A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks

Xin Fan , Guangkai Li , Jianqiang Li , Yue Wang , Chuanwen Luo , Yi Hong , Ting Chen , Yan Huo

›› 2025, Vol. 11 ›› Issue (3) : 925 -936.

PDF
›› 2025, Vol. 11 ›› Issue (3) : 925 -936. DOI: 10.1016/j.dcan.2024.11.004
Original article

A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks

Author information +
History +
PDF

Abstract

Recognized as a pivotal facet in Beyond Fifth-Generation (B5G) and the upcoming Sixth-Generation (6G) wireless networks, Unmanned Aerial Vehicle (UAV) communications pose challenges due to limited capabilities when serving as mobile base stations, leading to suboptimal service for edge users. To address this, the collaborative formation of Coordinated Multi-Point (CoMP) networks proves instrumental in alleviating the issue of the poor Quality of Service (QoS) at edge users in the network periphery. This paper introduces a groundbreaking solution, the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access (HUD-NOMA) scheme for UAV-aided CoMP networks. Leveraging network coding and NOMA technology, our proposed HUD-NOMA effectively enhances transmission rates for edge users, notwithstanding a minor reduction in signal reception reliability for strong signals. Importantly, the system's overall sum rate is elevated. The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection. The study employs a stochastic geometry approach to derive the Secrecy Outage Probability (SOP) for the transmissions in the CoMP network, revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification. Furthermore, guided by the theoretical SOP derivation, this paper proposes a power allocation strategy to further reduce the system's SOP.

Keywords

NOMA / UAV / CoMP / Physical layer security / Stochastic geometry approaches / Secrecy outage probability

Cite this article

Download citation ▾
Xin Fan, Guangkai Li, Jianqiang Li, Yue Wang, Chuanwen Luo, Yi Hong, Ting Chen, Yan Huo. A hybrid uplink-downlink secure transmission scheme for UAV-aided coordinated multi-point networks. , 2025, 11(3): 925-936 DOI:10.1016/j.dcan.2024.11.004

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Xin Fan: Writing - review & editing, Writing - original draft, Validation, Methodology, Investigation, Formal analysis, Conceptualization. Guangkai Li: Writing - review & editing, Validation, Formal analysis. Jianqiang Li: Writing - review & editing. Yue Wang: Writing - review & editing, Funding acquisition, Formal analysis, Conceptualization. Chuanwen Luo: Supervision, Project administration, Funding acquisition, Conceptualization. Yi Hong: Validation, Funding acquisition, Conceptualization. Ting Chen: Supervision, Project administration, Funding acquisition, Conceptualization. Yan Huo: Supervision, Funding acquisition, Conceptualization.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgements

This work was supported in part by the National Key R&D Program of China under Grant 2022YFB3104503; in part by the National Natural Science Foundation of China under Grant 62202054, and Grant 61931001; in part by the National Natural Science Foundation of China No.62202054 and the Young Elite Scientists Sponsorship Program of the China Association for Science and Technology under Grant 2023QNRC001; in part by the U.S. National Science Foundation under Grant 2136202.

References

[1]

B. Li, Z. Fei, Y. Zhang,Uav communications for 5g and beyond: recent advances and future trends, IEEE Internet Things J. 6 (2) (2018) 2241-2263.

[2]

Yang Liu, Cheng Lyu, Fan Bai, Omkar Parishwad, Ying Li, The role of intelligent technology in the development of urban air mobility systems: a technical perspective, Fundam. Res. 4 (5) (2024) 1017-1024.

[3]

Hemant Kumar Narsani, Ali Ranjha, Kapal Dev,Fida Hussain Memon, Nawab Muhammad Faseeh Qureshi, Leveraging UAV-assisted communications to improve secrecy for URLLC in 6G systems, Digit. Commun. Netw. 9 (6) (2023) 1458-1464.

[4]

K. Lee, K. Yim,Study on the transaction linkage technique combined with the des-ignated terminal for 5g-enabled iot, Digit. Commun. Netw. 8 (2) (2022) 124-131.

[5]

Z. Ullah, F. Al-Turjman, L. Mostarda,Cognition in uav-aided 5g and beyond com-munications: a survey, IEEE Trans. Cogn. Commun. Netw. 6 (3) (2020) 872-891.

