1. Introduction
Rate-splitting multiple access (RSMA) has been recognized as a promising multiple access technology for future wireless communications due to its high spectral efficiency, high energy efficiency, and flexibility on inter-user interference (IUI) management [
1,
2,
3]. In downlink RSMA, each user’s message is split into a common part and a private part to generate the overall transmit signal, which consists of a common steam and multiple private streams, respectively. Specifically, the common stream is obtained by merging the common messages of all users via encoding with a shared codebook. The private streams are independently generated from all users’ private messages with each private stream being intended for a distinctive receiver. At the receiver side, the common stream is decoded by all the receivers, whereas each receiver decodes its own private stream by using successive interference cancellation (SIC) and treating other private streams as noise [
4]. Because of its flexibility in partially decoding interference and treating partial interference as noise, RSMA has drawn enormous attention from industry and academia to tackle various challenges that have emerged for the upcoming 6G wireless communications [
4,
5,
6,
7].
With the unprecedented proliferation of confidential and sensitive data over wireless communications, privacy protections have rendered massive critical security issues in 6G wireless communication systems. A notable challenge of RSMA is encountered in security and privacy protection, due to open propagation of wireless signals. To prevent information leakage in RSMA systems from the perspective of physical layer security (PLS), common message and cooperative jamming have been exploited to address eavesdropping issues [
8,
9]. It has been shown in [
8] that common messages can not only convey information signals but also act as artificial noise (AN) to interfere with eavesdroppers such that cooperative RSMA can achieve a higher secrecy sum rate than conventional non-orthogonal multiple access (NOMA) and space-division multiple access (SDMA). Due to imperfect channel state information at transmitter (CSIT), the secrecy performance of the RSMA system is decreased. Assuming the worst-case uncertainty channel model, the authors of [
9] jointly designed the IUI mitigation and secrecy sum-rate maximization for the RSMA system, which significantly enhanced the secrecy rate performance compared to that of NOMA. In the presence of an internal eavesdropper, a secure beamforming design was proposed that takes into account all users’ secrecy rate constraints, which resulted in RSMA outperforming the benchmark schemes in terms of weighted sum rate [
10]. To prevent untrusted relays from eavesdropping on private messages owned by other users, a two-slot cooperative rate-splitting scheme was proposed in which the precoding, slot allocation, and rate allocation were jointly optimized to effectively guarantee users are safe from eavesdropping [
11]. However, PLS approaches cannot prevent adversaries from receiving and detecting legitimate signals, which results in novel threats to the actual hiding of legitimate transmissions.
Covert communications aim to provide a higher level of security protections than conventional PLS approaches by ensuring adversaries have a large detection error probability (DEP) of monitoring behaviors of legitimate communications [
11,
12]. Since leaking a small amount of data or exposing existence information—such as those that occur in military operations, wearable medical devices, or wireless financial transactions—can result in unexpected harms to legitimate systems, covert communications have emerged and are desired in the context of RSMA. To maximize the sum rate and maintain fairness, transmit power allocation and rate allocation in RSMA systems need to smartly cooperate with each other to realize covert communications, and a policy gradient method-based learning algorithm was proposed in [
13]. It has been shown that under the stochastic optimization framework, the learning algorithm can achieve non-saturated transmission rate at high signal-to-noise (SNR) regions with infinite block length. Furthermore, jamming signal was superimposed to common and private messages to maximize the minimum data rate among all users subject to the covertness constraint [
14]. By using AN signal to effectively prevent adversary from detecting legitimate RSMA transmissions, up to three times the minimum data rate can be achieved over that of the NOMA scheme [
14].
