Next Article in Journal
Robust Control for UAV Close Formation Using LADRC via Sine-Powered Pigeon-Inspired Optimization
Next Article in Special Issue
A Multi-Subsampling Self-Attention Network for Unmanned Aerial Vehicle-to-Ground Automatic Modulation Recognition System
Previous Article in Journal
Scalable and Cooperative Deep Reinforcement Learning Approaches for Multi-UAV Systems: A Systematic Review
Previous Article in Special Issue
Multi-UAV Trajectory Planning during Cooperative Tracking Based on a Fusion Algorithm Integrating MPC and Standoff
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Communication

Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
China Academy of Launch Vehicle Technology, Beijing 100076, China
*
Authors to whom correspondence should be addressed.
Drones 2023, 7(4), 237; https://doi.org/10.3390/drones7040237
Submission received: 6 March 2023 / Revised: 24 March 2023 / Accepted: 27 March 2023 / Published: 28 March 2023
(This article belongs to the Special Issue UAV-Assisted Intelligent Vehicular Networks)

Abstract

:
With the explosive increase in demand for wireless communication, the issue of wireless communication security has also become a growing concern. In this paper, we investigate a novel covert communication for unmanned aerial vehicle (UAV)-assisted uplink rate-splitting multiple access (RSMA) systems, where a UAV adopts the rate-splitting (RS) strategy to increase the total transmission rate while avoiding deteriorating the covert transmission of a ground user. In the proposed system, a ground user and a UAV adopt the RSMA scheme to simultaneously communicate with a base station surveilled by an evil monitor. The UAV acts as both the transmitter and the friendly jammer to cover the ground user’s transmission with random power. To maximize the expected sum rate (ESR), we first study the RS strategy and obtain the optimal power allocation factor. Then, the closed-form of minimum detection error probability (DEP), ESR, and optimal target rate of the UAV are derived. Constrained by the minimum DEP and expected covert rate (ECR), we maximize the ESR by optimizing the position and target rate of the UAV. Numerical results show that the proposed scheme outperforms the traditional NOMA systems in terms of ESR with the same DEP and ECR.

