Covert wireless data collection based on unmanned aerial vehicles

Xiaobo Zhou, Shihao Yan, Feng Shu, Riqing Chen, Jun Li

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

5 Citations (Scopus)


This work considers unmanned aerial vehicle (UAV) networks for collecting data covertly from ground users. The full-duplex UAV intends to gather critical information from a scheduled user (SU) through wireless communication and generate artificial noise (AN) with random transmit power in order to ensure a negligible probability of the SU's transmission being detected by the unscheduled users (USUs). To enhance the system performance, we jointly design the UAV's trajectory and its maximum AN transmit power together with the user scheduling strategy subject to practical constraints, e.g., a covertness constraint, which is explicitly determined by analyzing each USU's detection performance, and a binary constraint induced by user scheduling. The formulated design problem is a mixed-integer non-convex optimization problem, which is challenging to solve directly, but solved by a penalty successive convex approximation (P-SCA) scheme. Our examination shows that the P-SCA scheme significantly outperforms a benchmark scheme in terms of achieving a higher max-min average transmission rate subject to the same covertness constraint.
Original languageEnglish
Title of host publication2019 IEEE Globecom Workshops (GC Wkshps)
Subtitle of host publicationproceedings
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages6
ISBN (Electronic)9781728109602
ISBN (Print)9781728109619
Publication statusPublished - 2019
Event2019 IEEE Globecom Workshops (GC Wkshps) - Waikoloa, United States
Duration: 9 Dec 201913 Dec 2019


Conference2019 IEEE Globecom Workshops (GC Wkshps)
Abbreviated titleGC Wkshps
Country/TerritoryUnited States


Dive into the research topics of 'Covert wireless data collection based on unmanned aerial vehicles'. Together they form a unique fingerprint.

Cite this