Recently, unmanned aerial vehicle (UAV)-aided wireless communications have gained much attention from academia and the industry due to the high mobility, enhanced coverage, and flexible deployment of UAVs. PLS techniques were applied to prevent the exchange of confidential information to and from the UAVs, but they cannot hide the UAV’s communication behaviors and prevent them from being detected by wardens. To overcome the challenges raised in UAV-aided military and financial fields, covert communication techniques were exploited [
15]. In [
16], both the PLS and covert communication performance were analyzed for a multi-hop network against the UAV surveillance. By using beam sweeping, an optimal detection strategy was proposed to detect the UAV’s covert transmissions [
17]. Also, the beam sweeping was adopted at the UAV transmitter to maximize the average throughput of the covert transmissions from the UAV to the ground terminal [
18]. For long-distance covert communications, the UAV was deployed as a relay to maximize the transmission rate between the legitimate transmitter and receiver against a flying warden [
19]. In [
20], an UAV full-duplex relay was applied to maximize the effective covert throughput in the practical Rician channels. In [
21], an UAV-aided uplink covert communication system was investigated, where a multi-antenna jammer was deployed to maximize the transmission rate between the ground transmitter and the UAV receiver against several randomly distributed wardens. Under the assumption that block length is finite, the downlink transmissions from the UAV to mutliple ground users were hidden by maximizing the minimum average covert rate [
22]. In [
23], smart contracts and blockchain techniques were used to ensure the security and guarantee the privacy of UAV collaborations. The UAVs can also be used to covertly collect data from ground users [
24]. By using the UAV as a jammer, the covert communication performance can be improved as shown in [
25]. To clearly show the considered UAV security and privacy protection techniques, we plotted the tree diagram in
Figure 1 for related works in the research field.
In the aforementioned works, UAV maneuverability was not fully exploited to enhance the covert communication performance. By exploiting their trajectory design along with wireless resource optimization, UAVs have played an important role in wireless covert communications, which hide the UAV communication behavior and protect the UAV from being exposed in various civilian and military applications. So far, a notable research direction is to jointly optimize UAV placement and transmit power with the aim of enhancing the covert communication performance. In [
26], the UAV placement and transmit power were jointly optimized to improve the received signal-to-noise (SNR) at the covert user by using the heuristic approaches. For a single-user scenario, the optimal UAV horizontal location was shown to be on the line segment between the covert user and the warden [
27]. To minimize the probability of UAV exposure, the hovering height and transmit power were jointly optimized [
28]. Moreover, the UAV movements were taken into account, and the system throughput was improved by jointly optimizing the UAV trajectory and transmit power [
29]. However, most of the existing works on the UAV-aided covert communications have focused on the single-user scenario, whereas UAV-aided covert communications with multiple access, including NOMA and RSMA, have rarely been studied [
30]. From the perspective of privacy protections, early stage research on covert communications for the UAV-aided RSMA (UAV-RSMA) systems are urgently demanded.
Figure 1.
Diagram showing research on UAV security and privacy protection techniques (Wang, H.M. 2020 [
16], Hu, J. 2020 [
17], Zhou, X. 2019 [
24], Liang, W. 2020 [
25], Yan, S. 2021 [
26], Zhou, X. 2019 [
29]).
Figure 1.
Diagram showing research on UAV security and privacy protection techniques (Wang, H.M. 2020 [
16], Hu, J. 2020 [
17], Zhou, X. 2019 [
24], Liang, W. 2020 [
25], Yan, S. 2021 [
26], Zhou, X. 2019 [
29]).
As outlined above, the existing works on the security and privacy protections of UAV-aided wireless covert communication systems have mainly focused on single-user scenarios and cannot be applied to wireless multiple access systems. Furthermore, current works on UAV hovering height optimization are confined to the NOMA-based covert communication systems, whose implemented in UAV-RSMA systems is, however, non-trivial. The reason for this issue is that the UAV hovering height is highly coupled with common and private messages, which uniquely belong to the UAV-RSMA systems in contrast to the UAV-NOMA systems. Therefore, it is important to consider covert communications in UAV-RSMA systems. To realize covert communication between the UAV and RSMA users, the common and private messages, transmit power, and hovering height of the UAV need to be jointly optimized. To fully exploit the uncertainties of the common and private messages, transmit power, and UAV hovering height to realize these covert communications, we focus on an air-to-ground UAV-RSMA system and develop an optimal covert communication design. A comparison between the work in paper and the existing related works is summarized in
Table 1. The main contributions of this paper are summarized as follows:
We exploit covert communications in an air-to-ground UAV-RSMA system, where a covert user and a public user can receive the RSMA signal transmitted from the UAV in the presence of a ground warden. The transmit power, common and private messages, and UAV hovering height are jointly utilized as new uncertainty medium to protect the private message transmissions of the covert user.
Subject to the covertness constraint of the UAV-RSMA system and the QoS requirements of the public user, the transmit power allocation, common rate allocation, and UAV hovering height are jointly optimized to maximize the covert rate. To solve the non-convex covert rate maximization problem, we propose an efficient alternating optimization (AO) algorithm to deal with three subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height. The optimal solution to the subproblem of transmit power optimization is elaborately determined in a novel AO manner, the optimal solution to the subproblem of optimizing common rate allocation is derived, and a signomial programming problem is formulated to tackle hovering height optimization.
