Next Article in Journal
Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
Previous Article in Journal
Hyper-Local Weather Predictions with the Enhanced General Urban Area Microclimate Predictions Tool
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications

1
School of Information Science and Electrical Engineering, Shandong Jiaotong University, Jinan 250357, China
2
School of Information Science and Engineering, Shandong University, Qingdao 266237, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(7), 429; https://doi.org/10.3390/drones7070429
Submission received: 8 June 2023 / Revised: 20 June 2023 / Accepted: 27 June 2023 / Published: 28 June 2023
(This article belongs to the Section Drone Communications)

Abstract

:
In this paper, we investigate covert communications for an unmanned aerial vehicle (UAV)-aided rate-splitting multiple access (RSMA) system in which the UAV transmits to the covert and public users separately while shielding covert transmissions from a warden. Under the RSMA principles, the messages of the covert and public users are converted to common and private streams for air-to-ground transmissions. Subject to the quality of service (QoS) requirements of the public user and covertness constraint of the UAV-aid RSMA (UAV-RSMA) system, the aim of covert communication design is to maximize the covert rate by jointly optimizing the transmit power allocation, common rate allocation, and UAV hovering height, which each contribute to the uncertainty of the warden’s binary decision and attempts to enhance communication performance. To address the non-convex covert rate maximization problem in addition to the highly coupled system parameters, we decouple the original problem into three subproblems of transmit power allocation, common rate allocation, and UAV hovering height. We derive the optimal solutions for each of the subproblems of the transmit power and rate allocations and formulate a signomial programming problem to tackle UAV hovering height optimization. The simulation results indicate the superior covert rate performance achieved by the proposed AO algorithm and demonstrate that the proposed UAV-RSMA scheme achieves a higher covert rate than the benchmark schemes.

1. Introduction

Rate-splitting multiple access (RSMA) has been recognized as a promising multiple access technology for future wireless communications due to its high spectral efficiency, high energy efficiency, and flexibility on inter-user interference (IUI) management [1,2,3]. In downlink RSMA, each user’s message is split into a common part and a private part to generate the overall transmit signal, which consists of a common steam and multiple private streams, respectively. Specifically, the common stream is obtained by merging the common messages of all users via encoding with a shared codebook. The private streams are independently generated from all users’ private messages with each private stream being intended for a distinctive receiver. At the receiver side, the common stream is decoded by all the receivers, whereas each receiver decodes its own private stream by using successive interference cancellation (SIC) and treating other private streams as noise [4]. Because of its flexibility in partially decoding interference and treating partial interference as noise, RSMA has drawn enormous attention from industry and academia to tackle various challenges that have emerged for the upcoming 6G wireless communications [4,5,6,7].
With the unprecedented proliferation of confidential and sensitive data over wireless communications, privacy protections have rendered massive critical security issues in 6G wireless communication systems. A notable challenge of RSMA is encountered in security and privacy protection, due to open propagation of wireless signals. To prevent information leakage in RSMA systems from the perspective of physical layer security (PLS), common message and cooperative jamming have been exploited to address eavesdropping issues [8,9]. It has been shown in [8] that common messages can not only convey information signals but also act as artificial noise (AN) to interfere with eavesdroppers such that cooperative RSMA can achieve a higher secrecy sum rate than conventional non-orthogonal multiple access (NOMA) and space-division multiple access (SDMA). Due to imperfect channel state information at transmitter (CSIT), the secrecy performance of the RSMA system is decreased. Assuming the worst-case uncertainty channel model, the authors of [9] jointly designed the IUI mitigation and secrecy sum-rate maximization for the RSMA system, which significantly enhanced the secrecy rate performance compared to that of NOMA. In the presence of an internal eavesdropper, a secure beamforming design was proposed that takes into account all users’ secrecy rate constraints, which resulted in RSMA outperforming the benchmark schemes in terms of weighted sum rate [10]. To prevent untrusted relays from eavesdropping on private messages owned by other users, a two-slot cooperative rate-splitting scheme was proposed in which the precoding, slot allocation, and rate allocation were jointly optimized to effectively guarantee users are safe from eavesdropping [11]. However, PLS approaches cannot prevent adversaries from receiving and detecting legitimate signals, which results in novel threats to the actual hiding of legitimate transmissions.
Covert communications aim to provide a higher level of security protections than conventional PLS approaches by ensuring adversaries have a large detection error probability (DEP) of monitoring behaviors of legitimate communications [11,12]. Since leaking a small amount of data or exposing existence information—such as those that occur in military operations, wearable medical devices, or wireless financial transactions—can result in unexpected harms to legitimate systems, covert communications have emerged and are desired in the context of RSMA. To maximize the sum rate and maintain fairness, transmit power allocation and rate allocation in RSMA systems need to smartly cooperate with each other to realize covert communications, and a policy gradient method-based learning algorithm was proposed in [13]. It has been shown that under the stochastic optimization framework, the learning algorithm can achieve non-saturated transmission rate at high signal-to-noise (SNR) regions with infinite block length. Furthermore, jamming signal was superimposed to common and private messages to maximize the minimum data rate among all users subject to the covertness constraint [14]. By using AN signal to effectively prevent adversary from detecting legitimate RSMA transmissions, up to three times the minimum data rate can be achieved over that of the NOMA scheme [14].
Recently, unmanned aerial vehicle (UAV)-aided wireless communications have gained much attention from academia and the industry due to the high mobility, enhanced coverage, and flexible deployment of UAVs. PLS techniques were applied to prevent the exchange of confidential information to and from the UAVs, but they cannot hide the UAV’s communication behaviors and prevent them from being detected by wardens. To overcome the challenges raised in UAV-aided military and financial fields, covert communication techniques were exploited [15]. In [16], both the PLS and covert communication performance were analyzed for a multi-hop network against the UAV surveillance. By using beam sweeping, an optimal detection strategy was proposed to detect the UAV’s covert transmissions [17]. Also, the beam sweeping was adopted at the UAV transmitter to maximize the average throughput of the covert transmissions from the UAV to the ground terminal [18]. For long-distance covert communications, the UAV was deployed as a relay to maximize the transmission rate between the legitimate transmitter and receiver against a flying warden [19]. In [20], an UAV full-duplex relay was applied to maximize the effective covert throughput in the practical Rician channels. In [21], an UAV-aided uplink covert communication system was investigated, where a multi-antenna jammer was deployed to maximize the transmission rate between the ground transmitter and the UAV receiver against several randomly distributed wardens. Under the assumption that block length is finite, the downlink transmissions from the UAV to mutliple ground users were hidden by maximizing the minimum average covert rate [22]. In [23], smart contracts and blockchain techniques were used to ensure the security and guarantee the privacy of UAV collaborations. The UAVs can also be used to covertly collect data from ground users [24]. By using the UAV as a jammer, the covert communication performance can be improved as shown in [25]. To clearly show the considered UAV security and privacy protection techniques, we plotted the tree diagram in Figure 1 for related works in the research field.
In the aforementioned works, UAV maneuverability was not fully exploited to enhance the covert communication performance. By exploiting their trajectory design along with wireless resource optimization, UAVs have played an important role in wireless covert communications, which hide the UAV communication behavior and protect the UAV from being exposed in various civilian and military applications. So far, a notable research direction is to jointly optimize UAV placement and transmit power with the aim of enhancing the covert communication performance. In [26], the UAV placement and transmit power were jointly optimized to improve the received signal-to-noise (SNR) at the covert user by using the heuristic approaches. For a single-user scenario, the optimal UAV horizontal location was shown to be on the line segment between the covert user and the warden [27]. To minimize the probability of UAV exposure, the hovering height and transmit power were jointly optimized [28]. Moreover, the UAV movements were taken into account, and the system throughput was improved by jointly optimizing the UAV trajectory and transmit power [29]. However, most of the existing works on the UAV-aided covert communications have focused on the single-user scenario, whereas UAV-aided covert communications with multiple access, including NOMA and RSMA, have rarely been studied [30]. From the perspective of privacy protections, early stage research on covert communications for the UAV-aided RSMA (UAV-RSMA) systems are urgently demanded.
Figure 1. Diagram showing research on UAV security and privacy protection techniques (Wang, H.M. 2020 [16], Hu, J. 2020 [17], Zhou, X. 2019 [24], Liang, W. 2020 [25], Yan, S. 2021 [26], Zhou, X. 2019 [29]).
Figure 1. Diagram showing research on UAV security and privacy protection techniques (Wang, H.M. 2020 [16], Hu, J. 2020 [17], Zhou, X. 2019 [24], Liang, W. 2020 [25], Yan, S. 2021 [26], Zhou, X. 2019 [29]).
Drones 07 00429 g001
As outlined above, the existing works on the security and privacy protections of UAV-aided wireless covert communication systems have mainly focused on single-user scenarios and cannot be applied to wireless multiple access systems. Furthermore, current works on UAV hovering height optimization are confined to the NOMA-based covert communication systems, whose implemented in UAV-RSMA systems is, however, non-trivial. The reason for this issue is that the UAV hovering height is highly coupled with common and private messages, which uniquely belong to the UAV-RSMA systems in contrast to the UAV-NOMA systems. Therefore, it is important to consider covert communications in UAV-RSMA systems. To realize covert communication between the UAV and RSMA users, the common and private messages, transmit power, and hovering height of the UAV need to be jointly optimized. To fully exploit the uncertainties of the common and private messages, transmit power, and UAV hovering height to realize these covert communications, we focus on an air-to-ground UAV-RSMA system and develop an optimal covert communication design. A comparison between the work in paper and the existing related works is summarized in Table 1. The main contributions of this paper are summarized as follows:
  • We exploit covert communications in an air-to-ground UAV-RSMA system, where a covert user and a public user can receive the RSMA signal transmitted from the UAV in the presence of a ground warden. The transmit power, common and private messages, and UAV hovering height are jointly utilized as new uncertainty medium to protect the private message transmissions of the covert user.
  • Subject to the covertness constraint of the UAV-RSMA system and the QoS requirements of the public user, the transmit power allocation, common rate allocation, and UAV hovering height are jointly optimized to maximize the covert rate. To solve the non-convex covert rate maximization problem, we propose an efficient alternating optimization (AO) algorithm to deal with three subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height. The optimal solution to the subproblem of transmit power optimization is elaborately determined in a novel AO manner, the optimal solution to the subproblem of optimizing common rate allocation is derived, and a signomial programming problem is formulated to tackle hovering height optimization.
  • The simulation results validate the effectiveness of the proposed AO algorithm. By jointly optimizing the UAV hovering height, power allocation, and rate allocation, the simulation results also verify that the proposed UAV-RSMA scheme achieves a higher covert rate than the benchmark schemes.
The rest of the paper is organized as follows. The system model of the air-to-ground UAV-RSMA covert communication system is presented in Section 2. Section 3 formulates the covert rate maximization problem and develops the optimization method. The simulation results are presented in Section 4. The conclusions of this work are given in Section 5.

