TY - GEN
T1 - Hiding unmanned aerial vehicles for wireless transmissions by covert communications
AU - Yan, Shihao
AU - Hanly, Stephen V.
AU - Collings, Iain B.
AU - Goeckel, Dennis L.
PY - 2019
Y1 - 2019
N2 - We address the critical problem of hiding unmanned aerial vehicles (UAV) for wireless transmissions by the emerging covert communication technology, since in military surveillance scenarios the disclosure of a UAV's location information may lead to an attack. Specifically, we jointly optimize the UAV's transmit power and height in order to maximize the communication quality to a legitimate receiver subject to a covertness constraint, a maximum transmit power constraint, and a lower bound and an upper bound on the UAV's height. To this end, we first derive the UAV's optimal height for maximizing the legitimate communication quality without any constraint and then we address this problem under constraints in particular the covertness constraint. Our solution explicitly shows the impact of these constraints and reveals the tradeoff among the legitimate communication quality, covertness requirement, and surveillance cost. For example, our examination demonstrates that the legitimate communication quality increases with the surveillance cost represented by the quality of the camera used for conducting surveillance.
AB - We address the critical problem of hiding unmanned aerial vehicles (UAV) for wireless transmissions by the emerging covert communication technology, since in military surveillance scenarios the disclosure of a UAV's location information may lead to an attack. Specifically, we jointly optimize the UAV's transmit power and height in order to maximize the communication quality to a legitimate receiver subject to a covertness constraint, a maximum transmit power constraint, and a lower bound and an upper bound on the UAV's height. To this end, we first derive the UAV's optimal height for maximizing the legitimate communication quality without any constraint and then we address this problem under constraints in particular the covertness constraint. Our solution explicitly shows the impact of these constraints and reveals the tradeoff among the legitimate communication quality, covertness requirement, and surveillance cost. For example, our examination demonstrates that the legitimate communication quality increases with the surveillance cost represented by the quality of the camera used for conducting surveillance.
UR - http://www.scopus.com/inward/record.url?scp=85070215318&partnerID=8YFLogxK
U2 - 10.1109/ICC.2019.8761271
DO - 10.1109/ICC.2019.8761271
M3 - Conference proceeding contribution
AN - SCOPUS:85070215318
SN - 9781538680896
SP - 1
EP - 6
BT - 2019 IEEE International Conference on Communications (ICC)
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Piscataway, NJ
T2 - 2019 IEEE International Conference on Communications, ICC 2019
Y2 - 20 May 2019 through 24 May 2019
ER -