The simulation results validate the effectiveness of the proposed AO algorithm. By jointly optimizing the UAV hovering height, power allocation, and rate allocation, the simulation results also verify that the proposed UAV-RSMA scheme achieves a higher covert rate than the benchmark schemes.
The rest of the paper is organized as follows. The system model of the air-to-ground UAV-RSMA covert communication system is presented in
Section 2.
Section 3 formulates the covert rate maximization problem and develops the optimization method. The simulation results are presented in
Section 4. The conclusions of this work are given in
Section 5.
3. Joint Optimization of Hovering Height, Power, and Rate Allocation
3.1. Problem Formulation and Parameters Optimization
Subject to the covertness constraint and QoS requirements of the considered UAV-RSMA system, the aim of this work is to maximize Bob’s covert rate (equivalently the achievable rate of Bob) by jointly optimizing the transmit power allocation, common rate allocation, and UAV hovering height. Specifically, the achievable rate of Grace needs to be no less than the target rate
, which represents the QoS requirements of Grace. Then, the problem of maximizing the covert rate can be formulated as:
In problem (P1), (20b) is the constraint on the transmit power allocation factors, (20c) represents the constraint on the common rate allocation factors, (20d) are constraints placed on the common rates of Bob and Grace, respectively, (20e) is the QoS constraint required by Grace, (20f) guarantees the preset covertness level is satisfied, and (20g) is the hovering height constraint.
Obtaining the optimal solution to problem (P1) is extremely challenging. The reason is that the optimization variables in the objective function and non-convex constraints (20d)–(20f) are highly coupled. Consequently, it is impossible to directly solve problem (P1) by jointly optimizing the system parameters. To tackle this challenge, we decouple the covert rate maximization problem (P1) into three subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height and propose an AO algorithm to obtain the optimized system parameters. In the following, the subproblems of optimizing the transmit power allocation, common rate allocation, and UAV hovering height are separately presented.
3.2. Subproblem of Transmit Power Allocation Optimization
By observing the objective function in problem (P1), once
,
, and
H are given, the value of the objective function is only determined by the transmit power allocation, i.e., the variables
,
, and
. Similarly, constraints (20d) and (20e) are determined by the transmit power allocation once
,
and
H are given. Moreover, constraints (20c) and (20g) are independent of the transmit power allocation. Thus, for any given
,
, and
H, the covert rate maximization problem (P1) is reduced to optimize the transmit power allocation only, which can be expressed as follows:
Since , , and are coupled with each other in the objective function and all the constraints, it is challenging to obtain the optimal solution of problem (P2) directly. However, for any given , the optimal solution of and can be determined for problem (P2). As such, for any given and , the optimal can also be determined. Thus, the optimal solution of , , and to problem (P2) can be obtained in the manner of the AO. In the following, we present the corresponding solution optimized from the perspective of the AO.
Proposition 1. The optimal solution to problem (P2) can be achieved only when .
Based on the results in Proposition 1, we have
for any given
. Consequently, constraint (21c) can be simplified as
. For constraint (21c), we have the following observations: (1) The case of
. In this case, Grace’s common rate already satisfies the corresponding QoS requirements. (2) The case of
. In this case, Grace’s common rate cannot satisfy the corresponding QoS requirements. Based on the above observations and taking into account that
is a monotonically increasing function with respect to
with any given
, the optimal
and
can be respectively given by:
and
where
,
, and
. On the other hand, for any given
and
, the optimal
is given by
based on the results of Proposition 1. As a result, the AO approach to obtain the optimal solution to problem (P2) is summarized in Algorithm 1.
Algorithm 1: AO Algorithm of Optimizing Transmit Power |
- 1:
Initialize a feasible and - 2:
repeat - 3:
Given , update and according to ( 22) and ( 23) - 4:
Given and , update according to - 5:
Update - 6:
until
|
3.3. Subproblem of Common Rate Allocation Optimization
By observing the objective function in problem (P1), once
,
,
, and
H are given, the value of the objective function is only determined by the common rate allocation, i.e., the variables
and
. Similarly, constraint (20e) is determined by the common rate allocation once
,
,
, and
H are given. Moreover, constraints (20b), (20d), (20f), and (20g) are independent of the common rate allocation. Thus, for any given
,
,
, and
H, problem (P1) is simplified to optimize the common rate allocation and the reduced problem is given by:
In problem (P3), constraint (24b) can be rewritten as with
. Taking into account that is a monotonically decreasing function with respect to , the optimal solution to problem (P3) can be written as and .