2. System Model

We consider an air-to-ground UAV-RSMA system as shown in Figure 2, in which a public user (Grace) and a covert user (Bob) are located in a geographical area, and a UAV is hovering at a certain location to provide downlink transmissions to Bob and Grace by using the RSMA, while a warden (Willie) operates within the vicinity of Bob to monitor the covert transmissions from the UAV to Bob. The horizontal locations of Bob, Grace, and Willie are denoted according to the Cartesian coordinate system by q b = [ x b , y b ] , q g = [ x g , y g ] , and q w = [ x w , y w ] , respectively, while the UAV’s horizontal location is q w = [ x w , y w ] and its hovering height is H satisfying H min H H max , where H min and H max are the minimum and maximum hovering altitudes, respectively.
In this work, we apply the following assumptions for the considered UAV-RSMA system: (1) All nodes are respectively equipped with a single antenna for reception or transmission. (2) Alice knows the locations of Bob and grace and also knows the instantaneous CSI of the channels from UAV to Bob and Grace. (3) The UAV knows the statistical CSI of the channels from Alice to Willie, which can be obtained by observing the location information of Willie, whereas Alice does not know the corresponding instantaneous CSI because Willie tries to hide its existence from the legitimate system. (4) From the perspective of covert communication design, we consider the worst-case scenario, i.e., Willie knows the instantaneous CSI of the channels from Alice to Willie [31,32]. (5) Since the strength of the line of sight (LoS) component is much stronger than the non-line of sight (NLoS), the air-to-ground channel is simply modeled by the LoS component. Then, the channel from the UAV to the node k ( k { b , g , w } ) can be expressed as:
h k = L 0 q u q k 2 + H 2 ,
where L 0 is the path-loss measured at the reference distance of 1 m and · denotes the Euclidean norm.

2.1. RSMA Transmissions

In the considered UAV-RSMA system, the UAV adopts RSMA to transmit the messages S b ( k ) and S g ( k ) to Bob and Grace, respectively, where k = 1 , , K denotes the index of the channel usage and K is the total number of the channel uses. Before the UAV’s transmission, S b ( k ) and S g ( k ) are each split into the two parts { S b 1 ( k ) , S b 2 ( k ) } and { S g 1 ( k ) , S g 2 ( k ) } , respectively. Then, the messages S b 1 ( k ) and S g 1 ( k ) are merged and encoded to a common stream s 0 ( k ) , while S b 2 ( k ) and S g 2 ( k ) are encoded to two private streams s 1 ( k ) and s 2 ( k ) , respectively. Then, the transmitted signal of the UAV can be expressed as z 1 = α 0 P u s 0 ( k ) + α 1 P u s 1 ( k ) + α 2 P u s 2 ( k ) , where α 0 , α 1 , and α 2 are transmit power allocation factors satisfying 0 α 0 , α 1 , α 2 1 and P u is the peak transmit power at the UAV. We assume that both common and private streams satisfy E ( | s 0 | 2 ) = E ( | s 1 | 2 ) = E ( | s 2 | 2 ) = 1 . For each transmission block, the signals received at Bob and Grace can be respectively expressed as:
y b ( k ) = α 0 P u s 0 ( k ) + α 1 P u s 1 ( k ) + α 2 P u s 2 ( k ) h b + n b ( k )
and
y g ( k ) = α 0 P u s 0 ( k ) + α 1 P u s 1 ( k ) + α 2 P u s 2 ( k ) h g + n g ( k ) ,
where n b ( k ) CN ( 0 , σ b 2 ) ( n g ( k ) CN ( 0 , σ g 2 ) ) is the additive white Gaussian noise (AWGN) at Bob (Grace). When Bob receives the signal, the common stream s 0 ( k ) is first detected and the private stream s 1 ( k ) and s 2 ( k ) regarded as noise [1]. Thus, the achievable rate of detecting s 0 ( k ) at Bob is given by R b , s 0 ( k ) = log 2 ( 1 + γ b , s 0 ( k ) ) , where the received signal-to-interference-plus-noise ratio (SINR) γ b , s 0 ( k ) is given by
γ b , s 0 ( k ) = α 0 P u | h b | 2 ( α 1 + α 2 ) P u | h b | 2 + σ b 2 .
After successfully detecting and eliminating the common stream from the received signal, Bob detects its own private stream s 1 ( k ) . Consequently, the achievable rate of detecting s 1 ( k ) at Bob can be expressed as R b , s 1 ( k ) = log 2 ( 1 + γ b , s 1 ( k ) ) , where the received SINR γ b , s 1 ( k ) is given by
γ b , s 1 ( k ) = α 1 P u | h b | 2 α 2 P u | h b | 2 + σ b 2 .
Similarly, the achievable rates for decoding the common stream s 0 ( k ) and private stream s 2 ( k ) at Grace are given by R g , s 0 ( k ) = log 2 ( 1 + γ g , s 0 ( k ) ) and R g , s 2 ( k ) = log 2 ( 1 + γ g , s 2 ( k ) ) , respectively, where
γ g , s 0 ( k ) = α 0 P u | h g | 2 ( α 1 + α 2 ) P u | h g | 2 + σ g 2
and
γ g , s 2 ( k ) = a 2 P u | h g | 2 α 1 P u | h g | 2 + σ g 2 ,
respectively. In this work, we assume | h b | 2 > | h g | 2 without loss of generality. Consequently, we have R g , s 0 ( k ) < R b , s 0 ( k ) . Shared by Bob and Grace, the transmission rate of the common message can be characterized by
R c = min R b , s 0 ( k ) , R g , s 0 ( k ) = R b c + R g c ,
where R b c β 1 R g , s 0 ( k ) and R g c β 2 R g , s 0 ( k ) denote the achievable rates of the common message transmissions of Bob and Grace, respectively, β 1 and β 2 are the common rate allocation factors satisfying 0 β 1 , β 2 1 and β 1 + β 2 1 [1,33]. Then, the achievable rates of Bob and Grace can be expressed as R b = β 1 R g , s 0 ( k ) + R b , s 1 ( k ) and R g = β 2 R g , s 0 ( k ) + R g , s 2 ( k ) , respectively.

