-
Aerial Relay to Achieve Covertness and Security
Authors:
Jiacheng Jiang,
Hongjiang Lei,
Ki-Hong Park,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
In this work, a delay-tolerant unmanned aerial vehicle (UAV) relayed covert and secure communication framework is investigated. In this framework, a legitimate UAV serves as an aerial relay to realize communication when the direct link between the terrestrial transmitter and receiver is blocked and also acts as a friendly jammer to suppress the malicious nodes presented on the ground. Subsequently…
▽ More
In this work, a delay-tolerant unmanned aerial vehicle (UAV) relayed covert and secure communication framework is investigated. In this framework, a legitimate UAV serves as an aerial relay to realize communication when the direct link between the terrestrial transmitter and receiver is blocked and also acts as a friendly jammer to suppress the malicious nodes presented on the ground. Subsequently, considering the uncertainty of malicious nodes' positions, a robust fractional programming optimization problem is built to maximize energy efficiency by jointly optimizing the trajectory of the UAV, the transmit power of the transmitter, and the time-switching factor. For the extremely complicated covert constraint, Pinsker's inequality, Jensen's inequality, and the bisection search method are employed to construct a tractable shrunken one. After this, an alternate optimization-based algorithm is proposed to solve the fractional programming optimization problem. To achieve low complexity, we design the primal-dual search-based algorithm and the successive convex approximation-based algorithm, respectively, for each sub-problem. Numerical results show the effectiveness of our proposed algorithm.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
3D Trajectory Design for Energy-constrained Aerial CRNs Under Probabilistic LoS Channel
Authors:
Hongjiang Lei,
Xiaqiu Wu,
Ki-Hong Park,
Gaofeng Pan
Abstract:
Unmanned aerial vehicles (UAVs) have been attracting significant attention because there is a high probability of line-of-sight links being obtained between them and terrestrial nodes in high-rise urban areas. In this work, we investigate cognitive radio networks (CRNs) by jointly designing three-dimensional (3D) trajectory, the transmit power of the UAV, and user scheduling. Considering the UAV's…
▽ More
Unmanned aerial vehicles (UAVs) have been attracting significant attention because there is a high probability of line-of-sight links being obtained between them and terrestrial nodes in high-rise urban areas. In this work, we investigate cognitive radio networks (CRNs) by jointly designing three-dimensional (3D) trajectory, the transmit power of the UAV, and user scheduling. Considering the UAV's onboard energy consumption, an optimization problem is formulated in which the average achievable rate of the considered system is maximized by jointly optimizing the UAV's 3D trajectory, transmission power, and user scheduling. Due to the non-convex optimization problem, a lower bound on the average achievable rate is utilized to reduce the complexity of the solution. Subsequently, the original optimization problem is decoupled into four subproblems by using block coordinate descent, and each subproblem is transformed into manageable convex optimization problems by introducing slack variables and successive convex approximation. Numerical results validate the effectiveness of our proposed algorithm and demonstrate that the 3D trajectories of UAVs can enhance the average achievable rate of aerial CRNs.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Hybrid-Field Channel Estimation for XL-MIMO Systems with Stochastic Gradient Pursuit Algorithm
Authors:
Hao Lei,
Jiayi Zhang,
Zhe Wang,
Bo Ai,
Derrick Wing Kwan Ng
Abstract:
Extremely large-scale multiple-input multiple-output (XL-MIMO) is crucial for satisfying the high data rate requirements of the sixth-generation (6G) wireless networks. In this context, ensuring accurate acquisition of channel state information (CSI) with low complexity becomes imperative. Moreover, deploying an extremely large antenna array at the base station (BS) might result in some scatterers…
▽ More
Extremely large-scale multiple-input multiple-output (XL-MIMO) is crucial for satisfying the high data rate requirements of the sixth-generation (6G) wireless networks. In this context, ensuring accurate acquisition of channel state information (CSI) with low complexity becomes imperative. Moreover, deploying an extremely large antenna array at the base station (BS) might result in some scatterers being located in near-field, while others are situated in far-field, leading to a hybrid-field communication scenario. To address these challenges, this paper introduces two stochastic gradient pursuit (SGP)-based schemes for the hybrid-field channel estimation in two scenarios. For the first scenario in which the prior knowledge of the specific proportion of the number of near-field