3.4. Subproblem of Hovering Height Optimization
By observing the objective function in problem (P1), once
,
,
,
, and
are given, the value of the objective function is only determined by the hovering height, i.e., the variable
H. Similarly, constraint (20e) is determined by
H once
,
,
,
, and
are given. Moreover, constraints (20b), (20d), (20f), and (20g) are independent of the feasible
H. Thus, for any given
,
,
,
, and
, problem (P1) turns to be the covert rate maximization problem with respect to the hovering height, which is expressed as:
To ensure the corresponding optimization problem feasible, we first rewrite the covert constraint (25d) as follows:
where
is the horizontal distance from the UAV to Willie. Since maximizing
is equivalent to maximizing
and
, respectively, while maximizing
and
are equivalent to maximize the SINR
and
, respectively, the maximum
can be obtained by maximizing
. Note that the covert constraint (25d) has been transformed into a signomial function (
26), and we replace maximization in problem (P4) by minimization, which generates the SP problem as:
To solve the SP problem, the left-hand-side of (
26) needs to be transformed into a posynomial. To this end, we approximate the posyomial denominator
in (
26) by the geometric mean [
34]. Then, the approximation can be written as:
where we have
and
. Through approximating the arithmetic mean by the geometric mean based on the classic arithmetic–geometric mean inequality [
35], the SP problem (P5) is approximated by the following geometric programming problem:
Then, problem (P6) can be solved by using a convex solver such as CVX. The whole procedure of the AO approach is given in Algorithm 2. The convergence of Algorithm 2 is characterized by the following proposition.
Algorithm 2: AO Algorithm of Maximizing the Covert Rate |
- 1:
Initialize the feasible , , and , set - 2:
repeat - 3:
Given and , solve the problem (P2) by Algorithm 1 to obtain
, and - 4:
Given , , and , solve the problem (P3) to obtain and - 5:
Given , compute according to ( 28) - 6:
Given , , and , solve the problem (P6) to obtain - 7:
Update - 8:
until
|
Proposition 2. The developed Algorithm 2 is guaranteed to converge.
In Algorithm 2, the convex optimizations are involved in the iterations. It is noted that the complexity of Algorithm 2 mainly originates from solving the GP problem (P6). Since problem (P6) only contains a single variable, the complexity of solving problem (P6) is characterized by
[
36], where
is the number of iterations of the AO approach.
3.5. Benchmark Scheme
In this section, we investigate the covert performance of the UAV-assisted NOMA (UAV-NOMA) system, where the conventional NOMA is applied for the transmissions from Alice to Bob and Grace [
37,
38]. Based on the assumption of channel ordering
, the SIC decoding order at Bob is
, i.e., decoding
first before decoding
. At Grace,
is decoded by treating the signal related to
as noise. Thus, more transmit power is allocated to transmit
at the UAV to ensure the successful SIC at the receiver [
37,
39], which also provides helps to shield Bob’s covert communications [
38]. Accordingly, the achievable rate of Bob obtained from the transmission of
is given by
, where
with
and
denoting the transmit power allocation factors for
and
, respectively, and satisfying
and
. Furthermore, Bob’s covert rate obtained from the transmission of
can be expressed as
, where
Similarly, the achievable rate of Grace is given by
, where
We assume that Willie also adopts the Neyman–Pearson criterion to make the binary decision in the UAV-NOMA system. By replacing
, where
and
are the transmit power allocation factor defined in the UAV-RSMA system, it is readily shown that the covertness constraint is given by
To maximize Bob’s covert rate, the transmit power allocation and UAV hovering height should be jointly optimized and the corresponding optimization problem is formulated as:
In problem (P7), (34b) is the transmit power allocation constraint, constraint (34c) guarantees the successful SIC at Bob, constraint (34d) represents Grace’s QoS requirements, which can be further written as with . Similarly to the UAV-RSMA system, the joint optimization of the transmit power allocation and UAV hovering height is impossible in the considered UAV-NOMA system. Fortunately, the AO approach can be applied to obtain the optimal with the given H and and . The subproblems of optimizing the transmit power allocation and UAV hovering height are separately presented in the following.