2.2. Willie’s Detection

As the warden, Willie faces two hypotheses in monitoring the covert transmissions from Alice to Bob: (1) The null hypothesis H 0 corresponding to the case in which Alice does not transmit a private message to Bob. (2) The alternate hypothesis H 1 corresponding to the case in which Alice transmits a private message to Bob. Under the two hypotheses, the signal received at Willie can be respectively expressed as:
H 0 : y w ( k ) = α 0 P u s 0 ( k ) + α 2 P u s 2 ( k ) h w + n w
and
H 1 : y w ( k ) = α 0 P u s 0 ( k ) + α 1 P u s 1 ( k ) + α 2 P u s 2 ( k ) h w + n w ,
where n w ( k ) CN ( 0 , σ w 2 ) denotes the AWGN at Willie. Under H 0 and H 1 , the likelihood functions of the received signals can be evaluated as p 0 ( y w ) = e | y w | 2 σ 0 2 / π σ 0 2 and p 1 ( y w ) = e | y w | 2 σ 1 2 / π σ 1 2 , respectively, with
σ 0 2 = ( α 0 + α 2 ) P u | h w | 2 + σ w 2
and
σ 1 2 = P u | h w | 2 + σ w 2 .
To minimize the DEP, Willie conducts the likelihood ratio test p 1 ( y w ) p 0 ( y w ) D 0 D 1 1 , where D 1 and D 0 are the binary decisions that infer whether Alice transmits or not. Equivalently, Willie adopts its average received power P w = K 1 K k = 1 K | y w ( k ) | 2 as the decision statistic. Then, the optimal decision rule can be expressed as P w D 0 D 1 ϕ * , where ϕ * is the optimal detection threshold for Willie’s decision, with its form being given by:
ϕ * = σ 0 2 σ 1 2 σ 1 2 σ 0 2 ln σ 1 2 σ 0 2 .
By using the optimal detection threshold, the achieved minimum DEP can be expressed as:
ξ * = Pr ( D 1 | H 0 ) + Pr ( D 0 | H 1 ) = Pr ( P w ϕ * | H 0 ) + Pr ( P w ϕ * | H 1 ) = 1 + σ 1 2 σ 0 2 σ 1 2 σ 1 2 σ 0 2 σ 1 2 σ 0 2 σ 0 2 σ 1 2 σ 0 2 ,
where Pr ( D 1 | H 0 ) and Pr ( D 0 | H 1 ) denote the false alarm probability and missed detection probability, respectively. Unfortunately, the above expression for ξ * is intractable in further analysis of corresponding optimizations. To formulate a feasible covert rate maximization problem, we introduce a lower bound on ξ * as:
ξ * 1 1 2 D p 0 ( y w ) p 1 ( y w ) ,
where D p 0 ( y w ) p 1 ( y w ) is the Kullback–Leibler (KL) divergence, which can be evaluated as:
D p 0 ( y w ) p 1 ( y w ) = p 0 ( y w ) ln p 0 ( y w ) p 1 ( y w ) d y w = ln σ 1 2 σ 0 2 + σ 0 2 σ 1 2 1 .
To guarantee the covert transmissions from Alice to Bob, the covert constraint
ξ * 1 ε ,
needs to be satisfied with ε > 0 being a small value to represent the required covertness level. By using the KL divergence and the lower bound on ξ * in (15), a stricter covert constraint over (17) can be formulated as:
D p 0 ( y w ) p 1 ( y w ) 2 ε 2 .
Considering that f ( λ ) = ln λ + 1 λ 1 is a monotonically increasing function with respect to λ [ 1 , ) with f ( 1 ) = 0 and f ( ) = , the covert constraint (18) can be rewritten as:
1 κ ( α 0 + α 2 ) P u | h w | 2 ( κ 1 ) σ w 2 ,
where κ is the unique solution of f ( λ ) = 2 ε 2 in the interval [ 1 , ) .

3. Joint Optimization of Hovering Height, Power, and Rate Allocation

3.1. Problem Formulation and Parameters Optimization

Subject to the covertness constraint and QoS requirements of the considered UAV-RSMA system, the aim of this work is to maximize Bob’s covert rate (equivalently the achievable rate of Bob) by jointly optimizing the transmit power allocation, common rate allocation, and UAV hovering height. Specifically, the achievable rate of Grace needs to be no less than the target rate R g min , which represents the QoS requirements of Grace. Then, the problem of maximizing the covert rate can be formulated as:
(20a) ( P 1 ) : max α 0 , α 1 , α 2 , β 1 , β 2 , H R b (20b) s . t . α 0 + α 1 + α 2 1 , 0 α 1 , α 2 , α 3 1 , (20c) β 1 + β 2 1 , 0 β 1 , β 2 1 , (20d) R b c 0 , R g c 0 , (20e) R g R g min , (20f) 1 κ ( α 0 + α 2 ) P u | h w | 2 ( κ 1 ) σ w 2 , (20g) H min H H max .
In problem (P1), (20b) is the constraint on the transmit power allocation factors, (20c) represents the constraint on the common rate allocation factors, (20d) are constraints placed on the common rates of Bob and Grace, respectively, (20e) is the QoS constraint required by Grace, (20f) guarantees the preset covertness level is satisfied, and (20g) is the hovering height constraint.
Obtaining the optimal solution to problem (P1) is extremely challenging. The reason is that the optimization variables in the objective function and non-convex constraints (20d)–(20f) are highly coupled. Consequently, it is impossible to directly solve problem (P1) by jointly optimizing the system parameters. To tackle this challenge, we decouple the covert rate maximization problem (P1) into three subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height and propose an AO algorithm to obtain the optimized system parameters. In the following, the subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height are separately presented.