and far-field channel paths is known, the scheme can effectively leverage the angular-domain sparsity of the far-field channels and the polar-domain sparsity of the near-field channels such that the channel estimation in these two fields can be performed separately. For the second scenario which the proportion is not available, we propose an off-grid SGP-based channel estimation scheme, which iterates through the values of the proportion parameter based on a criterion before performing the hybrid-field channel estimation. We demonstrate numerically that both of the proposed channel estimation schemes achieve superior performance in terms of both estimation accuracy and achievable rates while enjoying lower computational complexity compared with existing schemes. Additionally, we reveal that as the number of antennas at the UE increases, the normalized mean square error (NMSE) performances of the proposed schemes remain basically unchanged, while the NMSE performances of existing ones improve. Remarkably, even in this scenario, the proposed schemes continue to outperform the existing ones.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Trajectory and Power Design for Aerial Multi-User Covert Communications
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a frien…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access to terrestrial users, regardless of geographical constraints, and will be an important part of future communication systems. In this paper, a multi-user downlink dual-UAVs enabled covert communication system was investigated, in which a UAV transmits secure information to ground users in the presence of multiple wardens as well as a friendly jammer UAV transmits artificial jamming signals to fight with the wardens. The scenario of wardens being outfitted with a single antenna is considered, and the detection error probability (DEP) of wardens with finite observations is researched. Then, considering the uncertainty of wardens' location, a robust optimization problem with worst-case covertness constraint is formulated to maximize the average covert rate by jointly optimizing power allocation and trajectory. To cope with the optimization problem, an algorithm based on successive convex approximation methods is proposed. Thereafter, the results are extended to the case where all the wardens are equipped with multiple antennas. After analyzing the DEP in this scenario, a tractable lower bound of the DEP is obtained by utilizing Pinsker's inequality. Subsequently, the non-convex optimization problem was established and efficiently coped by utilizing a similar algorithm as in the single-antenna scenario. Numerical results indicate the effectiveness of our proposed algorithm.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Trajectory and power design for aerial CRNs with colluding eavesdroppers
Authors:
Hongjiang Lei,
Jiacheng Jiang,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
Gaofeng Pan,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radi…
▽ More
Unmanned aerial vehicles (UAVs) can provide wireless access services to terrestrial users without geographical limitations and will become an essential part of the future communication system. However, the openness of wireless channels and the mobility of UAVs make the security of UAV-based communication systems particularly challenging. This work investigates the security of aerial cognitive radio networks (CRNs) with multiple uncertainties colluding eavesdroppers. A cognitive aerial base station transmits messages to cognitive terrestrial users using the spectrum resource of the primary users. All secondary terrestrial users and illegitimate receivers jointly decode the received message. The average secrecy rate of the aerial CRNs is maximized by jointly optimizing the UAV's trajectory and transmission power. An iterative algorithm based on block coordinate descent and successive convex approximation is proposed to solve the non-convex mixed-variable optimization problem. Numerical results verify the effectiveness of our proposed algorithm and show that our scheme improves the secrecy performance of airborne CRNs.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Strategic Information Attacks on Incentive-Compatible Navigational Recommendations in Intelligent Transportation Systems
Authors:
Ya-Ting Yang,
Haozhe Lei,
Quanyan Zhu
Abstract:
Intelligent transportation systems (ITS) have gained significant attention from various communities, driven by rapid advancements in informational technology. Within the realm of ITS, navigational recommendation systems (RS) play a pivotal role, as users often face diverse path (route) options in such complex urban environments. However, RS is not immune to vulnerabilities, especially when confron…
▽ More