For any given
H, the covert rate maximization problem of optimizing the transmit power allocation can be formulated as:
Proposition 3. Problem (P8) can be optimized only when .
Based on the results in Proposition 3, we let
and transform (35c) equivalently to the form of
with
. Then, problem (P8) can be simplified as:
Since is a monotonically increasing function with respect to , the optimal transmit power allocation in the UAV-NOMA system is given by and .
For any given
and
, problem (P7) reduces to only optimize the UAV hovering height. Similarly to problem (P6), we transform the covert rate maximization problem to a minimization problem as follows:
Now, problem (P10) can be solved by using a convex optimization tool such as CVX. Based on the decoupled problems (P9) and (P10), the optimized system parameters can be obtained in an AO way, and the corresponding algorithm is omitted here to save space.
Compared to the UAV-RSMA scheme, the UAV-NOMA scheme only has two transmit power allocation coefficients and , which results in reduced degrees of freedom (DoF). Consequently, the transmit power can be allocated only between the signals of Bob and Grace, while the SIC processing is conducted only at Bob. On the contrary, the UAV-RSMA scheme achieves a higher DoF than the UAV-NOMA scheme by utilizing rate splitting. The transmit power can be allocated not only between the private messages of Bob and Grace but also between the common and private messages. Accordingly, common rate allocation is conducted between Bob and Grace. With the increased DoF, the covert rate of the UAV-RSMA scheme can be effectively increased compared to the UAV-NOMA scheme, as will be verified by the simulation results in the next section.
4. Simulation Results
In this section, the simulation results are presented to establish the covert performance achieved by the proposed UAV-RSMA scheme. Unless otherwise stated, the following system parameter setup is assumed in the simulations: dB, dBm, m, and m. The horizontal locations of Bob and Grace are set as and , respectively. The horizontal location of the UAV is positioned at such that both Bob has a better LoS channel connecting to the UAV than that of Grace. Since it is hard for the UAV to locate Willie, we consider the worst scenario in which Willie is positioned right below the UAV.
In
Figure 3, the trends of covert rate varying with the UAV’s transmit power are depicted. In the simulations, we set
bps/Hz and
. For comparison purposes, the results achieved by the proposed AO scheme with fixed
H and random
H are presented. In addition, the results achieved by the benchmark scheme are also presented. From
Figure 3, it can be seen that the proposed UAV-RSMA with the AO algorithm achieves the highest covert rate among all the schemes, which verifies the effectiveness of the proposed AO algorithm. Since the UAV-RSMA scheme obtains a higher DoF than the UAV-NOMA scheme by optimizing transmit power and common rate allocations, the covert rate can be significantly improved by applying the UAV-RSMA scheme. At the covert rate level of
bps/Hz, about 5 dBm transmit power gain can be achieved by the proposed scheme. With the increase in
, the covert rates achieved by all the schemes also increase. Moreover, the gap between the covert rates of the UAV-RSMA and UAV-NOMA schemes increases with increasing
, which further verifies the superior covert rate performance of the UAV-RSMA scheme over that of the UAV-NOMA scheme. By adopting the fixed
H and random
H in the proposed AO algorithm, in which only the transmit power and common rate allocations are optimized, the obtained covert rate is smaller than the highest curve of
. For example, at the covert rate level of
bps/Hz, about 7 dBm transmit power gain can be achieved by the AO algorithm with optimizing
H compared to the AO algorithm with the fixed
m. Moreover, the AO algorithm with the random
H achieves a smaller
than the AO algorithm with the fixed
m in the low and middle transmit power regions, whereas a higher
is achieved by the AO algorithm with the random
H than the AO algorithm with fixed
m in the high transmit power region. However, the AO algorithm with optimizing
H obviously achieves a higher
than the AO algorithms with the fixed
H and random
H. Thus, the importance of optimizing the UAV hovering height is verified by the results in
Figure 3. For the considered benchmark scheme, the achieved covert rate is much lower than that of the UAV-RSMA scheme, which establishes the superior covert performance of the proposed UAV-RSMA scheme.