3.2. Subproblem of Transmit Power Allocation Optimization

By observing the objective function in problem (P1), once β 1 , β 2 , and H are given, the value of the objective function is only determined by the transmit power allocation, i.e., the variables α 0 , α 1 , and α 3 . Similarly, constraints (20d) and (20e) are determined by the transmit power allocation once β 1 , β 2 and H are given. Moreover, constraints (20c) and (20g) are independent of the transmit power allocation. Thus, for any given β 1 , β 2 , and H, the covert rate maximization problem (P1) is reduced to optimize the transmit power allocation only, which can be expressed as follows:
(21a) ( P 2 ) : max α 0 , α 1 , α 2 R b (21b) s . t . α 0 + α 1 + α 2 1 , 0 α 0 , α 1 , α 2 1 , (21c) β 2 log 2 1 + α 0 P T | h g | 2 ( α 1 + α 2 ) P T | h g | 2 + σ g 2 + log 2 1 + α 2 P T | h g | 2 α 1 P T | h g | 2 + σ g 2 R g min , (21d) 1 κ ( α 0 + α 2 ) P u | h w | 2 ( κ 1 ) σ w 2 .
Since α 0 , α 1 , and α 2 are coupled with each other in the objective function and all the constraints, it is challenging to obtain the optimal solution of problem (P2) directly. However, for any given α 0 , the optimal solution of α 1 * and α 2 * can be determined for problem (P2). As such, for any given α 1 and α 2 , the optimal α 0 * can also be determined. Thus, the optimal solution of α 0 * , α 1 * , and α 2 * to problem (P2) can be obtained in the manner of the AO. In the following, we present the corresponding solution optimized from the perspective of the AO.
Proposition 1.
The optimal solution to problem (P2) can be achieved only when α 0 + α 1 + α 2 = 1 .
Proof. 
The proof is given in Appendix A. □
Based on the results in Proposition 1, we have α 1 + α 2 = 1 α 0 for any given α 0 . Consequently, constraint (21c) can be simplified as R g c + log 2 1 + ( 1 α 0 α 1 ) P u | h g | 2 α 1 P u | h g | 2 + σ g 2 R g min . For constraint (21c), we have the following observations: (1) The case of R g c R g min . In this case, Grace’s common rate already satisfies the corresponding QoS requirements. (2) The case of R g c < R g min . In this case, Grace’s common rate cannot satisfy the corresponding QoS requirements. Based on the above observations and taking into account that R b is a monotonically increasing function with respect to α 1 with any given α 0 , the optimal α 1 * and α 2 * can be respectively given by:
α 1 * = min 1 α 0 , Ξ 1 , if R g c R g min min 1 α 0 , Ξ 1 , Ξ 2 , otherwise
and
α 2 * = 0 , if R g c R g min Ξ 3 , otherwise ,
where Ξ 1 = κ 1 κ σ w 2 P u | h w | 2 + 1 , Ξ 2 = ( 1 α 0 ) P u | h g | 2 2 R g min R g c 1 σ g 2 P u | h g | 2 2 R g min R g c , and
Ξ 3 = 2 R g min R g c 1 α 1 P u | h g | 2 + σ g 2 P u | h g | 2 . On the other hand, for any given α 1 and α 2 , the optimal α 0 * is given by α 0 * = 1 α 1 * α 2 * based on the results of Proposition 1. As a result, the AO approach to obtain the optimal solution to problem (P2) is summarized in Algorithm 1.
Algorithm 1: AO Algorithm of Optimizing Transmit Power
1:
Initialize a feasible α 0 and ι = 0
2:
repeat
3:
 Given α 0 ι , update α 1 ι + 1 and α 2 ι + 1 according to (22) and (23)
4:
 Given α 1 ι + 1 and α 2 ι + 1 , update α 0 ι + 1 according to α 0 ι + 1 = 1 α 1 ι + 1 α 2 ι + 1
5:
 Update ι = ι + 1
6:
until  R b ι + 1 R b ι < ζ 1

3.3. Subproblem of Common Rate Allocation Optimization

By observing the objective function in problem (P1), once α 0 , α 1 , α 2 , and H are given, the value of the objective function is only determined by the common rate allocation, i.e., the variables β 1 and β 2 . Similarly, constraint (20e) is determined by the common rate allocation once α 0 , α 1 , α 2 , and H are given. Moreover, constraints (20b), (20d), (20f), and (20g) are independent of the common rate allocation. Thus, for any given α 0 , α 1 , α 2 , and H, problem (P1) is simplified to optimize the common rate allocation and the reduced problem is given by:
(24a) ( P 3 ) : max β 1 , β 2 R b (24b) s . t . β 2 log 2 1 + α 0 P u | h g | 2 ( α 1 + α 2 ) P u | h g | 2 + σ g 2 + log 2 1 + α 2 P u | h g | 2 α 1 P u | h g | 2 + σ g 2 R g min .
In problem (P3), constraint (24b) can be rewritten as β 2 Ξ 4 with
Ξ 4 = R g min log 2 1 + α 2 P u | h g | 2 α 1 P u | h g | 2 + σ g 2 log 2 1 + α 0 P u | h b | 2 ( α 1 + α 2 ) P u | h b | 2 + σ b 2 . Taking into account that R b is a monotonically decreasing function with respect to β 2 , the optimal solution to problem (P3) can be written as β 1 * = 1 β 2 * and β 2 * = Ξ 4 .

3.4. Subproblem of Hovering Height Optimization

By observing the objective function in problem (P1), once α 0 , α 1 , α 2 , β 1 , and β 2 are given, the value of the objective function is only determined by the hovering height, i.e., the variable H. Similarly, constraint (20e) is determined by H once α 0 , α 1 , α 2 , β 1 , and β 2 are given. Moreover, constraints (20b), (20d), (20f), and (20g) are independent of the feasible H. Thus, for any given α 0 , α 1 , α 2 , β 1 , and β 2 , problem (P1) turns to be the covert rate maximization problem with respect to the hovering height, which is expressed as:
(25a) ( P 4 ) : max H R b (25b) s . t . R g R g min , (25c) H min H H max , (25d) 1 κ ( α 0 + α 2 ) P u | h w | 2 ( κ 1 ) σ w 2 .
To ensure the corresponding optimization problem feasible, we first rewrite the covert constraint (25d) as follows:
P u L 0 d w 2 + H 2 ( κ 1 ) σ w 2 1 κ ( α 0 + α 2 ) ,
where d w is the horizontal distance from the UAV to Willie. Since maximizing R b = β 1 R g , s 0 ( k ) + R b , s 1 ( k ) is equivalent to maximizing β 1 R g , s 0 ( k ) and R b , s 1 ( k ) , respectively, while maximizing R g , s 0 ( k ) and R b , s 1 ( k ) are equivalent to maximize the SINR γ g , s 0 ( k ) and γ b , s 1 ( k ) , respectively, the maximum R b can be obtained by maximizing γ g , s 0 ( k ) + γ b , s 1 ( k ) . Note that the covert constraint (25d) has been transformed into a signomial function (26), and we replace maximization in problem (P4) by minimization, which generates the SP problem as:
(27a) ( P 5 ) : min H 1 γ g , s 0 ( k ) + 1 γ b , s 1 ( k ) (27b) s . t . 1 κ ( α 0 + α 2 ) P u | h w | 2 ( κ 1 ) σ w 2 . (27c) ( 25b ) , ( 25c ) , ( 26 ) .
To solve the SP problem, the left-hand-side of (26) needs to be transformed into a posynomial. To this end, we approximate the posyomial denominator θ = d w 2 + H 2 in (26) by the geometric mean [34]. Then, the approximation can be written as:
θ ^ = d w 2 λ 0 λ 0 H 2 λ 1 λ 1 ,
where we have λ 0 = d w 2 θ and λ 1 = H 2 θ . Through approximating the arithmetic mean by the geometric mean based on the classic arithmetic–geometric mean inequality [35], the SP problem (P5) is approximated by the following geometric programming problem:
(29a) ( P 6 ) : min H 1 γ g , s 0 ( k ) + 1 γ b , s 1 ( k ) (29b) s . t . P u L 0 θ ^ ( κ 1 ) σ w 2 1 κ ( α 0 + α 2 ) , (29c) ( 25b ) , ( 25c ) .
Then, problem (P6) can be solved by using a convex solver such as CVX. The whole procedure of the AO approach is given in Algorithm 2. The convergence of Algorithm 2 is characterized by the following proposition.    
Algorithm 2: AO Algorithm of Maximizing the Covert Rate
1:
Initialize the feasible β 1 0 , β 2 0 , and H 0 , set = 0
2:
repeat
3:
 Given β 1 , β 2 and H , solve the problem (P2) by Algorithm 1 to obtain α 0 + 1 , α 1 + 1 , and α 2 + 1
4:
 Given α 0 + 1 , α 1 + 1 , α 2 + 1 , and H , solve the problem (P3) to obtain β 1 + 1 and β 2 + 1
5:
 Given H , compute θ ^ according to (28)
6:
 Given α 0 + 1 , α 1 + 1 , α 2 + 1 , β 1 + 1 and β 2 + 1 , solve the problem (P6) to obtain H + 1
7:
 Update = + 1
8:
until  R b + 1 R b < ζ 2
Proposition 2.
The developed Algorithm 2 is guaranteed to converge.
Proof. 
The proof is given in Appendix B. □
In Algorithm 2, the convex optimizations are involved in the iterations. It is noted that the complexity of Algorithm 2 mainly originates from solving the GP problem (P6). Since problem (P6) only contains a single variable, the complexity of solving problem (P6) is characterized by O ( I 1 ) [36], where I 1 is the number of iterations of the AO approach.

