidth for each pair of users is much less heterogeneous,making the wiretapped throughput easily high as the EV iswith the best channel condition. Due to poor scattering ofA2G channels as well as signal transmission by a singletransmit antenna, there is no zero space of UEs’ channelsfor inserting AN that would help to jam the EV withoutinterfering the UEs’ desired signals. Under this circumstance,the work [39] proposed to equip full-duplexes with the UEs, sowhile receiving the UAV signal the UEs also send an artificialnoise to confuse the EV. Besides the technical challenges withproviding such full-duplexes it was assumed in [39] that theEVs’ receive can completely reject the signal sent by theirtransmitter that is never practical.

Now, we follow the approach firstly proposed in [13], whichuses the power-signal for energy-transfer to confuse EV. TheUAV uses the fraction 0 < µ = 1/t1 < 1 of the time-slotfor transmitting information to the UEs and then uses theremaining fraction (1− µ) = 1/t2 to send an AN to confusethe EV.

For computational tractability, which will be clear in thelater development, in this section, the power allocation to sk,sj(k) and sk,j(k) is respectively denoted by 1/

√pk, 1/

√pj(k)

and 1/√pk,j(k) while the bandwidth portion is denoted by

1/τk. Accordingly, the equation for the received signals atUEs k and j(k) over the shared bandwidth B/τk during thetime fraction 1/t1 is the following instead of (4):[ykyj(k)

]=

[gkgj(k)

](sk√pk

+sj(k)√pj(k)

+sk,j(k)√pk,j(k)

)+

[nknj(k)

].

(29)Let τττ , (τ1, . . . , τK/2)T and p , {(pk, pj(k), pk,j(k)) : k =1, . . . ,K/2}. As the UEs are aware of the UAV transmissionnature, they use (29) for decoding sk,j(k) sk and sj(k) withthe throughput 1

t1rk,j(k)(τττ ,p), 1

t1rk(τττ ,p), and 1

t1rj(k)(τττ ,p)

with

rk,j(k)(τττ ,p) , min{r1,k,j(k)(τττ ,p), r2,k,j(k)(τττ ,p)}, (30)

where

ri,k,j(k)(τττ ,p) =1

τkln

(1 +

1

pk,j(k)νi,k,j(k)(τττ ,p)

), i = 1, 2,

ν1,k,j(k)(τττ ,p) =σB|gk|2τk

+1

pk+

1

pj(k),

ν2,k,j(k)(τττ ,p) =σB

|gj(k)|2τk+

1

pk+

1

pj(k),

Page 8: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

7

and

rk(τττ ,p) =1

τkln

(1 +

1

pkνk(τττ ,p)

),

νk(τττ ,p) =σB|gk|2τk

+1

pj(k), (31)

and

rj(k)(τττ ,p) =1

τkln

(1 +

1

pj(k)νj(k)(τττ ,p)

),

νj(k)(τττ ,p) =σB

|gj(k)|2τk+

1

pk, (32)

instead of (5), (6), and (7).The wiretapped signal by the EV over the bandwidth B/τk

during the time-fraction 1/t1 = µ is

yE,1k = gE

(sk√pk

+sj(k)√pj(k)

+sk,j(k)√pk,j(k)

)+ nEk , (33)

and that during the time-fraction 1/t2 = 1− µ is

yE,2k = gEδk + nEk , (34)

where δk is the artificial noise of power 1/pEk that the UAVsends to confuse EV and nEk is the EV’s background noise ofthe power σE/τk.

Since the EV overhears the time-slot-wise UAV signal, thesignal yE,2k is considered as an AN. The noise power indecoding sk, sj(k) and sk,j(k) by the EV is

|gE |2

t2pEk+σEτk. (35)

For pE , (pE1 , . . . , pEK/2) and ttt , (t1, t2), the EV decodes

sk,j(k), sk and sj(k) with the throughput

rEk,j(k)(τττ ,p,pE , ttt) =

1

τkln

(1 +

1/t1pk,j(k)

νEk,j(k)(τττ ,p,pE , ttt)

),

(36)and

rEk (τττ ,p,pE , ttt) =1

τkln

(1 +

1/t1pkνEk (τττ ,p,pE , ttt)

), (37)

and

rEj(k)(τττ ,p,pE , ttt) =

1

τkln

(1 +

1/t1pj(k)

νEj(k)(τττ ,p,pE , ttt)

), (38)

where

νEk,j(k)(τττ ,p,pE , ttt) ,

1

t1pk+

1

t1pj(k)+

1

t2pEk+

σE|gE |2τk

, (39)

and

νEk (τττ ,p,pE , ttt) ,1

t1pj(k)+

1

t1pk,j(k)+

1

t2pEk+

σE|gE |2τk

, (40)

and

νEj(k)(τττ ,p,pE , ttt) ,

1

t1pk+

1

t1pk,j(k)+

1

t2pEk+

σE|gE |2τk

. (41)

Thus, the secrecy throughput for UE k is

rSk (τττ ,p,pE , ttt) , [1

t1rk(τττ ,p)−rEk (τττ ,p,pE , ttt)]++rrrSk,c, (42)

and the secrecy throughput for UE j(k) is

rSj(k)(τττ ,p,pE , ttt) , [

1

t1rj(k)(τττ ,p)− rEj(k)(τττ ,p,p

E , ttt)]+

+ rrrSj(k),c, (43)

where rrrSk,c and rrrSj(k),c satisfy

rrrSk,c+rrrSj(k),c ≤ [1

t1rk,j(k)(τττ ,p)−rEk,j(k)(τττ ,p,p

E , ttt)]+, (44)

because [ 1t1rk,j(k)(τττ ,p)− rEk,j(k)(τττ ,p,p

E , ttt)]+ is the secrecythroughput of sk,j(k).