[6]

L. Wang, X. Wu, Y. Wang, Z. Xiao, L. Li, A. Fei, On uav serving node deployment for temporary coverage in forest environment: a hierarchical deep reinforcement learning approach, Chin. J. Electron. 32 (4) (2023) 760-772, https://doi.org /10.23919/cje.2021.00.326.

[7]

J. Zhang, M. Liu, N. Zhao, Y. Chen, Q. Yang, Z. Ding, Spectrum and energy effi-cient multi-antenna spectrum sensing for green uav communication, Digit. Commun. Netw. 9 (4) (2023) 846-855.

[8]

J. Xia, Y. Liu, L. Tan, Joint optimization of trajectory and task offloading for cellular-connected multi-uav mobile edge computing, Chin. J. Electron. 33 (3) (2024) 823-832, https://doi.org/10.23919/cje.2022.00.159.

[9]

K. Guo, R. Liu, C. Dong, K. An, Y. Huang, S. Zhu, Ergodic capacity of noma-based overlay cognitive integrated satellite-uav-terrestrial networks, Chin. J. Electron. 32 (2) (2023) 273-282, https://doi.org/10.23919/cje.2021.00.316.

[10]

S. Bassoy, H. Farooq, M.A. Imran, A. Imran, Coordinated multi-point clustering schemes: a survey, IEEE Commun. Surv. Tutor. 19 (2) (2017) 743-764.

[11]

Y. Tian, A.R. Nix, M. Beach, On the performance of opportunistic noma in downlink comp networks, IEEE Commun. Lett. 20 (5) (2016) 998-1001.

[12]

M.S. Ali, E. Hossain, D.I. Kim, Coordinated multipoint transmission in downlink multi-cell noma systems: models and spectral efficiency performance, IEEE Wirel. Commun. 25 (2) (2018) 24-31.

[13]

X. Fan, Y. Huo, Cooperative secure transmission against collusive eavesdroppers in Internet of things, Int. J. Distrib. Sens. Netw. 16 (6) (2020) 1550147720933464.

[14]

K. Li, P.-G. Yan, Q.-Y. Cai, Quantum computing and the security of public key cryp-tography, Fundam. Res. 1 (1) (2021) 85-87.

[15]

Y. Huo, X. Fan, L. Ma, X. Cheng, Z. Tian, D. Chen,Secure communications in tiered 5g wireless networks with cooperative jamming, IEEE Trans. Wirel. Commun. 18 (6) (2019) 3265-3280.

[16]

L. Huang, X. Fan, Y. Huo, C. Hu, Y. Tian, J. Qian, A novel cooperative jamming scheme for wireless social networks without known csi, IEEE Access 5 (2017) 26476-26486.

[17]

J. Fan, Y. Huo, X. Fan, C. Hu, G. Jing,A cooperative jamming based secure uplink transmission scheme for heterogeneous networks supporting d2d communications, in: International Conference on Wireless Algorithms, Systems, and Applications, Springer, 2018, pp. 103-114.

[18]

X. Fan, L. Huang, Y. Huo, C. Hu, Y. Tian, J. Qian, Space power synthesis-based cooperative jamming for unknown channel state information, in: International Conference on Wireless Algorithms, Systems, and Applications, Springer, 2017, pp. 483-495.

[19]

L. Wei, T. Jing, X. Fan, Y. Wen, Y. Huo,The secrecy analysis over physical layer in noma-enabled cognitive radio networks, in: 2018 IEEE International Conference on Communications (ICC), IEEE, 2018, pp. 1-6.

[20]

M. Xu, T. Jing, X. Fan, Y. Wen, Y. Huo,Secure transmission solutions in energy harvesting enabled cooperative cognitive radio networks, in: 2018 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, 2018, pp. 1-6.

[21]

Y. Huo, M. Xu, X. Fan, T. Jing, A novel secure relay selection strategy for energy-harvesting-enabled Internet of things, EURASIP J. Wirel. Commun. Netw. 2018 (1) (2018) 264.