3.5. Benchmark Scheme

In this section, we investigate the covert performance of the UAV-assisted NOMA (UAV-NOMA) system, where the conventional NOMA is applied for the transmissions from Alice to Bob and Grace [37,38]. Based on the assumption of channel ordering | h b | 2 > | h g | 2 , the SIC decoding order at Bob is S g ( k ) S b ( k ) , i.e., decoding S g ( k ) first before decoding S b ( k ) . At Grace, S g ( k ) is decoded by treating the signal related to S b ( k ) as noise. Thus, more transmit power is allocated to transmit S g ( k ) at the UAV to ensure the successful SIC at the receiver [37,39], which also provides helps to shield Bob’s covert communications [38]. Accordingly, the achievable rate of Bob obtained from the transmission of S b ( k ) is given by R b , s g ( k ) NOMA = log 2 1 + γ b , s g ( k ) NOMA , where
γ b , s g ( k ) NOMA = α ¯ 2 P u | h b | 2 α ¯ 1 P u | h b | 2 + σ b 2
with α ¯ 1 and α ¯ 2 denoting the transmit power allocation factors for x b ( k ) and x g ( k ) , respectively, and satisfying α ¯ 1 + α ¯ 2 1 and 0 α ¯ 1 , α ¯ 2 1 . Furthermore, Bob’s covert rate obtained from the transmission of x b ( g ) can be expressed as R b , s b ( k ) NOMA = log 2 1 + γ b , s b ( k ) NOMA , where
γ b , s b ( k ) NOMA = α ¯ 1 P u | h b | 2 σ b 2 .
Similarly, the achievable rate of Grace is given by R g , s g ( k ) NOMA = log 2 1 + γ g , s g ( k ) NOMA , where
γ g , s g ( k ) NOMA = α ¯ 2 P u | h g | 2 α ¯ 1 P u | h g | 2 + σ g 2 .
We assume that Willie also adopts the Neyman–Pearson criterion to make the binary decision in the UAV-NOMA system. By replacing α ¯ 2 = α 0 + α 2 , where α 0 and α 2 are the transmit power allocation factor defined in the UAV-RSMA system, it is readily shown that the covertness constraint is given by
( 1 κ α ¯ 2 ) P u | h w | 2 ( κ 1 ) σ w 2 .
To maximize Bob’s covert rate, the transmit power allocation and UAV hovering height should be jointly optimized and the corresponding optimization problem is formulated as:
(34a) ( P 7 ) : max α ¯ 1 , α ¯ 2 , H R b , s b ( k ) NOMA (34b) s . t . α ¯ 1 + α ¯ 2 1 , α ¯ 1 α ¯ 2 , (34c) R b , s b ( k ) NOMA > R g , s g ( k ) NOMA , (34d) R g , s g ( k ) NOMA R g min , (34e) ( 1 κ α ¯ 2 ) P u | h w | 2 ( κ 1 ) σ w 2 .
In problem (P7), (34b) is the transmit power allocation constraint, constraint (34c) guarantees the successful SIC at Bob, constraint (34d) represents Grace’s QoS requirements, which can be further written as α ¯ 2 P u | h g | 2 γ th α ¯ 1 P u | h g | 2 + σ g 2 with γ th = 2 R g min 1 . Similarly to the UAV-RSMA system, the joint optimization of the transmit power allocation and UAV hovering height is impossible in the considered UAV-NOMA system. Fortunately, the AO approach can be applied to obtain the optimal { α ¯ 1 * , α ¯ 2 * } with the given H and h * and { α ¯ 1 , α ¯ 2 } . The subproblems of optimizing the transmit power allocation and UAV hovering height are separately presented in the following.
For any given H, the covert rate maximization problem of optimizing the transmit power allocation can be formulated as:
(35a) ( P 8 ) : max α ¯ 1 , α ¯ 2 R b , s b ( k ) NOMA (35b) s . t . α ¯ 1 + α ¯ 2 1 , α ¯ 1 α ¯ 2 , (35c) α ¯ 2 P u | h g | 2 γ th ( α ¯ 1 P u | h g | 2 + σ g 2 ) , (35d) ( 1 κ α ¯ 2 ) P u | h w | 2 ( κ 1 ) σ w 2 .
Proposition 3.
Problem (P8) can be optimized only when α ¯ 1 + α ¯ 2 = 1 .
Proof. 
The proof is similar to that in Appendix A. □
Based on the results in Proposition 3, we let α ¯ 2 = 1 α ¯ 1 and transform (35c) equivalently to the form of α ¯ 1 Ξ 5 with Ξ 5 = P u | h g | 2 γ th σ g 2 ( 1 + γ th ) | h g | 2 P u . Then, problem (P8) can be simplified as:
(36a) ( P 9 ) : max α ¯ 1 , α ¯ 2 R b , s b ( k ) NOMA (36b) s . t . α ¯ 1 min 1 2 , Ξ 1 , Ξ 5 ,
Since R g , s b ( k ) NOMA is a monotonically increasing function with respect to α ¯ 1 , the optimal transmit power allocation in the UAV-NOMA system is given by α ¯ 1 * = min 1 2 , Ξ 1 , Ξ 5 and α ¯ 2 * = 1 α ¯ 1 * .
For any given α ¯ 1 and α ¯ 2 , problem (P7) reduces to only optimize the UAV hovering height. Similarly to problem (P6), we transform the covert rate maximization problem to a minimization problem as follows:
(37a) ( P 10 ) : min H 1 γ b , s b ( k ) NOMA (37b) s . t . R g R g min , (37c) H min H H max , (37d) P u L 0 θ ^ ( κ 1 ) σ w 2 1 κ α ¯ 2 .
Now, problem (P10) can be solved by using a convex optimization tool such as CVX. Based on the decoupled problems (P9) and (P10), the optimized system parameters can be obtained in an AO way, and the corresponding algorithm is omitted here to save space.
Compared to the UAV-RSMA scheme, the UAV-NOMA scheme only has two transmit power allocation coefficients α ¯ 1 and α ¯ 2 , which results in reduced degrees of freedom (DoF). Consequently, the transmit power can be allocated only between the signals of Bob and Grace, while the SIC processing is conducted only at Bob. On the contrary, the UAV-RSMA scheme achieves a higher DoF than the UAV-NOMA scheme by utilizing rate splitting. The transmit power can be allocated not only between the private messages of Bob and Grace but also between the common and private messages. Accordingly, common rate allocation is conducted between Bob and Grace. With the increased DoF, the covert rate of the UAV-RSMA scheme can be effectively increased compared to the UAV-NOMA scheme, as will be verified by the simulation results in the next section.