1. Introduction

The rapid development of intelligent wireless terminals promotes a large amount of wireless private information, bringing broader attention to information security. The study of communication security at the physical layer has been segregated into two directions, namely physical layer security (PLS) [1,2] and covert communications [3,4]. The purpose of PLS is to ensure that the transmitted information is not intercepted by eavesdroppers, i.e., protecting the transmitted content. However, it’s not always sufficient to focus solely on protecting information security, as the exposure of communication behavior can also pose potential risks and threats. For example, the exposure of the signal transmission would disclose the existence and position of a device to an adversary, ultimately resulting in an attack on the device. Different from PLS, covert communications focus on shielding the transmission behavior from potential watchful adversaries. Bash et al. initiated covert communication research and proposed a square root law as the fundamental limit in the additive white Gaussian noise (AWGN) channels [3]. In [4], the authors proved that it is possible to transmit O ( n ) bits covertly and reliably in n uses of AWGN channel when the monitor has uncertainty about the received power.
With the growing number of connected devices and increasing data traffic, there is a need for more efficient and effective ways to manage the available resources. Non-orthogonal multiple access (NOMA) is a promising technique that offers improvements over conventional orthogonal multiple access techniques in terms of spectral efficiency [5,6]. In [7], the PLS in NOMA systems assisted with a HAP and UAVs was studied. Rate-splitting multiple access (RSMA), which can further increase the sum rate, has recently emerged as a more general and robust transmission framework compared to NOMA [8,9,10,11,12]. In particular, the performances of uplink RSMA systems were studied in [10,11]. In [10], the authors investigated a rate-splitting (RS) strategy in uplink cognitive radio systems, where a secondary user splits its rate to guarantee the primary user’s transmission. In [11], the optimal decoding order and maximum sum rate in uplink RSMA systems were studied. To protect the privacy information, the authors in [13] studied the security and energy efficiency of the cognitive RSMA-based satellite-terrestrial networks, where a beamforming scheme was proposed to prevent eavesdropping and increase energy efficiency.
Covert communications in NOMA systems have also been widely studied [14,15]. The author in [14] achieved covert communication in an uplink NOMA system via random power jamming generated by channel inversion power control. The study in [15] explored an intelligent reflecting surface (IRS)-assisted covert communication in both downlink and uplink NOMA systems. The randomness was brought about by the phase-shift uncertainty of IRS and the overlapping signal transmission. In addition, unmanned aerial vehicles (UAVs) have been used by virtue of their high mobility, which provides new degrees of freedom to enhance the covertness of communications [16,17]. In [16], the optimal transmit power and location for the UAV were studied to achieve covert communications. In [17], the authors used the geometric method to solve the trajectory problem. Most recently, covert communication in UAV-aided NOMA systems was investigated in [18].
To further increase the sum rate, we investigate covert communication in UAV-assisted uplink RSMA systems in this paper. In this system, a ground user and a UAV simultaneously communicate with a base station (BS), suffering the surveillance of an evil monitor. The UAV acts as both the transmitter and the friendly jammer, covering the ground user’s transmission with random power. This work aims to maximize the expected sum rate (ESR) by designing the UAV’s power allocation, position, and target rate while guaranteeing the ground user’s covertness and throughput. The main contributions of this paper are given as follows.
  • We investigate a novel application of RSMA systems, where a UAV splits its rate to avoid deteriorating the covert transmission of a ground user while increasing the ESR. To the best of the authors’ knowledge, this is the first work that studied the covet communication in UAV-assisted uplink RSMA system.
  • We derive the closed-form expressions of the ESR and obtain the optimal target rate of UAV which maximizes the ESR of the system. Subjected to minimum detection error probability (DEP) and expected covert rate (ECR) constraints, a joint position and target rate optimization problem is formulated for maximizing the ESR of uplink RSMA systems.
  • The numerical results show that the proposed scheme outperforms NOMA systems in terms of ESR with the same DEP and ECR and illustrate the effect of constraints on the ESR.

2. System Model

2.1. Communication Scenario

We consider the covert communication in uplink RSMA system, which consists of a pair of RSMA users (U1 and U2), a BS, and a warden (Willie), as shown in Figure 1. U1 is a UAV deployed as both the communication node and the friendly jammer hovering at the constant altitude z 1 . U2 wants to transmit covertly detected by Willie, who continuously senses whether U2 is transmitting by a radiometer. In order to increase the total transmission rate while protecting U2’s covert communication, U1 adopts the RS strategy with random transmit power. Without loss of generality, we use a three-dimensional (3D) Cartesian coordinate system to describe locations. Each node is equipped with a single antenna.
Denote q 1 = [ x 1 , y 1 , z 1 ] , q 2 = [ x 2 , y 2 , 0 ] , q b = [ 0 , 0 , z b ] , and q w = [ x w , y w , 0 ] as the coordinate of U1, U2, BS and Willie, respectively. Considering an open area, the communication channel between BS and U2 is modeled as line-of-sight (LOS) links and AWGN channels. This assumption is based on the fact that in the urban macro, the probability of the LOS path is much higher than that of the non-LOS path when the horizontal distance between BS and terminals is less than 70 m according to 3GPP specification [19]. In addition, we assume that the channels between UAV and terrestrial nodes are mainly dominated by LOS components and the non-LOS path is negligible (as in e.g., [16,17,20]). U2 and Willie are ground users and the channel undergoes the block quasi-static fading, which means that the channel coefficients remain constant in one time slot, and change independently from one time slot to another. The large-scale fading coefficient from node i to node j is denoted as L i j = β 0 q i q j β , where i { 1 , 2 } , j { b , w } , β 0 is the fading coefficient at the reference distance of 1 m, β = 2 is the free space path-loss factor, and · denotes the Euclidean norm. And the small-scale fading between U2 and Willie r 2 w follows complex Gaussian distribution CN ( 0 , 1 ) . Therefore, the channel coefficient is denoted as
h i j = L i j , i j { 1 w , 1 b , 2 b } , L i j r 2 w , i j = 2 w .
And the channel power gain is expressed by g i j = | h i j | 2 . Suppose the location information is available for all nodes since Willie’s location can be detected with a radar or camera by U1. This assumption has been also widely adopted in previous research on UAV-assisted covert communication [16,17,20]. In addition, we assume that full channel state information (CSI) is available for Willie, while legitimate users only possess statistical CSI between U2 and Willie.