[22]

X. Fan, Y. Huo,Security analysis of cooperative jamming in Internet of things with multiple eavesdroppers, in: 2019 IEEE Global Communications Conference (GLOBE-COM), IEEE, 2019, pp. 1-6.

[23]

X. Fan, Y. Wang, G. Li, Y. Huo, Z. Tian, Hybrid uplink-downlink noma for secure coordinated multi-point networks, in: 2021 IEEE International Conference on Com-munications Workshops (ICC Workshops), 2021, pp. 1-6.

[24]

M. Haenggi, Stochastic Geometry for Wireless Networks, Cambridge University Press, 2012.

[25]

L. Gupta, R. Jain, G. Vaszkun, Survey of important issues in uav communication networks, IEEE Commun. Surv. Tutor. 18 (2) (2015) 1123-1152.

[26]

H. Nawaz, H.M. Ali, A.A. Laghari, Uav communication networks issues: a review, Arch. Comput. Methods Eng. 28 (2021) 1349-1369.

[27]

L. Zhou, Z. Yang, S. Zhou, W. Zhang,Coverage probability analysis of uav cellular networks in urban environments, in: 2018 IEEE International Conference on Com-munications Workshops (ICC Workshops), IEEE, 2018, pp. 1-6.

[28]

W. Tang, H. Zhang, Y. He,Tractable modelling and performance analysis of uav net-works with 3d blockage effects, IEEE Wirel. Commun. Lett. 9 (12) (2020) 2064-2067.

[29]

L. Liu, S. Zhang, R. Zhang, Comp in the sky: Uav placement and movement optimiza-tion for multi-user communications, IEEE Trans. Commun. 67 (8) (2019) 5645-5658.

[30]

J. Choi, Non-orthogonal multiple access in downlink coordinated two-point systems, IEEE Commun. Lett. 18 (2) (2014) 313-316.

[31]

M.S. Ali, E. Hossain, A. Al-Dweik, D.I. Kim, Downlink power allocation for comp-noma in multi-cell networks, IEEE Trans. Commun. 66 (9) (2018) 3982-3998.

[32]

Y. Sun, Z. Ding, X. Dai, O.A. Dobre, On the performance of network noma in uplink comp systems: a stochastic geometry approach, IEEE Trans. Commun. 67 (7) (2019) 5084-5098.

[33]

Q. Zhou, Y. Ma, L. Bai, J. Choi, Y.-C. Liang, Relay-aided multiple access scheme in two-point joint transmission, IEEE Trans. Veh. Technol. 68 (6) (2019) 5629-5641.

[34]

Y. Tian, X. Wang, Z. Wang, On the performance of security-based nonorthogonal multiple access in coordinated multipoint networks, Wirel. Commun. Mob. Comput. (2018).

[35]

S. Katti, H. Rahul, W. Hu, D. Katabi, M. Médard, J. Crowcroft, Xors in the air: prac-tical wireless network coding, IEEE/ACM Trans. Netw. 16 (3) (2008) 497-510.

[36]

L. Dong, R. Li, Optimal chunk caching in network coding-based qualitative commu-nication, Digit. Commun. Netw. 8 (1) (2022) 44-50.

[37]

D. Tse, P. Viswanath, Fundamentals of Wireless Communication, Cambridge Univer-sity Press, 2005.

[38]

Z. Yang, Z. Ding, P. Fan, N. Al-Dhahir, A general power allocation scheme to guar-antee quality of service in downlink and uplink noma systems, IEEE Trans. Wirel. Commun. 15 (11) (2016) 7244-7257.

[39]

A.D. Wyner, The wire-tap channel, Bell Syst. Tech. J. 54 (8) (1975) 1355-1387.

[40]

J. Barros, M.R. Rodrigues,Secrecy capacity of wireless channels, in: 2006 IEEE In-ternational Symposium on Information Theory, IEEE, 2006, pp. 356-360.

[41]

M. Grant, Cvx: Matlab software for disciplined convex programming, version 1.21, http://cvxr.com/cvx.

[42]

S.P. Boyd, L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.

[43]

M. Razaviyayn, Successive convex approximation: analysis and applications, Ph.D. thesis, University of Minnesota, 2014.

AI Summary AI Mindmap
PDF

282

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/