In
Figure 4, the covert rate versus the covertness parameter
is investigated. For the simulations corresponding to
Figure 4, we set
dBm and
bps/Hz unless otherwise stated. The results in
Figure 4 show that the covert rate achieved by all the schemes increase monotonically with the increasing
. Since a larger
represents a smaller detection error probability, a looser covert constraint results in a larger
. Moreover, the proposed UAV-RSMA with the AO algorithm achieves the largest
among all the schemes. The reason for this phenomenon is that the UAV-RSMA scheme obtains the additional DoF by optimizing not only the transmit power allocation among common and private messages but also the common rate allocation between Bob and Grace compared to that of the UAV-NOMA scheme. Although the covert rates achieved by the AO algorithms with the fixed
H and random
H increase with the increasing
, the corresponding
is smaller than that of the AO algorithm with optimizing
H. For example, at the covertness level of
, which is a typical covertness requirement in practice, the covert rate achieved by the AO algorithm with the optimizing
H is 1 bps/Hz larger than that of the random
H and 0.5 bps/Hz larger than that of the fixed
m. Thus, the results in
Figure 4 verify that the covert rate performance in the case of not optimizing the UAV hovering height suffers a decrease compared to the optimized
H in the considered
region. Furthermore, the superiority of the proposed scheme over that of the benchmark scheme is also verified by the curves in
Figure 4. As can be seen from
Figure 4, although the covert rates achieved by the UAV-NOMA scheme increase with the increasing
, the values of
are much smaller than those of the UAV-RSMA schemes. For example, at the covertness level of
, the covert rate achieved by the UAV-RSMA scheme with the AO algorithm is 3.5 bps/Hz larger than that of the UAV-NOMA scheme with the AO algorithm. In the cases of fixed
m and random
H, the covert rates achieved by the UAV-RSMA scheme are 3.5 bps/Hz and 3 bps/Hz larger than those achieved by the UAV-NOMA scheme, respectively. In addition, the results in
Figure 4 show that with the fixed
H and random
H, the covert rates achieved by the UAV-NOMA scheme is decreased compared to that achieved by the UAV-NOMA with optimizing
H, which also verifies that the optimization of the UAV hovering height is important to enhance the covert rate performance.
To further reveal the impacts of the hovering height of the UAV on the covert rate, we plot the covert rate versus hovering height in
Figure 5. In the simulations, we set
dBm and
bps/Hz. The curves in
Figure 5 show that the covert rates achieved by all the schemes first increase with the increase in the hovering height. Then, the covert rates decrease with the increase in the hovering height after
H exceeds a certain value. In the low
H region, the covert communication performance is greatly limited by the detection of Willie, such that a lower
H results in a smaller covert rate and a higher
H corresponds to a larger covert rate. On the other hand, with the increase in
H, more transmit power is needed to guarantee the Qos requirements of the public user, which results in a reduced transmit power for the covert user such that the covert rate is decreased. In the high
H region, we can see that the covert rates achieved with different
tend to be the same. The reason for this phenomenon is that an extremely high
H results in a very small detection probability at Willie, so that the covert constraint (33) does not affect the achievable covert rate. Moreover, the curves in
Figure 5 also show that a smaller
results in a smaller covert rate and vice verse. Also, the results in
Figure 5 verify that the UAV-RSMA scheme achieves a larger covert rate than the UAV-NOAM scheme.
The impacts of Grace’s QoS requirements on the covert rate are depicted in
Figure 6, where we set
dBm,
bps/Hz, and
. It is shown in
Figure 6 that the covert rates achieved by all the schemes decrease monotonically with increasing
. Moreover, the covert rate achieved by the proposed UAV-RSMA scheme with the AO algorithm is the highest among all the schemes, which is also no less than those of the benchmark schemes even in the high
region. At the level of
bps/Hz, the covert rate achieved by the UAV-RSMA scheme with optimizing
H is 2.2 bps/Hz higher than the UAV-RSMA scheme with the fixed
H and 3 bps/Hz higher than the UAV-RSMA scheme with the random
H. These results verify that jointly optimizing the transmit power allocation, common rate allocation, and hovering height is necessary to improve the covert rate. Also, the effectiveness of the proposed AO algorithm is verified. Compared to the covert rate achieved by the UAV-NOMA scheme with the AO algorithm, the covert rate achieved by the UAV-RSMA scheme with the AO algrithm is 3.6 bps/Hz higher at the level of
bps/Hz, which also verifies that the proposed UAV-RSMA scheme achieves a better covert rate performance than the UAV-NOMA scheme.