Instead of (15d), the power constraint is

K/2∑k=1

[1

t1pk+

1

t1pj(k)+

1

t1pk,j(k)+

1

t2pEk] ≤ P, (45)

which is imposed with the additional physical power con-straints

K/2∑k=1

(1

pk+

1

pj(k)+

1

pk,j(k)) ≤ 3P, (46)

andK/2∑k=1

1

pEk≤ 3P. (47)

The constraint for t1 ≥ 1 and t2 ≥ 1 is

1

t1+

1

t2≤ 1. (48)

Let rrrSc , (rrrSk,c, rrrSj(k),c)k=1,...,K/2. Instead of the problem

(15) of UEs’ max-min throughput optimization, we considerthe following problem of UEs’ max-min secrecy throughputoptimization:

maxτττ∈RK/2

+ ,p∈R3K/2+ ,

pE∈RK/2+ ,ttt∈R2

+,

rrrSc ∈RK+

fS(τττ ,p,pE , ttt, rrrSc ) ,

mink=1,...,K/2

min{rSk (τττ ,p,pE , ttt), rSj(k)(τττ ,p,p

E , ttt)}

(49a)

s.t. (44)− (48), (49b)K/2∑k=1

1

τk≤ 1, (49c)

where thanks to using 1/ti for expressing time-fractions,and 1/pk and 1/pEk for expressing power allocations, allconstraints (44)-(48) and (49c) are convex. Like (15), the com-putational difficulty of (49) is concentrated on its UEs’ secrecythroughput functions that make the objective function (49a)nonconcave and the constraint (44) in (49b) nonconvex, whichare much more complex than the UEs’ secrecy throughputfunctions in the previous section.

Let (τ (κ), p(κ), pE,(κ), t(κ), rS,(κ)c ) be the feasible point for

(49) that is found from the (κ− 1)th iteration.

Page 9: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

8

A. Successive UEs’ throughput function lower bounding ap-proximation

Applying the inequality (66) in the appendix yields thefollowing lower-bounding concave function approximationsfor UEs’ throughput functions:

1

t1rk(τττ ,p) ≥ a

(κ)k + b

(κ)k

(2− νk(τττ ,p)

νk(τ (κ), p(κ))− pk

p(κ)k

)−c(κ)k t1 − d(κ)k τk

, f(κ)k (τττ ,p, ttt), (50)

and

1

t1rj(k)(τττ ,p) ≥ a

(κ)j(k) + b

(κ)j(k)

(2−

νj(k)(τττ ,p)

νj(k)(τ (κ), p(κ))

−pj(k)

p(κ)j(k)

− c(κ)j(k)t1 − d(κ)j(k)τk

, f(κ)j(k)(τττ ,p, ttt), (51)

and1

t1rk,j(k)(τττ ,p) = min{ 1

t1r1,k,j(k)(τττ ,p),

1

t1r2,k,j(k)(τττ ,p)}

≥ min{f (κ)1,k,j(k)(τττ ,p, ttt), f(κ)2,k,j(k)(τττ ,p, ttt)}

, f(κ)k,j(k)(τττ ,p, ttt), (52)

with

f(κ)i,k,j(k)(τττ ,p, ttt) = a

(κ)i,k,j(k) + b

(κ)i,k,j(k)

×

2−νi,k,j(k)(τττ ,p)

νi,k,j(k)(τ (κ), p(κ))−pk,j(k)

p(κ)k,j(k)

− c(κ)i,k,j(k)t1 − d

(κ)i,k,j(k)τk, i = 1, 2, (53)

where

0 < a(κ)k =

3

t(κ)1

rk(τ (κ), p(κ)),

0 < b(κ)k =

1

t(κ)1 τ

(κ)k (1 + νk(τ (κ), p(κ))p

(κ)k )

,

0 < c(κ)k =

1

(t(κ)1 )2

rk(τ (κ), p(κ)),

0 < d(κ)k =

1

t(κ)1 τ

(κ)k

rk(τ (κ), p(κ)),

and

0 < a(κ)j(k) =

3

t(κ)1

rj(k)(τ(κ), p(κ)),

0 < b(κ)j(k) =

1

t(κ)1 τ

(κ)k (1 + νj(k)(τ (κ), p(κ))p

(κ)j(k))

,

0 < c(κ)j(k) =

1

(t(κ)1 )2

rj(k)(τ(κ), p(κ)),

0 < d(κ)j(k) =

1

t(κ)1 τ

(κ)k

rj(k)(τ(κ), p(κ)),

and, for i = 1, 2,

0 < a(κ)i,k,j(k) =

3

t(κ)1

ri,k,j(k)(τ(κ), p(κ)),

0 < b(κ)i,k,j(k) =

1

t(κ)1 τ

(κ)k (1 + νi,k,j(k)(τ (κ), p(κ))p

(κ)k,j(k))

,

0 < c(κ)i,k,j(k) =

1

(t(κ)1 )2

ri,k,j(k)(τ(κ), p(κ)),

0 < d(κ)i,k,j(k) =

1

t(κ)1 τ

(κ)k

ri,k,j(k)(τ(κ), p(κ)).

B. Successive EV’s wiretapped throughput function upperbounding approximation

In regard to EV’s wiretapped throughput functions in (36),(37), and (38), applying the inequality (67) in the appendixyields their following approximations

rEk (τττ ,p,pE , ttt) ≤ −aE,(κ)k

τk+

bE,(κ)k

t1pkτkνEk (τττ ,p,pE , ttt)

≤ −aE,(κ)k

(2

τ(κ)k

− τk

(τ(κ)k )2

)+

bE,(κ)k

t1pkλk(z)

, fE,(κ)k (τττ ,p,pE , ttt, z), (54)

where

0 < aE,(κ)k = x

E,(κ)k b

E,(κ)k − ln

(1 + x

E,(κ)k

),

0 < bE,(κ)k = 1/(1 + x

E,(κ)k ),

xE,(κ)k = 1/t

(κ)1 p

(κ)k νEk (τ (κ), p(κ), pE,(κ), t(κ)),

and λk(z) , zj(k) + zk,j(k) + zEk + σE/|gE |2, which is anaffine lower bounding approximation of the nonlinear functionτkν