2.2. Proposed Transmission Scheme

U1 adopts the RS strategy with random transmit power to assist U2’s covert and reliable transmission. U2 conveys secret messages at a fixed rate and probability of 0.5 , while U1 transmits public information. To confuse Willie’s detection, U1 adopts the random transmit power. Furthermore, U1 shares the same resource block with U2 while preventing U2’s outage probability from deteriorating through an RS strategy.
Denoting P i , s i , and R ^ i as the transmit power, messages, and target rate of Ui, respectively. For simplicity, we adopt μ i to represent 2 R ^ i 1 . U2 transmits with a fixed power P 2 and rate R ^ 2 . Then, the interference threshold of U1 is given by
τ = g 2 b P 2 μ 2 σ b 2 ,
where σ b 2 represents the received noise power at BS. When the interference received by U2 is lower than τ , there is no outage. Conversely, U2’s connection is always interrupted when the interference is large than τ . Note that to ensure τ 0 , we have μ 2 g 2 b P 2 σ b 2 .
To enhance the covertness of U2’s transmission, P 1 changes from slot to slot, following a continuous uniform distribution within [ P 1 min , P 1 max ] . The probability density function of P 1 is given by
f P 1 ( x ) = 1 P 1 max P 1 min , if P 1 min x P 1 max , 0 , otherwise .
In order to obfuscate Willie’s detection and transmit more information, U1 continuously sends messages to BS. The random transmit power of U1 is designed to create ambiguity in Willie’s received power. Consequently, it becomes challenging for Willie to determine whether the increase in received power is due to U2‘s transmission or simply a variation in U1’s transmit power.
To increase the total throughput without causing interruptions to U2, U1 applies RS in each time slot. In uplink RSMA systems, U1 needs to split its messages s 1 into two parts s 11 and s 12 , as shown in Figure 2a. Note that Figure 2a depicts only one possible splitting scheme. There are also alternative approaches that can be considered. And the received signals at node j can be expressed as
y j [ n ] = P 1 h 1 j ( α s 11 [ n ] + 1 α s 12 [ n ] ) + n j [ n ] , H 0 , P 1 h 1 j ( α s 11 [ n ] + 1 α s 12 [ n ] ) + P 2 h 2 j s 2 [ n ] + n j [ n ] , H 1 ,
where n = 1 . . . N is the index of channel use, n j [ n ] is the received AWGN at j with the variance of σ j 2 , and α is the power allocation factor satisfying 0 α 1 . The hypotheses H 1 and H 0 represent the existence and non-existence of U2’s secret transmission, respectively. It is assumed that s k , k { 1 , 2 , 11 , 12 } , is independently coded with the Gaussian codebook satisfying E { s k [ n ] s k * [ n ] } = 1 , where E { · } and ( · ) * represent the expectation and conjugate transpose operators, respectively.
The decoding order for uplink RSMA is s 11 s 2 s 12 [11]. Thus, the signal-to-interference-plus-noise ratios (SINRs) for BS decoding s 11 , s 2 , and s 12 are given by γ 11 = α g 1 b P 1 g 2 b P 2 + ( 1 α ) g 1 b P 1 + σ b 2 , γ 2 = g 2 b P 2 ( 1 α ) g 1 b P 1 + σ b 2 , and γ 12 = ( 1 α ) g 1 b P 1 σ b 2 , respectively. Correspondingly, the achievable rates of s 11 , s 2 , and s 12 are expressed as R 11 = log 2 ( 1 + γ 11 ) , R 2 = log 2 ( 1 + γ 2 ) and R 12 = log 2 ( 1 + γ 12 ) , respectively.
To maximize the sum rate for the RS strategy, U1 needs to allocate the maximum possible power to s 12 . As per γ 12 , s 12 is free from interference, hence allocating power to s 12 would be more efficient compared to s 11 . Considering that the interference received by U2 should be no large than τ to keep U2 uninterrupted, we have ( 1 α ) g 1 b P 1 τ . Obviously, the allowed maximum power of s 12 is τ / g 1 b with α = 1 τ g 1 b P 1 . Meanwhile, U2’s messages are not supposed to be decoded firstly for covertness, which results in α P 1 0 , i.e., P 1 τ / g 1 b . The target rates of s 12 and s 11 are set as R ^ 12 = log 2 ( 1 + τ σ b 2 ) and R ^ 11 = R ^ 1 R ^ 12 , respectively. The power allocation scheme and decoding order are shown in Figure 2b.