Intelligent transportation systems (ITS) have gained significant attention from various communities, driven by rapid advancements in informational technology. Within the realm of ITS, navigational recommendation systems (RS) play a pivotal role, as users often face diverse path (route) options in such complex urban environments. However, RS is not immune to vulnerabilities, especially when confronted with potential information-based attacks. This study aims to explore the impacts of these cyber threats on RS, explicitly focusing on local targeted information attacks in which the attacker favors certain groups or businesses. We study human behaviors and propose the coordinated incentive-compatible RS that guides users toward a mixed Nash equilibrium, under which each user has no incentive to deviate from the recommendation. Then, we delve into the vulnerabilities within the recommendation process, focusing on scenarios involving misinformed demands. In such cases, the attacker can fabricate fake users to mislead the RS's recommendations. Using the Stackelberg game approach, the analytical results and the numerical case study reveal that RS is susceptible to informational attacks. This study highlights the need to consider informational attacks for a more resilient and effective navigational recommendation.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Neurosymbolic Meta-Reinforcement Lookahead Learning Achieves Safe Self-Driving in Non-Stationary Environments
Authors:
Haozhe Lei,
Quanyan Zhu
Abstract:
In the area of learning-driven artificial intelligence advancement, the integration of machine learning (ML) into self-driving (SD) technology stands as an impressive engineering feat. Yet, in real-world applications outside the confines of controlled laboratory scenarios, the deployment of self-driving technology assumes a life-critical role, necessitating heightened attention from researchers to…
▽ More
In the area of learning-driven artificial intelligence advancement, the integration of machine learning (ML) into self-driving (SD) technology stands as an impressive engineering feat. Yet, in real-world applications outside the confines of controlled laboratory scenarios, the deployment of self-driving technology assumes a life-critical role, necessitating heightened attention from researchers towards both safety and efficiency. To illustrate, when a self-driving model encounters an unfamiliar environment in real-time execution, the focus must not solely revolve around enhancing its anticipated performance; equal consideration must be given to ensuring its execution or real-time adaptation maintains a requisite level of safety. This study introduces an algorithm for online meta-reinforcement learning, employing lookahead symbolic constraints based on \emph{Neurosymbolic Meta-Reinforcement Lookahead Learning} (NUMERLA). NUMERLA proposes a lookahead updating mechanism that harmonizes the efficiency of online adaptations with the overarching goal of ensuring long-term safety. Experimental results demonstrate NUMERLA confers the self-driving agent with the capacity for real-time adaptability, leading to safe and self-adaptive driving under non-stationary urban human-vehicle interaction scenarios.
△ Less
Submitted 5 September, 2023;
originally announced September 2023.
-
Channel Estimation for XL-MIMO Systems with Polar-Domain Multi-Scale Residual Dense Network
Authors:
Hao Lei,
Jiayi Zhang,
Huahua Xiao,
Xiaodan Zhang,
Bo Ai,
Derrick Wing Kwan Ng
Abstract:
Extremely large-scale multiple-input multiple-output (XL-MIMO) is a promising technique to enable versatile applications for future wireless communications.To realize the huge potential performance gain, accurate channel state information is a fundamental technical prerequisite. In conventional massive MIMO, the channel is often modeled by the far-field planar-wavefront with rich sparsity in the a…
▽ More
Extremely large-scale multiple-input multiple-output (XL-MIMO) is a promising technique to enable versatile applications for future wireless communications.To realize the huge potential performance gain, accurate channel state information is a fundamental technical prerequisite. In conventional massive MIMO, the channel is often modeled by the far-field planar-wavefront with rich sparsity in the angular domain that facilitates the design of low-complexity channel estimation. However, this sparsity is not conspicuous in XL-MIMO systems due to the non-negligible near-field spherical-wavefront. To address the inherent performance loss of the angular-domain channel estimation schemes, we first propose the polar-domain multiple residual dense network (P-MRDN) for XL-MIMO systems based on the polar-domain sparsity of the near-field channel by improving the existing MRDN scheme. Furthermore, a polar-domain multi-scale residual dense network (P-MSRDN) is designed to improve the channel estimation accuracy. Finally, simulation results reveal the superior performance of the proposed schemes compared with existing benchmark schemes and the minimal influence of the channel sparsity on the proposed schemes.
△ Less
Submitted 1 September, 2023; v1 submitted 30 August, 2023;
originally announced August 2023.