Ek (τττ ,p,pE , ttt), provided that

zj(k) ≤ τk/t1pj(k) ⇔ 1

τk≤ 1

zj(k)t1pj(k), (55a)

zk,j(k) ≤ τk/t1pk,j(k) ⇔ 1

τk≤ 1

zk,j(k)t1pk,j(k),(55b)

zEk ≤ τk/t2pEk ⇔ 1

τk≤ 1

zEk t2pEk

. (55c)

Applying the inequality (68) in the appendix for x = t1, y =

pj(k), z = zj(k) and x = t(κ)1 , y = p

(κ)j(k), z = τ

(κ)k /t

(κ)1 p

(κ)j(k)

yields the following inner convex approximation for the non-convex constraint (55a):

1

τk≤ 1

τ(κ)k

4− t(κ)1 p(κ)j(k)

zj(k)

τ(κ)k

− t1

t(κ)1

−pj(k)

p(κ)j(k)

, zj(k) > 0.

(56)Analogously, the nonconvex constraints (55b) and (55c) areinnerly approximated by the following convex constraints:

1

τk≤ 1

τ(κ)k

4− t(κ)1 p(κ)k,j(k)

zk,j(k)

τ(κ)k

− t1

t(κ)1

−pk,j(k)

p(κ)k,j(k)

,zk,j(k) > 0, (57)

Page 10: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

9

1

τk≤ 1

τ(κ)k

[4− t(κ)2 p

E,(κ)k

zEk

τ(κ)k

− t2

t(κ)2

− pEk

pE,(κ)k

], zEk > 0.

(58)By using a similar argument,

rEj(k)(τττ ,p,pE , ttt) ≤ f

E,(κ)j(k) (τττ ,p,pE , ttt, z)

, −aE,(κ)j(k)

(2

τ(κ)k

− τk

(τ(κ)k )2

)

+bE,(κ)j(k)

t1pj(k)λj(k)(z)(59)

over the trust region (57) and (58) and

1

τk≤ 1

τ(κ)k

[4− t(κ)1 p

(κ)k

zk

τ(κ)k

− t1

t(κ)1

− pk

p(κ)k

], zk > 0, (60)

with

0 < aE,(κ)j(k) = x

E,(κ)j(k) b

E,(κ)j(k) − ln

(1 + x

E,(κ)j(k)

),

0 < bE,(κ)j(k) = 1/(1 + x

E,(κ)j(k) ),

xE,(κ)j(k) = 1/t

(κ)1 p

(κ)j(k)ν

Ej(k)(τ

(κ), p(κ), pE,(κ), t(κ)),

and λj(k)(z) , zk + zk,j(k) + zEk + σE/|gE |2, which is anaffine lower bounding approximation of the nonlinear functionτkν

Ej(k)(τττ ,p,p

E , ttt).Furthermore,

rEk,j(k)(τττ ,p,pE , ttt) ≤ f

E,(κ)k,j(k)(τττ ,p,p

E , ttt, z)

, −aE,(κ)k,j(k)

(2

τ(κ)k

− τk

(τ(κ)k )2

)

+bE,(κ)k,j(k)

t1pk,j(k)λk,j(k)(z), (61)

over the trust region (56), (58) and (60), where

0 < aE,(κ)k,j(k) = x

E,(κ)k,j(k)b

E,(κ)k,j(k) − ln

(1 + x

E,(κ)k,j(k)

),

0 < bE,(κ)k,j(k) = 1/(1 + x

E,(κ)k,j(k)),

xE,(κ)k,j(k) = 1/t

(κ)1 p

(κ)k,j(k)ν

Ek,j(k)(τ

(κ), p(κ), pE,(κ), t(κ)),

and λk,j(k)(z) , zk + zj(k) + zEk + σE/|gE |2, which is anaffine lower bounding approximation of the nonlinear functionτkν

Ek,j(k)(τττ ,p,p

E , ttt).

C. Path-following algorithm

By using (50), (51), (52) and (54), (59), the secrecy through-put functions defined by (42), (43) are lower bounded by thefollowing concave functions:

rS` (τττ ,p,pE , ttt) ≥ rS,(κ)` (τττ ,p,pE , ttt, z)

, f(κ)` (τττ ,p, ttt)− fE,(κ)` (τττ ,p,pE , ttt, z)

+rrrS`,c, ` ∈ {k, j(k)},

under the trust region

f(κ)` (τττ ,p, ttt)−fE,(κ)` (τττ ,p,pE , ttt, z) ≥ 0, ` ∈ {k, j(k)}. (62)

Also, by using (52) and (61), the nonconvex constraint (44) isinnerly approximated by the convex constraint

rrrSk,c+rrrSj(k),c ≤ f

(κ)i,k,j(k)(τττ ,p)−fE,(κ)k,j(k)(τττ ,p,p

E , ttt, z), i = 1, 2.(63)

At the κ-th iteration the following convex optimizationproblem is solved to generate the next feasible point(τ (κ+1), p(κ+1), pE,(κ+1), t(κ+1), r

S,(κ+1)c ) for (49):

maxτττ∈RK/2

+ ,p∈R3K/2+ ,

pE∈RK/2+ ,ttt∈R2

+,

rrrSc ∈RK+ ,z∈R

3K/2+

fS,(κ)(τττ ,p,pE , ttt, rrrSc , z) =

mink=1,...,K/2

min{rS,(κ)k (τττ ,p,pE , ttt, z),

rS,(κ)j(k) (τττ ,p,pE , ttt, z)

}(64a)

s.t. (45)− (48), (49c), (56)− (58),

(60), (62), (63). (64b)

Algorithm 3, which like Alg. 1 converges at least to a locallyoptimal solution of the nonconvex problem (49), summarizesthe proposed computation. The computational complexity of(64) can be expressed as (25) for n = 5K+2 and m = 4K+5.