2.3. Detection Metrics at Willie

Willie tries to make a decision whether U2 is transmitting or not based on the received signals y w [ n ] . From the independent and identically distributed (i.i.d.) nature of Willie’s received signals, the distribution of y w [ n ] is expressed as
CN ( 0 , g 1 w P 1 + σ w 2 ) , H 0 , CN ( 0 , g 1 w P 1 + g 2 w P 2 + σ w 2 ) , H 1 .
According to the Neyman-Pearson criterion, the optimal decision rule at Willie is the likelihood ratio test (LRT) [14,15], which can be shown as a radiometer
T w D 1 D 0 λ ,
where T w = 1 N n = 1 N | y w [ n ] | 2 is the average power received at Willie in a time slot, λ is the detection threshold of Willie, D 1 and D 0 are the binary decisions for the hypotheses H 0 and H 1 , respectively. Considering a long observation of Willie, i.e., N , and employing the strong law of large numbers, i.e., X 2 N 2 / N 1 , T w is given by
T w = lim N ( g 1 w P 1 + σ w 2 ) X 2 N 2 / N , H 0 , ( g 1 w P 1 + g 2 w P 2 + σ w 2 ) X 2 N 2 / N , H 1 , = g 1 w P 1 + σ w 2 , H 0 , g 1 w P 1 + g 2 w P 2 + σ w 2 , H 1 .
The detection performance is measured by the DEP, which is denoted as
P E P FA + P MD ,
where P FA = P { T w > λ | H 0 } is the false alarm probability (FAP), P MD = P { T w < λ | H 1 } is the miss detection probability (MDP), P { · } denotes probability operation and the prior probabilities of hypotheses H 0 and H 1 are assumed to be equal, i.e., P ( H 0 ) = P ( H 1 ) = 1 / 2 .

3. Performance Analysis

In this section, we analyze the performances of the covertness and sum rate in the proposed system.