-
Deep Reinforcement Learning Empowered Rate Selection of XP-HARQ
Authors:
Da Wu,
Jiahui Feng,
Zheng Shi,
Hongjiang Lei,
Guanghua Yang,
Shaodan Ma
Abstract:
The complex transmission mechanism of cross-packet hybrid automatic repeat request (XP-HARQ) hinders its optimal system design. To overcome this difficulty, this letter attempts to use the deep reinforcement learning (DRL) to solve the rate selection problem of XP-HARQ over correlated fading channels. In particular, the long term average throughput (LTAT) is maximized by properly choosing the incr…
▽ More
The complex transmission mechanism of cross-packet hybrid automatic repeat request (XP-HARQ) hinders its optimal system design. To overcome this difficulty, this letter attempts to use the deep reinforcement learning (DRL) to solve the rate selection problem of XP-HARQ over correlated fading channels. In particular, the long term average throughput (LTAT) is maximized by properly choosing the incremental information rate for each HARQ round on the basis of the outdated channel state information (CSI) available at the transmitter. The rate selection problem is first converted into a Markov decision process (MDP), which is then solved by capitalizing on the algorithm of deep deterministic policy gradient (DDPG) with prioritized experience replay. The simulation results finally corroborate the superiority of the proposed XP-HARQ scheme over the conventional HARQ with incremental redundancy (HARQ-IR) and the XP-HARQ with only statistical CSI.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Adaptive Knowledge Distillation between Text and Speech Pre-trained Models
Authors:
**jie Ni,
Yukun Ma,
Wen Wang,
Qian Chen,
Dianwen Ng,
Han Lei,
Trung Hieu Nguyen,
Chong Zhang,
Bin Ma,
Erik Cambria
Abstract:
Learning on a massive amount of speech corpus leads to the recent success of many self-supervised speech models. With knowledge distillation, these models may also benefit from the knowledge encoded by language models that are pre-trained on rich sources of texts. The distillation process, however, is challenging due to the modal disparity between textual and speech embedding spaces. This paper st…
▽ More
Learning on a massive amount of speech corpus leads to the recent success of many self-supervised speech models. With knowledge distillation, these models may also benefit from the knowledge encoded by language models that are pre-trained on rich sources of texts. The distillation process, however, is challenging due to the modal disparity between textual and speech embedding spaces. This paper studies metric-based distillation to align the embedding space of text and speech with only a small amount of data without modifying the model structure. Since the semantic and granularity gap between text and speech has been omitted in literature, which impairs the distillation, we propose the Prior-informed Adaptive knowledge Distillation (PAD) that adaptively leverages text/speech units of variable granularity and prior distributions to achieve better global and local alignments between text and speech pre-trained models. We evaluate on three spoken language understanding benchmarks to show that PAD is more effective in transferring linguistic knowledge than other metric-based distillation approaches.
△ Less
Submitted 6 March, 2023;
originally announced March 2023.
-
Exposure-Based Multi-Agent Inspection of a Tumbling Target Using Deep Reinforcement Learning
Authors:
Joshua Aurand,
Steven Cutlip,
Henry Lei,
Kendra Lang,
Sean Phillips
Abstract:
As space becomes more congested, on orbit inspection is an increasingly relevant activity whether to observe a defunct satellite for planning repairs or to de-orbit it. However, the task of on orbit inspection itself is challenging, typically requiring the careful coordination of multiple observer satellites. This is complicated by a highly nonlinear environment where the target may be unknown or…
▽ More
As space becomes more congested, on orbit inspection is an increasingly relevant activity whether to observe a defunct satellite for planning repairs or to de-orbit it. However, the task of on orbit inspection itself is challenging, typically requiring the careful coordination of multiple observer satellites. This is complicated by a highly nonlinear environment where the target may be unknown or moving unpredictably without time for continuous command and control from the ground. There is a need for autonomous, robust, decentralized solutions to the inspection task. To achieve this, we consider a hierarchical, learned approach for the decentralized planning of multi-agent inspection of a tumbling target. Our solution consists of two components: a viewpoint or high-level planner trained using deep reinforcement learning and a navigation planner handling point-to-point navigation between pre-specified viewpoints. We present a novel problem formulation and methodology that is suitable not only to reinforcement learning-derived robust policies, but extendable to unknown target geometries and higher fidelity information theoretic objectives received directly from sensor inputs. Operating under limited information, our trained multi-agent high-level policies successfully contextualize information within the global hierarchical environment and are correspondingly able to inspect over 90% of non-convex tumbling targets, even in the absence of additional agent attitude control.
△ Less
Submitted 1 May, 2023; v1 submitted 27 February, 2023;
originally announced February 2023.
-
Uplink Performance of Cell-Free Extremely Large-Scale MIMO Systems
Authors:
Hao Lei,
Zhe Wang,
Huahua Xiao,
Jiayi Zhang,
Bo Ai
Abstract:
In this paper, we investigate the uplink performance of cell-free (CF) extremely large-scale multiple-input-multipleoutput (XL-MIMO) systems, which is a promising technique for future wireless communications. More specifically, we consider the practical scenario with multiple base stations (BSs) and multiple user equipments (UEs). To this end, we derive exact achievable spectral efficiency (SE) ex…
▽ More
In this paper, we investigate the uplink performance of cell-free (CF) extremely large-scale multiple-input-multipleoutput (XL-MIMO) systems, which is a promising technique for future wireless communications. More specifically, we consider the practical scenario with multiple base stations (BSs) and multiple user equipments (UEs). To this end, we derive exact achievable spectral efficiency (SE) expressions for any combining scheme. It is worth noting that we derive the closed-form SE expressions for the CF XL-MIMO with maximum ratio (MR) combining. Numerical results show that the SE performance of the CF XL-MIMO can be hugely improved compared with the small-cell XL-MIMO. It is interesting that a smaller antenna spacing leads to a higher correlation level among patch antennas. Finally, we prove that increasing the number of UE antennas may decrease the SE performance with MR combining.