Algorithm 3 Information and AN transfer algorithm1: Initialization: Set κ = 0. Take any feasible point

(τ (0), p(0), pE,(0), t(0), rS,(0)c ) for the convex constraints

(15c), (45)-(48),2: Repeat until convergence: Solve the convex optimiza-

tion problem (64) to generate the next feasible point(τ (κ+1), p(κ+1), pE,(κ+1), t(κ+1), r

S,(κ+1)c ) for (49). Set

κ := κ+ 1.3: Output (τ (κ), p(κ), pE,(κ), t(κ), r

S,(κ)c ) as the optimal so-

lution of (49).

IV. NUMERICAL EXAMPLES

This section presents simulation to show the performanceof our proposed methods. There are K = 20 UEs, whichare randomly placed within the cell of the radius R = 300meters. Specifically, K/2 nearer UEs are randomly placedwithin the circle of the radius 110 meters, while the remainingK/2 UEs are randomly placed in a concentric zone with theradius ranging from 240 to 300 meters. The UAV altitude ish = 150 meters and the antenna beamwidth is set to 2π/5 rad.The channel power gain at a distance of 1 meter incorporates1.42×10−4 path loss and antenna gain 2.2846 [40]. The Ricianfactor KR = 10 is set and the path loss exponent is α = 2 [35].Other settings are σ2

n = σ2e = −174 dBm/Hz for the noise

power density, and ε = 10−4 for the algorithms’ convergence.To weight the pros and cons of each particular signaling

scheme, we consider two scenarios for UEs. In the firstscenario called UE scenario I, each nearer UE is paired witha farther UE so that the channel conditions of the paired UEsare distinct. In the second scenario called UE scenario II, onlyK/2 nearer users are considered and served, which are in

Page 11: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

10

similar channel conditions, Thus, in scenario II, any UE ispaired with its nearest UE, so that the channel conditions ofthe paired UEs are similar. HKS-1, NOMA-1, and OMA-1refer to HKS, NOMA and OMA under the UE scenario I,while HKS-2, NOMA-2, and OMA-II refer to HKS, NOMAand OMA under the UE scenario II.

A. Max-min users secrecy throughput optimization over thewhole bandwidth

This subsection analyzes the users’ achievable minimumnormal and secrecy throughput under the EV’s overhearingover the whole bandwidth as described Section II. Fig. 2 plotsthe achievable UEs’ minimum secrecy throughput and normalthroughput versus the transmit power budget P under UEscenario I. The achievable UEs’ minimum secrecy throughputincreases with the transmit power budget P in all schemes,but of course is worse than the achievable UEs’ minimumnormal throughput. For both kinds of throughput, the HKS’sperformance coincides with that of NOMA while the OMA’sperformance is the worst. Thus, NOMA is preferred as it issimpler than HKS.

Fig. 3 plots the achievable UEs’ minimum secrecy through-put and normal throughput versus the transmit power budgetP under UE scenario II. It is clear from Fig. 3 that HKSsignificantly outperforms NOMA and OMA, while NOMA’sperformance is almost the same as OMA’s. This is quiteexpected because NOMA is not efficient under similar UEs’channel conditions with this UE scenario. Thus, HKS ispreferred in this scenario.

Fig. 4 plots the bandwidth allocations τk in HKS-1, OMA-1, and NOMA-1 with P = 20 dBm. Note that UE k andUE j(k) = k + K/2 share the fraction τk in HKS-1 andNOMA-1, but all UEs are allocated by separate bandwidthsunder OMA-1. The allocations under HKS-1 and NOMA-1 areseen similar. In addition, Fig. 5 plots the power allocation tothe UEs. Under NOMA-1, the information sk for the fartherUE k ∈ {1, . . . ,K/2} is allocated a very small power pkbecause there is already no interference in decoding it. Fig.5 also shows that most of power is allocated to the commonmessage sk,j(k) (the power column for UEs k ∈ {1, . . . ,K/2}is pk,j(k), which is allocated to sk,j(k)).

Fig. 6 plots the secrecy throughput rk(τττ ,p) − ρEk (p) andrj(k)(τττ ,p) − ρEj(k)(p) of the private messages sk and sj(k)in (3), while Fig. 7 plots the split secrecy throughput ρρρk,c in(12) and (13) for P = 20 dBm. By (14), ρρρk,c + ρρρj(k),c is thesecrecy throughput of the common message sk,j(k) in (3). Onecan see that the throughput of the farther UE j(k) comes fromthe throughput of the common message sk,j(k) mainly but notfrom the throughput of its private message sj(k). Meanwhile,Fig. 7 also shows that the throughput of the nearer UE k is stillbeneficial from decoding the common message sk,j(k). Whenthe channel conditions of UE k and UE j(k) are differentiated,such benefit is not sizable because NOMA-1, which allocatesthe entire throughput of the common message sk,j(k) to UEj(k), achieves similar UEs’ secrecy throughput according toFig. 2. However, the performances of HKS and NOMA will bedifferentiated if the channel conditions of UE k and UE j(k)

20 25 30 35

P (dBm)

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95

Opt

imiz

ed m

ax-m

in u

ser

thro

ughp

ut (

bps/

Hz)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)HKS-1 (unsecure)NOMA-1 (unsecure)OMA-1 (unsecure)

Fig. 2. Achievable UEs’ minimum throughput versus the transmitted powerbudget P under UE scenario I.

20 25 30 35

P (dBm)

1.2

1.3

1.4

1.5

1.6

1.7

1.8

1.9

2

Opt

imiz

ed m

ax-m

in u

ser

thro

ughp

ut (

bps/

Hz)

HKS-2 (secure)NOMA-2 (secure)OMA-2 (secure)HKS-2 (unsecure)NOMA-2 (unsecure)OMA-2 (unsecure)

Fig. 3. Achievable UEs’ minimum throughput versus the transmitted powerbudget P under UE scenario II.

are not differentiated. According to Fig. 3, NOMA-2 cannotperform better than OMA-2 and both of them are clearlyoutperformed by HKS-2, under which all UEs are beneficialfrom decoding the common message sk,j(k) according to Fig.8.