3.1. Covertness Analysis

Similar to the proof in [21], the FAP and DEP are given by
P FA = 1 , λ σ w 2 g 1 w < P 1 min , g 1 w P 1 max + σ w 2 λ g 1 w ( P 1 max P 1 min ) , P 1 min λ σ w 2 g 1 w P 1 max , 0 , λ σ w 2 g 1 w > P 1 max ,
P MD = 0 , λ σ w 2 g 1 w < ρ 1 , λ g 1 w P 1 min g 2 w P 2 σ w 2 g 1 w ( P 1 max P 1 min ) , ρ 1 λ σ w 2 g 1 w ρ 2 , 1 , λ σ w 2 g 1 w > ρ 2 ,
where ρ 1 = P 1 min + g 2 w g 1 w P 2 , ρ 2 = P 1 max + g 2 w g 1 w P 2 . Then, the DEP at Willie is given by
P E = 1 , λ σ w 2 g 1 w < P 1 min , g 1 w P 1 max + σ w 2 λ g 1 w ( P 1 max P 1 min ) , P 1 min λ σ w 2 g 1 w < ρ 1 , 1 g 2 w P 2 g 1 w ( P 1 max P 1 min ) , ρ 1 λ σ w 2 g 1 w P 1 max , λ g 1 w P 1 min g 2 w P 2 σ w 2 g 1 w ( P 1 max P 1 min ) , P 1 max < λ σ w 2 g 1 w ρ 2 , 1 , λ σ w 2 g 1 w > ρ 2 .
Note that the condition g 1 w ( P 1 max P 1 min ) g 2 w P 2 needs to be satisfied; otherwise, Willie has zero probability of making detection errors.
According to the monotonicity of (11), the minimum DEP is given by
P E = 1 g 2 w P 2 g 1 w ( P 1 max P 1 min ) ,
and the corresponding detection threshold satisfies ρ 1 λ σ w 2 g 1 w P 1 max . Since legitimate users don’t have instantaneous CSI between Willie and U2, we consider the expected minimum DEP P E ¯ over all possible realization of h 2 w as the measurement of covertness from the perspective of legitimate users. P E ¯ is given by
P E ¯ = 0 g 1 w ( P 1 max P 1 min ) P 2 P E f g 2 w ( x ) d x = 0 g 1 w ( P 1 max P 1 min ) P 2 1 x P 2 g 1 w ( P 1 max P 1 min ) 1 L 2 w e x L 2 w d x = 1 + L 2 w P 2 g 1 w ( P 1 max P 1 min ) e g 1 w ( P 1 max P 1 min ) L 2 w P 2 1 ,
where f g 2 w ( x ) is the probability density function of g 2 w .
The results indicate that as the variation interval of P 1 increases, there is a corresponding rise in DEP, leading to a larger value of R ^ 2 . In addition, U1 can modify its channel to Willie by repositioning to meet the covertness requirement.