△ Less
Submitted 14 February, 2023; v1 submitted 27 January, 2023;
originally announced January 2023.
-
Outage Analysis of Aerial Semi-Grant-Free NOMA Systems
Authors:
Hongjiang Lei,
Chen Zhu,
Ki-Hong Park,
Imran Shafique Ansari,
Weijia Lei,
Hong Tang,
Kyeong ** Kim
Abstract:
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellatio…
▽ More
In this paper, we analyze the outage performance of unmanned aerial vehicles (UAVs)-enabled downlink non-orthogonal multiple access (NOMA) communication systems with the semi-grant-free (SGF) transmission scheme. A UAV provides coverage services for a grant-based (GB) user and one user is allowed to utilize the same channel resource opportunistically. The hybrid successive interference cancellation scheme is implemented in the downlink NOMA scenarios for the first time. The analytical expressions for the exact and asymptotic outage probability (OP) of the grant-free (GF) user are derived. The results demonstrate that no-zero diversity order can be achieved only under stringent conditions on users' quality of service requirements. Subsequently, we propose an efficient dynamic power allocation (DPA) scheme to relax such data rate constraints to address this issue. The analytical expressions for the exact and asymptotic OP of the GF user with the DPA scheme are derived. Finally, Monte Carlo simulation results are presented to validate the correctness of the derived analytical expressions and demonstrate the effects of the UAV's location and altitude on the OP of the GF user.
△ Less
Submitted 18 February, 2024; v1 submitted 12 May, 2022;
originally announced May 2022.
-
Outage Performance of Uplink Rate Splitting Multiple Access with Randomly Deployed Users
Authors:
Huabing Lu,
Xianzhong Xie,
Zhaoyuan Shi,
Hongjian Lei,
Nan Zhao,
Jun Cai
Abstract:
With the rapid proliferation of smart devices in wireless networks, more powerful technologies are expected to fulfill the network requirements of high throughput, massive connectivity, and diversify quality of service. To this end, rate splitting multiple access (RSMA) is proposed as a promising solution to improve spectral efficiency and provide better fairness for the next-generation mobile net…
▽ More
With the rapid proliferation of smart devices in wireless networks, more powerful technologies are expected to fulfill the network requirements of high throughput, massive connectivity, and diversify quality of service. To this end, rate splitting multiple access (RSMA) is proposed as a promising solution to improve spectral efficiency and provide better fairness for the next-generation mobile networks. In this paper, the outage performance of uplink RSMA transmission with randomly deployed users is investigated, taking both user scheduling schemes and power allocation strategies into consideration. Specifically, the greedy user scheduling (GUS) and cumulative distribution function (CDF) based user scheduling (CUS) schemes are considered, which could maximize the rate performance and guarantee scheduling fairness, respectively. Meanwhile, we re-investigate cognitive power allocation (CPA) strategy, and propose a new rate fairness-oriented power allocation (FPA) strategy to enhance the scheduled users' rate fairness. By employing order statistics and stochastic geometry, an analytical expression of the outage probability for each scheduling scheme combining power allocation is derived to characterize the performance. To get more insights, the achieved diversity order of each scheme is also derived. Theoretical results demonstrate that both GUS and CUS schemes applying CPA or FPA strategy can achieve full diversity orders, and the application of CPA strategy in RSMA can effectively eliminate the secondary user's diversity order constraint from the primary user. Simulation results corroborate the accuracy of the analytical expressions, and show that the proposed FPA strategy can achieve excellent rate fairness performance in high signal-to-noise ratio region.
△ Less
Submitted 10 April, 2023; v1 submitted 29 April, 2022;
originally announced April 2022.
-
Joint Trajectory Design and User Scheduling of Aerial Cognitive Radio Networks
Authors:
Hongjiang Lei,
Haosi Yang,
Ki-Hong Park,
Imran Shafique Ansari,
**g Jiang,
Mohamed-Slim Alouini
Abstract:
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge t…
▽ More
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make it vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. This paper investigates the security of aerial cognitive radio networks (CRNs). An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial base station transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdrop** node locations is considered, and the average secrecy rate of the cognitive user is maximized by optimizing multiple users' scheduling, the UAVs' trajectory, and transmit power. To solve the non-convex optimization problem with mixed multiple integers variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial to improving the secrecy performance of aerial CRNs.