B. Max-min users secrecy throughput optimization over allo-cated bandwidths

Next, this subsection evaluates the achievable minimumuser secrecy throughput under the EV’s overhearing over theallocated bandwidths as described in Section III. Fig. 9 plotsthe trend of the achievable UEs’ minimum secrecy throughputand normal throughput versus the transmit power budget Punder UE scenario I. As expected, HKS-1 and NOMA-1perform similarly and outperform OMA-1 thanks to the UEs’differentiated channel conditions. Besides, we examine theimpact of the UAV altitude on the achievable UEs’ minimumsecrecy throughput and normal throughput. From Fig. 10,

Page 12: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

11

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

0.02

0.04

0.06

0.08

0.1

0.12

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 4. Optimal fraction τk of bandwidth allocation under UE scenario I.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

2

4

6

8

10

12

Opt

imal

pow

er a

lloca

tion

of in

form

atio

n (m

W)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 5. Optimal power allocation of information transfer under UE scenarioI.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

0.1

0.2

0.3

0.4

0.5

0.6

Priv

ate

thro

ughp

ut (

bps/

Hz)

HKS-1 (secure)

Fig. 6. Private secrecy throughput rk(τττ ,p)− ρEk (p) under HKS-1.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

0.1

0.2

0.3

0.4

0.5

0.6

Indi

vidu

al s

ecre

cy th

roug

hput

(bp

s/H

z) HKS-1 (secure)

Fig. 7. Individual split secrecy throughput ρρρk,c under HKS-1

1 2 3 4 5 6 7 8 9 10

User index

0

0.2

0.4

0.6

0.8

1

1.2

1.4

Indi

vidu

al s

ecre

cy th

roug

hput

(bp

s/H

z) HKS-2 (secure)

Fig. 8. Individual split secrecy throughput ρρρk,c under HKS-2

it can be seen that the achievable UEs’ minimum secrecythroughput and normal throughput decrease with the UAValtitude in all schemes. To the normal throughput, the feasiblelowest attitude undoubtedly results in the best performance,since the channel attenuation is the smallest.

Fig. 11 plots these throughput under UE scenario II withsimilar channel conditions, which shows that HKS-2 clearlyoutperforms NOMA-2 and OMA-3. The latter two performsimilarly.

Fig. 12 plots the bandwidth allocation 1/τk for max-minsecrecy throughput optimization in HKS-1, NOMA-1, andOMA-1 with P = 20 dBm. Recall that each UE is allocated aseparate bandwidth under OMA-1. Similar bandwidth alloca-tions are observed with HKS-1 and NOMA-1. Further, Fig. 13plots the power allocation to each UE. Like Fig. 5, NOMA-1needs to allocate a very small power to the private messagesfor the nearer UEs, while HKS-1 allocates most power to thecommon messages. Fig. 14 plots the power allocation to ANtransfer to confuse the EV. Compared to Fig. 13, it can beseen that AN is allocated more power than the information

Page 13: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

12

20 25 30 35

P (dBm)

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

0.85

0.9

0.95O

ptim

ized

max

-min

use

r th

roug

hput

(bp

s/H

z)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)HKS-1 (unsecure)NOMA-1 (unsecure)OMA-1 (unsecure)

Fig. 9. Achievable UEs’ minimum throughput versus the transmitted powerbudget P under UE scenario I.

100 150 200 250 300

Altitude (m)

0.45

0.5

0.55

0.6

0.65

0.7

0.75

0.8

Opt

imiz

ed m

ax-m

in u

ser

thro

ughp

ut (

bps/

Hz)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)HKS-1 (normal)NOMA-1 (normal)OMA-1 (normal)

Fig. 10. Achievable UEs’ minimum throughput versus the UAV altitude hunder UE scenario I.

messages are. HKS-1 and NOMA-1 result in similar powerallocation to AN. Fig. 15 plots the total power allocation ofeach pair under UE scenario I. Under OMA-1, since each UEhas distinct bandwidth, each UE communicates with the UAVseparately. The total power allocation under HKS-1 is seensimilarly to that under NOMA-1.

C. Algorithm convergence

The convergence behavior of Algorithm 1 is illustrated byFig. 16. Obviously, the achievable UEs’ minimum secrecythroughput converges monotonically after each iteration. Itis observed that OMA achieves the fastest convergence rateunder each UE scenario, where OMA-1 and OMA-2 require 9iterations and 13 iterations, respectively. In addition, NOMA-1 and NOMA-2 take no more than 20 iterations to converge.HKS-2 experiences a bit slow iterations to achieve better UEs’minimum secrecy throughput.

20 25 30 35

P (dBm)

1

1.1

1.2

1.3

1.4

1.5

1.6

1.7

1.8

1.9

2

Opt

imiz

ed m

ax-m

in u

ser

thro

ughp

ut (

bps/

Hz)

HKS-2 (secure)NOMA-2 (secure)OMA-2 (secure)HKS-2 (unsecure)NOMA-2 (unsecure)OMA-2 (unsecure)

Fig. 11. Achievable UEs’ minimum throughput versus the transmitted powerbudget P under UE scenario II.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

0.02

0.04

0.06

0.08

0.1

0.12

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 12. Optimal fraction 1/τk of bandwidth allocation under UE scenarioI.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

1

2

3

4

5

6

7

8

9

10

Opt

imal

pow

er a

lloca

tion

of in

form

atio

n (m

W)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 13. Optimal power allocation of information transfer under UE scenarioI.

Page 14: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

13

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

5

10

15

20

25

30

35

40

Opt

imal

pow

er a

lloca

tion

of A

N (

mW

) HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 14. Optimal power allocation of AN transfer under UE scenario I.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

User index

0

2

4

6

8

10

12

Tot

al p

ower

allo

catio

n of

eac

h pa

ir (m

W)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)

Fig. 15. Total power allocation of each pair under UE scenario I.