4. Simulation Results

In this section, the simulation results are presented to establish the covert performance achieved by the proposed UAV-RSMA scheme. Unless otherwise stated, the following system parameter setup is assumed in the simulations: L 0 = 30 dB, σ b 2 = σ g 2 = σ w 2 = 80 dBm, H min = 40 m, and H max = 100 m. The horizontal locations of Bob and Grace are set as q b = [ 0 , 0 ] and q b = [ 200 , 0 ] , respectively. The horizontal location of the UAV is positioned at q u = [ 55 , 0 ] such that both Bob has a better LoS channel connecting to the UAV than that of Grace. Since it is hard for the UAV to locate Willie, we consider the worst scenario in which Willie is positioned right below the UAV.
In Figure 3, the trends of covert rate varying with the UAV’s transmit power are depicted. In the simulations, we set R g min = 3 bps/Hz and ε = 0.01 . For comparison purposes, the results achieved by the proposed AO scheme with fixed H and random H are presented. In addition, the results achieved by the benchmark scheme are also presented. From Figure 3, it can be seen that the proposed UAV-RSMA with the AO algorithm achieves the highest covert rate among all the schemes, which verifies the effectiveness of the proposed AO algorithm. Since the UAV-RSMA scheme obtains a higher DoF than the UAV-NOMA scheme by optimizing transmit power and common rate allocations, the covert rate can be significantly improved by applying the UAV-RSMA scheme. At the covert rate level of R b = 10 bps/Hz, about 5 dBm transmit power gain can be achieved by the proposed scheme. With the increase in P u , the covert rates achieved by all the schemes also increase. Moreover, the gap between the covert rates of the UAV-RSMA and UAV-NOMA schemes increases with increasing P u , which further verifies the superior covert rate performance of the UAV-RSMA scheme over that of the UAV-NOMA scheme. By adopting the fixed H and random H in the proposed AO algorithm, in which only the transmit power and common rate allocations are optimized, the obtained covert rate is smaller than the highest curve of R b . For example, at the covert rate level of R b = 10 bps/Hz, about 7 dBm transmit power gain can be achieved by the AO algorithm with optimizing H compared to the AO algorithm with the fixed H = 55 m. Moreover, the AO algorithm with the random H achieves a smaller R b than the AO algorithm with the fixed H = 55 m in the low and middle transmit power regions, whereas a higher R b is achieved by the AO algorithm with the random H than the AO algorithm with fixed H = 55 m in the high transmit power region. However, the AO algorithm with optimizing H obviously achieves a higher R b than the AO algorithms with the fixed H and random H. Thus, the importance of optimizing the UAV hovering height is verified by the results in Figure 3. For the considered benchmark scheme, the achieved covert rate is much lower than that of the UAV-RSMA scheme, which establishes the superior covert performance of the proposed UAV-RSMA scheme.
In Figure 4, the covert rate versus the covertness parameter ε is investigated. For the simulations corresponding to Figure 4, we set P u = 20 dBm and R g min = 2 bps/Hz unless otherwise stated. The results in Figure 4 show that the covert rate achieved by all the schemes increase monotonically with the increasing ε . Since a larger ε represents a smaller detection error probability, a looser covert constraint results in a larger R b . Moreover, the proposed UAV-RSMA with the AO algorithm achieves the largest R b among all the schemes. The reason for this phenomenon is that the UAV-RSMA scheme obtains the additional DoF by optimizing not only the transmit power allocation among common and private messages but also the common rate allocation between Bob and Grace compared to that of the UAV-NOMA scheme. Although the covert rates achieved by the AO algorithms with the fixed H and random H increase with the increasing ε , the corresponding R b is smaller than that of the AO algorithm with optimizing H. For example, at the covertness level of ε = 0.1 , which is a typical covertness requirement in practice, the covert rate achieved by the AO algorithm with the optimizing H is 1 bps/Hz larger than that of the random H and 0.5 bps/Hz larger than that of the fixed H = 60 m. Thus, the results in Figure 4 verify that the covert rate performance in the case of not optimizing the UAV hovering height suffers a decrease compared to the optimized H in the considered ε region. Furthermore, the superiority of the proposed scheme over that of the benchmark scheme is also verified by the curves in Figure 4. As can be seen from Figure 4, although the covert rates achieved by the UAV-NOMA scheme increase with the increasing ε , the values of R b are much smaller than those of the UAV-RSMA schemes. For example, at the covertness level of ε = 0.1 , the covert rate achieved by the UAV-RSMA scheme with the AO algorithm is 3.5 bps/Hz larger than that of the UAV-NOMA scheme with the AO algorithm. In the cases of fixed H = 60 m and random H, the covert rates achieved by the UAV-RSMA scheme are 3.5 bps/Hz and 3 bps/Hz larger than those achieved by the UAV-NOMA scheme, respectively. In addition, the results in Figure 4 show that with the fixed H and random H, the covert rates achieved by the UAV-NOMA scheme is decreased compared to that achieved by the UAV-NOMA with optimizing H, which also verifies that the optimization of the UAV hovering height is important to enhance the covert rate performance.
To further reveal the impacts of the hovering height of the UAV on the covert rate, we plot the covert rate versus hovering height in Figure 5. In the simulations, we set P u = 30 dBm and R g min = 3 bps/Hz. The curves in Figure 5 show that the covert rates achieved by all the schemes first increase with the increase in the hovering height. Then, the covert rates decrease with the increase in the hovering height after H exceeds a certain value. In the low H region, the covert communication performance is greatly limited by the detection of Willie, such that a lower H results in a smaller covert rate and a higher H corresponds to a larger covert rate. On the other hand, with the increase in H, more transmit power is needed to guarantee the Qos requirements of the public user, which results in a reduced transmit power for the covert user such that the covert rate is decreased. In the high H region, we can see that the covert rates achieved with different ε tend to be the same. The reason for this phenomenon is that an extremely high H results in a very small detection probability at Willie, so that the covert constraint (33) does not affect the achievable covert rate. Moreover, the curves in Figure 5 also show that a smaller ε results in a smaller covert rate and vice verse. Also, the results in Figure 5 verify that the UAV-RSMA scheme achieves a larger covert rate than the UAV-NOAM scheme.
The impacts of Grace’s QoS requirements on the covert rate are depicted in Figure 6, where we set P u = 20 dBm, R g min = 2.5 bps/Hz, and ε = 0.1 . It is shown in Figure 6 that the covert rates achieved by all the schemes decrease monotonically with increasing R g min . Moreover, the covert rate achieved by the proposed UAV-RSMA scheme with the AO algorithm is the highest among all the schemes, which is also no less than those of the benchmark schemes even in the high R g min region. At the level of R g min = 1.5 bps/Hz, the covert rate achieved by the UAV-RSMA scheme with optimizing H is 2.2 bps/Hz higher than the UAV-RSMA scheme with the fixed H and 3 bps/Hz higher than the UAV-RSMA scheme with the random H. These results verify that jointly optimizing the transmit power allocation, common rate allocation, and hovering height is necessary to improve the covert rate. Also, the effectiveness of the proposed AO algorithm is verified. Compared to the covert rate achieved by the UAV-NOMA scheme with the AO algorithm, the covert rate achieved by the UAV-RSMA scheme with the AO algrithm is 3.6 bps/Hz higher at the level of R g min = 1.5 bps/Hz, which also verifies that the proposed UAV-RSMA scheme achieves a better covert rate performance than the UAV-NOMA scheme.

5. Conclusions

In this paper, the covert communications in air-to-ground UAV-RSMA have been investigated with the aim of maximizing the covert rate. To achieve the maximum covert rate, the system parameters, including the transmit power allocation, common rate allocation, and UAV hovering height, have been jointly considered in the optimization. Due to the non-convexity of the formulated covert rate maximization problem and the highly coupled system parameters, an AO algorithm has been designed to obtain the optimized solution with the aid of decoupling the original problem into three subproblems of the transmit power allocation, common rate allocation, and UAV hovering height. We derive the optimal solution of the transmit power allocation and common rate allocation for the corresponding subproblems and propose an AO approach to obtain the optimized UAV hovering height. The simulation results verify the superior covert performance achieved by the proposed AO algorithm. The superiority of the proposed scheme over the benchmark schemes has also been established by the simulation results.