△ Less
Submitted 21 April, 2022;
originally announced April 2022.
-
On the Secrecy of UAV Systems With Linear Trajectory
Authors:
Gaofeng Pan,
Hongjiang Lei,
Jian** An,
Shuo Zhang,
Mohamed-Slim Alouini
Abstract:
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/borders, in this paper we investigate the secrecy outage performance of a UAV system with linear trajectory, where a UAV ($S$) flies in a straight line and transmits its information over…
▽ More
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/borders, in this paper we investigate the secrecy outage performance of a UAV system with linear trajectory, where a UAV ($S$) flies in a straight line and transmits its information over the downlink to a legitimate receiver ($D$) on the ground while an eavesdrop** UAV ($E$) trying to overhear the information delivery between $S$ and $D$. Meanwhile, some information is delivered to $S$ over the uplink from $D$, such as commanding messages to control $S$'s detecting operations, which can also be eavesdropped by $E$. The locations of $S$, $D$, and $E$ are randomly distributed. We first characterize the statistical characteristics (including cumulative distribution functions and probability density function) of the received signal-to-noise ratio over both downlink and uplink, and then the closed-form analytical expressions for the lower boundary of the secrecy outage probability of both downlink and uplink have also been derived accordingly. Finally, Monte-Carlo simulations are given to testify our proposed analytical models.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
On the Physical Layer Security of a Decode and Forward Based Mixed FSO/RF Cooperative System
Authors:
Dipti R. Pattanayak,
Vivek K. Dwivedi,
Vikram Karwal,
Imran Shafique Ansari,
Hongjiang Lei,
Mohamed-Slim Alouini
Abstract:
In this letter, the secrecy performance of a mixed free space optics (FSO) and radio frequency (RF) system is analyzed from physical layer security (PHY) perspective. In this scenario, one or more eavesdroppers are trying to intercept the confidential signal in a mixed FSO/RF system. The faded FSO links are modeled by Malaga ($\mathcal{M} $) distribution and RF link is characterized by Nakagami-…
▽ More
In this letter, the secrecy performance of a mixed free space optics (FSO) and radio frequency (RF) system is analyzed from physical layer security (PHY) perspective. In this scenario, one or more eavesdroppers are trying to intercept the confidential signal in a mixed FSO/RF system. The faded FSO links are modeled by Malaga ($\mathcal{M} $) distribution and RF link is characterized by Nakagami-$m$ distribution. Exact closed form expressions for secrecy performance metrics such as secrecy outage probability and strictly positive secrecy capacity are derived and analyzed for the proposed system in terms of Fox's H-function. Furthermore, the asymptotic expressions for these performance metrics are analyzed. Finally, all the results are verified by Monte-Carlo simulations.
△ Less
Submitted 6 July, 2019;
originally announced July 2019.
-
Incorporating energy storage and user experience in isolated microgrid dispatch using a multi-objective model
Authors:
Yang Li,
Zhen Yang,
Dongbo Zhao,
Hangtian Lei,
Bai Cui,
Shaoyan Li
Abstract:
In order to coordinate multiple different scheduling objectives from the perspectives of economy, environment and users, a practical multi-objective dynamic optimal dispatch model incorporating energy storage and user experience is proposed for isolated microgrids. In this model, besides Microturbine units, energy storage is employed to provide spinning reserve services for microgirds; and further…
▽ More
In order to coordinate multiple different scheduling objectives from the perspectives of economy, environment and users, a practical multi-objective dynamic optimal dispatch model incorporating energy storage and user experience is proposed for isolated microgrids. In this model, besides Microturbine units, energy storage is employed to provide spinning reserve services for microgirds; and furthermore, from the perspective of demand side management, a consumer satisfaction indicator is developed to measure the quality of user experience. A two-step solution methodology incorporating multi-objective optimization (MOO) and decision analysis is put forward to address this model. First, a powerful heuristic optimization algorithm, called the θ-dominance based evolutionary algorithm, is used to find a well-distributed set of Pareto-optimal solutions of the problem. And thereby, the best compromise solutions (BCSs) are identified from the entire solutions with the use of decision analysis by integrating fuzzy C-means clustering and grey relation projection. The simulation results on the modified Oak Ridge National Laboratory Distributed Energy Control and Communication lab microgrid test system demonstrate the effectiveness of the proposed approach.
△ Less
Submitted 21 January, 2019;
originally announced January 2019.