0 5 10 15 20 25 30 35

Number of iterations

0

0.2

0.4

0.6

0.8

1

1.2

Min

sec

recy

thro

ughp

ut a

mon

g us

ers

(bps

/Hz)

HKS-1 (secure)NOMA-1 (secure)OMA-1 (secure)HKS-2 (secure)NOMA-2 (secure)OMA-2 (secure)

Fig. 16. Convergence of the proposed Algorithms.

V. CONCLUSIONS

In this paper, we have considered the physical layer securityfor UAV-enable multi-user communication. The HKS hasbeen first proposed for UAV-enable communication, whichcan outperform both NOMA and OMA in terms of usersthroughput. Since it is impossible to insert the AN in thenull space of the desired users channel for a single-antennaUAV, a new scheme of information and AN transfer has beenproposed to ensure secure communication. The problem ofjointly optimizing the time-fraction, power, and bandwidthallocation to maximize the users minimum secrecy throughputhas been solved by the efficient path-following algorithms withnew inner approximation techniques. Numerical results showthe effectiveness of our proposed methods and algorithms.Considering wide-area coverage applications, the problem ofUAV trajectory design along with the joint optimization oftime-fraction, power, and bandwidth allocation allocation canbe the subject of future research.

APPENDIX: FUNDAMENTAL INEQUALITIES

The following inequalities were proved in [41]1

τln(1 + 1/xy) ≥ 2

τln(1 + 1/xy) +

1

(1 + xy)τ(2− x/x

− y/y)− ln(1 + 1/xy)

τ2τ (65)

andln(1 + 1/xy)

zt≥ 3

ln(1 + 1/xy)

zt+

1

(xy + 1)zt(2− x

x− y

y)

− ln(1 + 1/xy)

z2tz − ln(1 + 1/xy)

zt2t. (66)

andln(1 + x) ≤ ln(1 + x)− x

x+ 1+

x

x+ 1(67)

for all x > 0, y > 0, τ > 0 and x > 0, y > 0, τ > 0.Another inequality

1

xyz≥ 1

xyz

(4− x

x− y

y− z

z

)∀x > 0, y > 0, z > 0,

x > 0, y > 0, z > 0 (68)

follows from the convexity of the function 1/xyz on thedomain x > 0, y > 0 and z > 0.

Replacing 1/τ → τ , 1/τ → τ and 1/x→ x and 1/x→ xin (65) leads to

τ ln(1 + x/y) ≥ 2τ ln(1 + x/y) +τ x

x+ y(2− x/x− y/y)

− ln(1 + x/y)

ττ2 ∀ x > 0, y > 0, τ > 0,

x > 0, y > 0, t > 0. (69)

Replacing x→ x/y and x→ x/y leads to

ln(1 + x/y) ≤ ln(1 + x/y)− x/y

x/y + 1+

x

y(x/y + 1)

≤ ln(1 + x/y)− x/y

x/y + 1+

0.5(x2/x+ x)

y(x/y + 1).

(70)

Page 15: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

14

REFERENCES

[1] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, andK. Higuchi, “Non-orthogonal multiple access (NOMA) for cellularfuture radio access,” in Proc. IEEE Veh. Technol. Conf. (VTC Spring),June 2013, pp. 1–5.

[2] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to non-orthogonal multiple access,” IEEE Trans. Wirel. Commun., vol. 15, no. 1,pp. 537–552, Jan. 2016.

[3] V.-D. Nguyen, H. D. Tuan, T. Q. Duong, H. V. Poor, and O.-S. Shin,“Precoder design for signal superposition in MIMO-NOMA multicellnetworks,” IEEE J. Selec. Areas Commun., vol. 35, no. 12, pp. 2681–2695, Dec. 2017.

[4] T. Han and K. Kobayashi, “A new achievable rate region for theinterference channel,” IEEE Trans. Inf. Theory, vol. 27, no. 1, pp. 49–60,Jan. 1981.

[5] H. Dahrouj and W. Yu, “Coordinated beamforming for the multicellmulti-antenna wireless system,” IEEE Trans. Wirel. Commun., vol. 9,no. 5, pp. 1748 –1759, May 2010.

[6] E. Che, H. D. Tuan, H. H. M. Tam, and H. H. Nguyen, “Successiveinterference mitigation in multiuser MIMO interference channels,” IEEETrans. Commun., vol. 63, no. 6, pp. 2185–2199, June 2015.

[7] H. D. Tuan, H. H. M. Tam, H. H. Nguyen, T. Q. Duong, and H. V.Poor, “Superposition signaling in broadcast interference networks,” IEEETrans. Commun., vol. 65, no. 11, pp. 4646–4656, Nov. 2017.

[8] H. D. Tuan, A. A. Nasir, M. N. Nguyen, and M. Masood, “Han-Kobayashi signaling in MIMO broadcasting,” IEEE Commun. Lett.,vol. 23, no. 5, pp. 855–858, 2019.

[9] H. V. Poor, “Information and inference in the wireless physical layer,”IEEE Commun. Mag., vol. 19, no. 2, pp. 40–47, Feb. 2012.

[10] H. V. Poor and R. F. Schaefer, “Wireless physical layer security,” Proc.Nat. Acad. Sciences USA, vol. 114, no. 1, pp. 19–26, 2017.

[11] D. Wang, B. Bai, W. Zhao, and Z. Han, “A survey of optimizationapproaches for wireless physical layer security,” IEEE Commun. SurveysTuts., vol. 21, no. 2, Secondquarter 2019.

[12] K. Cumanan, G. C. Alexandropoulos, Z. Ding, and G. K. Karagiannidis,“Secure communications with cooperative jamming: Optimal powerallocation and secrecy outage analysis,” IEEE Trans. Veh. Technol.,vol. 66, no. 8, pp. 7495–7505, Aug 2017.