Author Contributions

Conceptualization, K.M., H.C. and P.C.; methodology, K.M., H.C., P.C. and H.L.; software, K.M., H.C., P.C. and Z.B.; validation, K.M., H.C., P.C. and Z.B.; formal analysis, K.M., H.C., Z.B. and H.L.; investigation, K.M., H.C. and P.C.; resources, Z.B. and H.L.; data curation, K.M., H.C. and P.C.; writing—original draft preparation, K.M., H.C., P.C. and H.L.; writing—review and editing, K.M. and H.L.; visualization, K.M.; supervision, H.L; project administration, H.L; funding acquisition, Z.B. and H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 62071202 and in part by the Shandong Provincial Natural Science Foundation under Grants ZR2020MF009 and ZR2021LZH003.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

We use the contradiction to prove Proposition 1. Assume that the maximum value of the objective function of problem (P2) can be achieved when α 0 + α 1 + α 2 < 1 and rewrite R b as:
R b = β 1 log 2 1 + α 0 P u | h g | 2 ( 1 α 0 ) P u | h g | 2 + σ g 2 + log 2 1 + α 1 P u | h b | 2 α 2 P u | h b | 2 + σ b 2 .
It is readily shown that R b is a monotonically increasing function with respect to α 1 by fixing α 0 . By taking the first derivative of D p 0 ( y w ) p 1 ( y w ) with respect to α 1 , it can be proven that D ( p 0 ( y w ) p 1 ( y w ) ) α 1 > 0 , which means that a certain covertness requires α 1 to be no large than a threshold. Based on the above discussions, for any fixed α 0 and α 2 , we can scale up α 1 by a factor of c 2 ( c 2 > 1 ), such that α 0 + α 1 + α 2 = 1 holds, which results in an increased objective function value due to the increasing monotonicity of R b with respect to α 1 . This contradicts the original assumption of α 0 + α 1 + α 2 < 1 to achieve the maximum objective function value. Also, α 1 is constrained by the monotonicity of D p 0 ( y w ) p 1 ( y w ) , which limits the increase in the objective function value and thus completes the proof.

Appendix B

As shown in step 4 in Algorithm 2, the optimal solution α 0 + 1 , α 1 + 1 , and α 2 + 1 can be computed with the given β 1 , β 2 , and H . Thus, we have the following inequality:
R b β 1 , β 2 , H , α 0 , α 1 , α 2 R b β 1 , β 2 , H , α 0 + 1 , α 1 + 1 , α 2 + 1 .
Then, as shown in step 5 in Algorithm 2, the optimal solution β 1 + 1 and β 2 + 1 can be computed with the given α 0 + 1 , α 1 + 1 , α 2 + 1 , and H . Thus, the inequality (A2) is updated as:
R b β 1 , β 2 , H , α 0 + 1 , α 1 + 1 , α 2 + 1 R b β 1 + 1 , β 2 + 1 , H , α 0 + 1 , α 1 + 1 , α 2 + 1 .
Furthermore, as shown in step 6 in Algorithm 2, the optimal solution H + 1 can be computed with the given α 0 + 1 , α 1 + 1 , α 2 + 1 , β 1 + 1 , and β 2 + 1 and we have the inequality as follows:
R b β 1 + 1 , β 2 + 1 , H , α 0 + 1 , α 1 + 1 , α 2 + 1 R b β 1 + 1 , β 2 + 1 , H + 1 , α 0 + 1 , α 1 + 1 , α 2 + 1 .
Based on the above inequalities, we can readily arrive at:
R b β 1 , β 2 , H , α 0 , α 1 , α 2 R b β 1 + 1 , β 2 + 1 , H + 1 , α 0 + 1 , α 1 + 1 , α 2 + 1 .
According to (A2)–(A5), it can be shown that the objective function value of problem (P1) is progressively increasing over the iterations. Moreover, the objective function R b of problem (P1) clearly has an upper bound for any choice of feasible α 0 , α 1 , α 2 , β 1 , β 2 , and H. Thus, the convergence of Algorithm 2 is proved.

