Secrecy Rate Maximization with Gridded UAV Swarm Jamming for passive Eavesdropping

Christantus O. Nnamani, Muhammad R. A. Khandaker, Mathini Sellathurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

This paper considers the grid formation of an unmanned aerial vehicle (UAV) swarm for maximizing the secrecy rate in the presence of an unknown eavesdropper. In particular, the UAV swarm performs coordinated beamforming onto the null space of the legitimate channel to jam the eavesdropper located at an unknown location. By nulling the channel between the legitimate receiver and the UAV swarm, we obtain an optimal trajectory and jamming power allocation for each UAV enabling wideband single ray beamforming to improve the secrecy rate. Results obtained demonstrate the effectiveness of the proposed UAV-aided jamming scheme as well as the optimal number of UAVs in the swarm necessary to observe a saturation effect in the secrecy rate. We also show the optimal radius of the unknown but constrained location of the eavesdropper.

Original languageEnglish
Title of host publication2021 IEEE Global Communications Conference
PublisherIEEE
ISBN (Electronic)9781728181042
DOIs
Publication statusPublished - 2 Feb 2022
Event2021 IEEE Global Communications Conference - Madrid, Spain
Duration: 7 Dec 202111 Dec 2021

Conference

Conference2021 IEEE Global Communications Conference
Abbreviated titleGLOBECOM 2021
Country/TerritorySpain
CityMadrid
Period7/12/2111/12/21

Keywords

  • jamming
  • optimization
  • physical layer security
  • Secure communication
  • swarm
  • UAV

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Health Informatics

Fingerprint

Dive into the research topics of 'Secrecy Rate Maximization with Gridded UAV Swarm Jamming for passive Eavesdropping'. Together they form a unique fingerprint.

Cite this