[13] A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Secrecyrate beamforming for multicell networks with information and energyharvesting,” IEEE Trans. Signal Process., vol. 65, no. 3, pp. 677–689,Feb. 2017.

[14] N. T. Nghia, H. D. Tuan, T. Q. Duong, and H. V. Poor, “MIMObeamforming for secure and energy-efficient wireless communication,”IEEE Signal Process. Lett., vol. 24, no. 2, pp. 236–239, Feb. 2017.

[15] Z. Sheng, H. D. Tuan, T. Q. Duong, and H. V. Poor, “Beamformingoptimization for physical layer security in miso wireless networks,”IEEE Trans. Signal Process., vol. 66, no. 14, pp. 3710–3723, Jul. 2018.

[16] L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in UAVcommunication networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 2,pp. 1123–1152, Secondquarter 2016.

[17] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Mobile unmannedaerial vehicles (UAVs) for energy-efficient internet of things communi-cations,” IEEE Trans. Wirel. Commun., vol. 16, no. 11, pp. 7574–7589,Nov. 2017.

[18] X. Lin et al., “The sky is not the limit: LTE for unmanned aerialvehicles,” IEEE Commun. Mag., vol. 56, no. 4, pp. 204–210, 2018.

[19] A. A. Nasir, H. D. Tuan, T. Q. Duong, and H. V. Poor, “UAV-enabledcommunication using NOMA,” IEEE Trans. Commun., vol. 67, no. 7,pp. 5126–5138, Jul. 2019.

[20] Y. Liu, Z. Qin, Y. Cai, Y. Gao, G. Y. Li, and A. Nallanathan, “UAVcommunications based on non-orthogonal multiple access,” IEEE Wirel.Commun., vol. 26, no. 1, pp. 52–57, 2019.

[21] H. Liu, S.-J. Yoo, and K. S. Kwak, “Opportunistic relaying for low-altitude UAV swarm secure communications with multiple eavesdrop-pers,” J. of Commun. and Networks, vol. 20, no. 5, pp. 496–508, 2018.

[22] J. Ye, C. Zhang, H. Lei, G. Pan, and Z. Ding, “Secure UAV-to-UAVsystems with spatially random UAVs,” IEEE Wirel. Commun. Lett.,vol. 8, no. 2, pp. 564–567, April 2019.

[23] M. Cui, G. Zhang, Q. Wu, and D. W. K. Ng, “Robust trajectory andtransmit power design for secure UAV communications,” IEEE Trans.Veh. Tech., vol. 67, no. 9, pp. 9042–9046, 2018.

[24] C. Zhong, J. Yao, and J. Xu, “Secure UAV communication with coop-erative jamming and trajectory control,” IEEE Commun. Lett., vol. 23,no. 2, pp. 286–289, 2019.

[25] A. Li, Q. Wu, and R. Zhang, “UAV-enabled cooperative jamming forimproving secrecy of ground wiretap channel,” IEEE Wirel. Commun.Lett., vol. 8, no. 1, pp. 181–184, 2019.

[26] G. Zhang, Q. Wu, M. Cui, and R. Zhang, “Securing UAV commu-nications via joint trajectory and power control,” IEEE Trans. Wirel.Commun., vol. 18, no. 2, pp. 1376–1389, Feb. 2019.

[27] X. Sun, W. Yang, Y. Cai, Z. Xiang, and X. Tang, “Secure transmissionsin millimeter wave SWIPT UAV-based relay networks,” IEEE Wirel.Commun. Lett., vol. 8, no. 3, pp. 785–788, Mar. 2019.

[28] Z. Li, M. Chen, C. Pan, N. Huang, Z. Yang, and A. Nallanathan, “Jointtrajectory and communication design for secure UAV networks,” IEEECommun. Lett., vol. 23, no. 4, pp. 636–639, Apr. 2019.

[29] Y. Cai, F. Cui, Q. Shi, M. Zhao, and G. Y. Li, “Dual-UAV-enabled securecommunications: Joint trajectory design and user scheduling,” IEEE J.Sel. Areas Commun., vol. 36, no. 9, pp. 1972–1985, 2018.

[30] H. Lee, S. Eom, J. Park, and I. Lee, “UAV-aided secure communicationswith cooperative jamming,” IEEE Trans. Veh. Tech., vol. 67, no. 10, pp.9385–9392, 2018.

[31] X. Zhou, Q. Wu, S. Yan, F. Shu, and J. Li, “UAV-enabled securecommunications: Joint trajectory and transmit power optimization,”IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 4069–4073, 2019.

[32] Y. Cai, Z. Wei, R. Li, D. W. Kwan Ng, and J. Yuan, “Energy-efficient resource allocation for secure UAV communication systems,” inProc. 2019 IEEE Wireless Communications and Networking Conference(WCNC), April 2019, pp. 1–8.

[33] M. Asadpour, B. van den Bergh, D. Giustiniano, K. Hummel, S. Pollin,and B. Plattner, “Micro aerial vehicle networks: An experimental anal-ysis of challenges and opportunities,” IEEE Commun. Mag., vol. 52,no. 7, pp. 141–149, 2014.

[34] A. A. Nasir, H. D. Tuan, and T. Q. Duong, “Fractional-time exploitationfor serving IoT users with guaranteed QoS by 5G spectrum,” IEEECommun. Mag., vol. 56, no. 10, pp. 128–133, Oct. 2018.

[35] F. Ono, H. Ochiai, and R. Miura, “A wireless relay network based onunmanned aircraft system with rate optimization,” IEEE Trans. Wirel.Commun., vol. 15, no. 11, pp. 7699–7708, Nov. 2016.

[36] W. Huang, Z. Yang, C. Pan, L. Pei, M. Chen, M. Shikh-Bahaei,M. Elkashlan, and A. Nallanathan, “Joint power, altitude, location andbandwidth optimization for UAV with underlaid D2D communications,”IEEE Wirel. Commun. Lett., vol. 8, no. 2, pp. 524–527, April 2019.

