Unmanned aerial vehicles (UAV) can enhance wireless transmission security by improving the secrecy rate through relaying the legitimate transmission and injecting artificial noise to the eavesdroppers. However, due to the… Click to show full abstract
Unmanned aerial vehicles (UAV) can enhance wireless transmission security by improving the secrecy rate through relaying the legitimate transmission and injecting artificial noise to the eavesdroppers. However, due to the inherent mechanical energy consumption and the long-range signal propagation pathloss, the traditional cruising and hovering UAV relay modes are deficient in energy utilization and secrecy rate, respectively. Modeling of the secrecy energy efficiency with respect to UAV mode adaptation is limited in the literature and deserves further investigation. Therefore, in this paper, we propose a secrecy rate-energy efficient UAV relay mode adaptation scheme for secure wireless communications scenarios where the eavesdropping locations are known, i.e., the eavesdropper is a hijacked internal legitimate node. In this secure system, the UAV cooperatively assists the legitimate transmissions and injects artificial interference to the eavesdropper. We investigate optimum UAV placement and relay period planning for the hovering and the cruising relay modes, respectively. By modeling the UAV modes transfer and maximizing the secrecy energy efficiency, the optimum mode adaptation ratios are obtained under both the secrecy rate-prioritized and the energy-saving criteria. In addition, the proposed UAV relay mode adaptation mechanism is further studied for each UAV task division, to adapt to the dynamic channel variations and enhance the security. Our theoretical analysis shows that the mode adaptation ratio is determined by the secrecy rate-energy gain between the cruising and the hovering modes, and by the energy consumption threshold of the UAV relays. Our numerical results demonstrate that the proposed scheme achieves higher secrecy energy efficiency than the traditional schemes.
               
Click one of the above tabs to view related content.