References

  1. Mao, Y.; Clerckx, B.; Li, V.O. Rate-splitting multiple access for downlink communication systems: Bridging, generalizing, and outperforming SDMA and NOMA. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 133. [Google Scholar]
  2. Mao, Y.; Clerckx, B.; Li, V.O. Rate-Splitting for Multi-Antenna Non-Orthogonal Unicast and Multicast Transmission. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; pp. 1–5. [Google Scholar]
  3. Alsabah, M.; Naser, M.A.; Mahmmod, B.M.; Abdulhussain, S.H.; Eissa, M.R.; Al-Baidhani, A.; Noordin, N.K.; Sait, S.M.; Al-Utaibi, K.A.; Hashim, F. 6G Wireless Communications Networks: A Comprehensive Survey. IEEE Access 2021, 9, 148191–148243. [Google Scholar]
  4. Clerckx, B.; Mao, Y.; Schober, R.; Poor, H.V. Rate-Splitting Unifying SDMA, OMA, NOMA, and Multicasting in MISO Broadcast Channel: A Simple Two-User Rate Analysis. IEEE Wirel. Commun. Lett. 2020, 9, 349–353. [Google Scholar]
  5. Joudeh, H.; Clerckx, B. Sum-Rate Maximization for Linearly Precoded Downlink Multiuser MISO Systems with Partial CSIT: A Rate-Splitting Approach. IEEE Trans. Commun. 2016, 64, 4847–4861. [Google Scholar]
  6. Dizdar, O.; Mao, Y.; Han, W.; Clerckx, B. Rate-Splitting Multiple Access: A New Frontier for the PHY Layer of 6G. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–7. [Google Scholar]
  7. Mao, Y.; Dizdar, O.; Clerckx, B.; Schober, R.; Popovski, P.; Poor, H.V. Rate-Splitting Multiple Access: Fundamentals, Survey, and Future Research Trends. IEEE Commun. Surv. Tuts. 2022, 24, 2073–2126. [Google Scholar]
  8. Li, P.; Chen, M.; Mao, Y.; Yang, Z.; Clerckx, B.; Shikh-Bahaei, M. Cooperative Rate-Splitting for Secrecy Sum-Rate Enhancement in Multi-antenna Broadcast Channels. In Proceedings of the 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 31 August–3 September 2020; pp. 1–6. [Google Scholar]
  9. Fu, H.; Feng, S.; Tang, W.; Ng, D.W.K. Robust Secure Beamforming Design for Two-User Downlink MISO Rate-Splitting Systems. IEEE Trans. Wirel. Commun. 2020, 19, 8351–8365. [Google Scholar]
  10. Xia, H.; Mao, Y.; Clerckx, B.; Zhou, X.; Han, S.; Li, C. Weighted Sum-Rate Maximization for Rate-Splitting Multiple Access Based Secure Communication. In Proceedings of the 2022 IEEE Wireless Communications and Networking Conference (WCNC), Austin, TX, USA, 10–13 April 2022; pp. 19–24. [Google Scholar]
  11. Tong, Y.; Li, D.; Yang, Z.; Zhao, N.; Chen, Y.; Li, Y. Cooperative Rate Splitting Secure Transmission with an Untrusted User Relay. IEEE Trans. Veh. Technol. 2023, 72, 2667–2671. [Google Scholar]
  12. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Select. Areas Commun. 2013, 31, 1921–1930. [Google Scholar]
  13. Hieu, N.Q.; Hoang, D.T.; Niyato, D.; Nguyen, D.N.; Kim, D.I.; Jamalipour, A. Joint Power Allocation and Rate Control for Rate Splitting Multiple Access Networks with Covert Communications. IEEE Trans. Commun. 2023, 71, 2274–2287. [Google Scholar]
  14. Nguyen, T.T.; Luong, N.C.; Feng, S.; Elbassioni, K.; Niyato, D. Jamming-Based Covert Communication for Rate-Splitting Multiple Access. IEEE Trans. Veh. Technol. (Early Access) 2023, 1–6. [Google Scholar] [CrossRef]
  15. Jiang, X.; Chen, X.; Tang, J.; Zhao, N.; Zhang, X.Y.; Niyato, D.; Wong, K.K. Covert Communication in UAV-Assisted Air-Ground Networks. IEEE Wirel. Commun. 2021, 28, 190–197. [Google Scholar]
  16. Wang, H.M.; Zhang, Y.; Zhang, X.; Li, Z. Secrecy and Covert Communications against UAV Surveillance via Multi-Hop Networks. IEEE Trans. Commun. 2020, 68, 389–401. [Google Scholar]
  17. Hu, J.; Wu, Y.; Chen, R.; Shu, F.; Wang, J. Optimal Detection of UAV’s Transmission with Beam Sweeping in Covert Wireless Networks. IEEE Trans. Veh. Technol. 2020, 69, 1080–1085. [Google Scholar]
  18. Zhang, J.; Chen, X.; Li, M.; Zhao, M. Optimized Throughput in Covert Millimeter-Wave UAV Communications with Beam Sweeping. IEEE Wirel. Commun. Lett. 2021, 10, 720–724. [Google Scholar]
  19. Chen, X.; Sheng, M.; Zhao, N.; Xu, W.; Niyato, D. UAV-Relayed Covert Communication towards a Flying Warden. IEEE Trans. Commun. 2021, 69, 7659–7672. [Google Scholar]
  20. Zhang, R.; Chen, X.; Liu, M.; Zhao, N.; Wang, X.; Nallanathan, A. UAV Relay Assisted Cooperative Jamming for Covert Communications over Rician Fading. IEEE Trans. Veh. Technol. 2022, 71, 7936–7941. [Google Scholar]
  21. Chen, X.; Zhang, N.; Tang, J.; Liu, M.; Zhao, N.; Niyato, D. UAV-Aided Covert Communication with a Multi-Antenna Jammer. IEEE Trans. Veh. Technol. 2021, 70, 11619–11631. [Google Scholar]
  22. Jiang, X.; Yang, Z.; Zhao, N.; Chen, Y.; Ding, Z.; Wang, X. Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications. IEEE Trans. Veh. Technol. 2021, 70, 1989–1994. [Google Scholar]
  23. Liao, S.; Wu, J.; Li, J.; Bashir, A.K.; Yang, W. Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones. IEEE Internet Things Mag. 2021, 4, 12–18. [Google Scholar]
  24. Zhou, X.; Yan, S.; Shu, F.; Chen, R.; Li, J. Covert Wireless Data Collection Based on Unmanned Aerial Vehicles. In Proceedings of the 2019 IEEE Globecom Workshops (GC Wkshps), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
  25. Liang, W.; Shi, J.; Tie, Z.; Yang, F. Performance Analysis for UAV-Jammer Aided Covert Communication. IEEE Access 2020, 8, 111394–111400. [Google Scholar]
  26. Yan, S.; Hanly, S.V.; Collings, I.B. Optimal Transmit Power and Flying Location for UAV Covert Wireless Communications. IEEE J. Select. Areas Commun. 2021, 39, 3321–3333. [Google Scholar]
  27. Zhou, X.; Yan, S.; Ng, D.W.K.; Schober, R. Three-Dimensional Placement and Transmit Power Design for UAV Covert Communications. IEEE Trans. Veh. Technol. 2021, 70, 13424–13429. [Google Scholar]
  28. Yan, S.; Hanly, S.V.; Collings, I.B.; Goeckel, D.L. Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  29. Zhou, X.; Yan, S.; Hu, J.; Sun, J.; Li, J.; Shu, F. Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications. IEEE Trans. Signal Process. 2019, 67, 4276–4290. [Google Scholar]
  30. Su, Y.; Fu, S.; Si, J.; Xiang, C.; Zhang, N.; Li, X. Optimal Hovering Height and Power Allocation for UAV-aided NOMA Covert Communication System. IEEE Wirel. Commun. Lett. 2023, 12, 937–941. [Google Scholar]
  31. Chou, S.F.; Pang, A.C.; Yu, Y.J. Energy-Aware 3D Unmanned Aerial Vehicle Deployment for Network Throughput Optimization. IEEE Trans. Wirel. Commun. 2020, 19, 563–578. [Google Scholar]
  32. Alzenad, M.; El-Keyi, A.; Yanikomeroglu, H. 3-D Placement of an Unmanned Aerial Vehicle Base Station for Maximum Coverage of Users with Different QoS Requirements. IEEE Wirel. Commun. Lett. 2018, 7, 38–41. [Google Scholar]
  33. Yang, Z.; Chen, M.; Saad, W.; Shikh-Bahaei, M. Optimization of Rate Allocation and Power Control for Rate Splitting Multiple Access (RSMA). IEEE Trans. Commun. 2021, 69, 5988–6002. [Google Scholar]
  34. Fu, S.; Wen, H.; Wu, B. Power-Fractionizing Mechanism: Achieving Joint User Scheduling and Power Allocation via Geometric Programming. IEEE Trans. Veh. Technol. 2018, 67, 2025–2034. [Google Scholar]
  35. Boyd, S.; Kim, S.J.; Vandenberghe, L.; Hassibi, A. A tutorial on geometric programming. Optim. Eng. 2007, 8, 67–127. [Google Scholar]
  36. Cui, M.; Zhang, G.; Zhang, R. Secure Wireless Communication via Intelligent Reflecting Surface. IEEE Wirel. Commun. Lett. 2019, 8, 1410–1414. [Google Scholar]
  37. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1735–1750. [Google Scholar]
  38. Tao, L.; Yang, W.; Yan, S.; Wu, D.; Guan, X.; Chen, D. Covert Communication in Downlink NOMA Systems with Random Transmit Power. IEEE Wirel. Commun. Lett. 2020, 9, 2000–2004. [Google Scholar]
  39. Ding, Z.; Schober, R.; Poor, H.V. On the Impact of Phase Shifting Designs on IRS-NOMA. IEEE Wirel. Commun. Lett. 2020, 9, 1596–1600. [Google Scholar]
Figure 2. An air-to-ground UAV-RSMA system conducting covert communications.
Figure 2. An air-to-ground UAV-RSMA system conducting covert communications.
Drones 07 00429 g002
Figure 3. Covert rate versus ε .
Figure 3. Covert rate versus ε .
Drones 07 00429 g003
Figure 4. Covert rate versus ε .
Figure 4. Covert rate versus ε .
Drones 07 00429 g004
Figure 5. Covert rate versus hovering height.
Figure 5. Covert rate versus hovering height.
Drones 07 00429 g005
Figure 6. Covert rate versus R g min .
Figure 6. Covert rate versus R g min .
Drones 07 00429 g006
Table 1. Comparison of the proposed scheme with the existing works on air-to-ground UAV covert communications.
Table 1. Comparison of the proposed scheme with the existing works on air-to-ground UAV covert communications.
ReferencesMultiple Access SchemeTransmit Power OptimizationRate Allocation OptimizationHovering Height Optimization
[26]
[27]
[28]
[29]
[30]NOMA
Proposed SchemeRSMA
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ma, K.; Chang, H.; Chen, P.; Bai, Z.; Liu, H. Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications. Drones 2023, 7, 429. https://doi.org/10.3390/drones7070429

AMA Style

Ma K, Chang H, Chen P, Bai Z, Liu H. Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications. Drones. 2023; 7(7):429. https://doi.org/10.3390/drones7070429

Chicago/Turabian Style

Ma, Kang, Heng Chang, Pengxu Chen, Zhiquan Bai, and Hongwu Liu. 2023. "Joint Hovering Height, Power, and Rate Optimization for Air-to-Ground UAV-RSMA Covert Communications" Drones 7, no. 7: 429. https://doi.org/10.3390/drones7070429

Article Metrics

Back to TopTop