[37] H. Tuy, Convex Analysis and Global Optimization (second edition).Springer, 2016.

[38] B. R. Marks and G. P. Wright, “A general inner approximation algorithmfor nonconvex mathematical programms,” Operations Research, vol. 26,no. 4, pp. 681–683, Jul 1978.

[39] W. Li, M. Ghogho, B. Chen, and C. Xiong, “Secure communication viasending artificial noise by the receiver: Outage secrecy capacity/regionanalysis,” IEEE Commun. Lett., vol. 16, no. 10, pp. 1628–1631, Oct.2012.

[40] H. He, S. Zhang, Y. Zeng, and R. Zhang, “Joint altitude and beamwidthoptimization for UAV-enabled multiuser communications,” IEEE Com-mun. Lett., vol. 22, no. 2, pp. 344–347, 2018.

[41] Z. Sheng, H. D. Tuan, A. A. Nasir, T. Q. Duong, and H. V. Poor, “Powerallocation for energy efficiency and secrecy of wireless interferencenetworks,” IEEE Trans. Wirel. Commun., vol. 17, no. 6, pp. 3737–3751,Jun. 2018.

Zhichao Sheng received the Ph.D. degree in elec-trical engineering from the University of Technol-ogy, Sydney, NSW, Australia in 2018. From 2018to 2019, he was a Research Fellow at School ofElectronics, Electrical Engineering and ComputerScience, Queen’s University Belfast, Belfast, U.K.He is currently a Lecturer with Shanghai University,Shanghai, China. His research interests include op-timization methods for wireless communication andsignal processing.

Page 16: Secure UAV-Enabled Communication Using Han-Kobayashi … · Secure UAV-Enabled Communication Using Han-Kobayashi Signaling Sheng, Z., Tuan, H. D., Nasir, A. A., Duong, T. Q., & Poor,

15

Hoang Duong Tuan received the Diploma (Hons.)and Ph.D. degrees in applied mathematics fromOdessa State University, Ukraine, in 1987 and 1991,respectively. He spent nine academic years in Japanas an Assistant Professor in the Department ofElectronic-Mechanical Engineering, Nagoya Univer-sity, from 1994 to 1999, and then as an AssociateProfessor in the Department of Electrical and Com-puter Engineering, Toyota Technological Institute,Nagoya, from 1999 to 2003. He was a Professorwith the School of Electrical Engineering and T-

elecommunications, University of New South Wales, from 2003 to 2011. Heis currently a Professor with the School of Electrical and Data Engineering,University of Technology Sydney. He has been involved in research with theareas of optimization, control, signal processing, wireless communication, andbiomedical engineering for more than 20 years.

Ali Arshad Nasir (S’09-M’13) is an Assistant Pro-fessor in the Department of Electrical Engineering,King Fahd University of Petroleum and Minerals(KFUPM), Dhahran, KSA. Previously, he held theposition of Assistant Professor in the School of Elec-trical Engineering and Computer Science (SEECS)at National University of Sciences & Technology(NUST), Paksitan, from 2015-2016. He received hisPh.D. in telecommunications engineering from theAustralian National University (ANU), Australia in2013 and worked there as a Research Fellow from

2012-2015. His research interests are in the area of signal processing inwireless communication systems. He is an Associate Editor for IEEE CanadianJournal of Electrical and Computer Engineering.

Trung Q. Duong (S’05, M’12, SM’13) receivedhis Ph.D. degree in Telecommunications System-s from Blekinge Institute of Technology (BTH),Sweden in 2012. Currently, he is with Queen’sUniversity Belfast (UK), where he was a Lecturer(Assistant Professor) from 2013 to 2017 and aReader (Associate Professor) from 2018. His currentresearch interests include wireless communications,machine learning, realtime optimisation, big data,and IoT applications to disaster management, air-quality monitoring, flood monitoring, smart agricul-

ture, healthcare and smart cities. He is the author or co-author of over 350+technical papers published in scientific journals (210+ articles) and presentedat international conferences (140+ papers).

Dr. Duong currently serves as an Editor for the IEEE TRANSACTIONSON WIRELESS COMMUNICATIONS, IEEE TRANSACTIONS ON COMMUNI-CATIONS, and a Lead Senior Editor for IEEE COMMUNICATIONS LETTERS.He was awarded the Best Paper Award at the IEEE Vehicular TechnologyConference (VTC-Spring) in 2013, IEEE International Conference on Com-munications (ICC) 2014, IEEE Global Communications Conference (GLOBE-COM) 2016 and 2019, IEEE Digital Signal Processing Conference (DSP)2017, and International Wireless Communications & Mobile ComputingConference (IWCMC) 2019. He is the recipient of prestigious Royal Academyof Engineering Research Fellowship (2016-2021) and has won a prestigiousNewton Prize 2017.

H. Vincent Poor (S’72, M’77, SM’82, F’87) re-ceived the Ph.D. degree in EECS from PrincetonUniversity in 1977. From 1977 until 1990, he wason the faculty of the University of Illinois at Urbana-Champaign. Since 1990 he has been on the facultyat Princeton, where he is currently the MichaelHenry Strater University Professor of Electrical En-gineering. During 2006 to 2016, he served as Deanof Princeton’s School of Engineering and AppliedScience. He has also held visiting appointments atseveral other universities, including most recently at

Berkeley and Cambridge. His research interests are in the areas of informationtheory, signal processing and matching learning, and their applications inwireless networks, energy systems and related fields. Among his publicationsin these areas is the recent book Multiple Access Techniques for 5G WirelessNetworks and Beyond. (Springer, 2019).

Dr. Poor is a member of the National Academy of Engineering and theNational Academy of Sciences, and is a foreign member of the ChineseAcademy of Sciences, the Royal Society, and other national and internationalacademies. Recent recognition of his work includes the 2017 IEEE AlexanderGraham Bell Medal and a D.Eng. honoris causa from the University ofWaterloo awarded in 2019.


Recommended