3.2. Sum Rate Analysis

In the proposed scheme, the power allocation for s 12 is designed to prevent connection outages during the decoding of both s 2 and s 12 . However, an outage may still occur during the decoding of s 11 due to the randomness of P 1 . Therefore, the outage probability of the system is determined by that of decoding s 11 . We respectively analyze the outage probabilities and ESR under H 0 and H 1 in the following.
(1)
Under H 1
The achievable rate under H 1 of s 11 is given by
R 11 1 = log 2 1 + g 1 b P 1 τ g 2 b P 2 + τ + σ b 2 .
Thus, the outage probability of s 11 under H 1 is expressed as
O 11 1 = P { R 11 1 < R ^ 11 } = P P 1 < μ 11 ( g 2 b P 2 + τ + σ b 2 ) + τ g 1 b = max μ 11 ( g 2 b P 2 + τ + σ b 2 ) + τ g 1 b P 1 min g 1 b ( P 1 max P 1 min ) , 0 ,
where μ 11 = 2 R ^ 11 1 . Eventually, the ESR under H 1 is given by
R ¯ sum 1 = ( R ^ 11 + R ^ 2 + R ^ 12 ) ( 1 O 11 1 ) .
(2)
Under H 0
Similarly, the achievable rate under H 0 of s 11 is given by
R 11 1 = log 2 1 + g 1 b P 1 τ τ + σ b 2 .
And the outage probability of s 11 under H 0 is expressed as
O 11 0 = P { R 11 0 < R ^ 11 } = P P 1 < μ 11 ( τ + σ b 2 ) + τ g 1 b = max μ 11 ( τ + σ b 2 ) + τ g 1 b P 1 min g 1 b ( P 1 max P 1 min ) , 0 .
Since fixed power is allocated to s 12 to satisfy R ^ 12 , P { R 11 0 < R ^ 11 } = P { R 1 0 < R ^ 1 } . The ESR under H 0 is given by
R ¯ sum 0 = ( R ^ 11 + R ^ 12 ) ( 1 O 11 0 ) .
Finally, the ESR of the system is expressed as
R ¯ sum = 1 2 R ¯ sum 0 + R ¯ sum 1 f a b 2 R ^ 11 R ^ 11 c 2 R ^ 11 + d ,
where a = 2 g 1 b P 1 max + g 2 b P 2 + 2 σ b 2 , b = g 2 b P 2 + 2 τ + 2 σ b 2 , c = ( 2 R ^ 12 + R ^ 2 ) ( τ + σ b 2 ) + ( R ^ 12 + R ^ 2 ) g 2 b P 2 , d = ( 2 R ^ 12 + R ^ 2 ) ( g 1 b P 1 max + σ b 2 ) + ( R ^ 12 + R ^ 2 ) g 2 b P 2 , and f = 1 2 g 1 b ( P 1 max P 1 min ) . Component 1 / 2 is due to P ( H 0 ) = P ( H 1 ) = 1 / 2 . Equation (20) demonstrates that as R ^ 11 increases, the outage probabilities also increase, whereas the change in ESR is uncertain. Therefore, to maximize ESR, it is necessary to consider how to set R ^ 11 .
Lemma 1. 
The optimal R ^ 11 to maximize the ESR is given by
R ^ 11 = max 0 , log 2 e W a e 2 c / b ) b 1 c b ,
where e is Euler’s number, and W ( · ) denotes Lambert W Function [22]. The corresponding R ¯ sum is denoted as R ¯ sum ( R ^ 11 ) .
Proof. 
See Appendix A. □
We notice that as g 1 w increases, R ^ 11 increases, resulting in a higher ESR. Therefore, ESR can be increased by placing U1 closer to the BS.

4. Optimization Problem

In this letter, we aim to maximize the ESR by optimizing the deployment of U1 and the target rate of s 11 , subject to the covertness constraint and the ECR constraint. The optimization problem is formulated as
max x 1 , y 1 , R ^ 11 R ¯ sum ,
s . t . P E ¯ 1 δ ,
R ¯ 2 = R ^ 2 ( 1 O 11 1 ) ϵ ,
where (22b) is the covertness constraint, and (22c) is the ECR constraint. To solve the optimization problem (Section 4), we decompose it into two subproblems, as shown in Figure 3. We first discuss the monotonicity of R ¯ sum , P E ¯ , and R ¯ 2 w.r.t. x 1 and y 1 . We observe that as the distance between U1 and Bob, i.e., q 1 q b , decreases, both R ¯ sum and R ¯ 2 increases. On the other hand, P E ¯ decreases since U1 gets farther away from Willie. Then, the first subproblem is to optimize the placement of U1 under the covertness constraint (22b) to minimize the distance between U1 and Bob. The second subproblem is to optimize R ^ 11 under the ECR constraint (22c) and U1’s optimal placement obtained from the first subproblem to maximize the ESR.
The first subproblem to optimize U1’s placement is expressed as
min x 1 , y 1 x 1 2 + y 1 2 ,
s . t . ( x 1 x w ) 2 + ( y 1 y w ) 2 t ,
t = δ β 0 ( P 1 max P 1 min ) g 2 w P 2 1 + W e 1 / δ δ z 1 2 .
Lemma 2. 
The optimal position of U1 is given by q 1 = [ x 1 , y 1 , z 1 ] when 0 < t < x w 2 + y w 2 , where [ x 1 , y 1 ] = 1 t x w 2 + y w 2 [ x w , y w ] , otherwise, x 1 = y 1 = 0 , when t x w 2 + y w 2 .
Proof. 
See Appendix B. □
From Lemma 2, we notice that the optimal horizontal position of U1 lies on the line between BS and Willie.
The second subproblem to optimize R ^ 11 is expressed as
max R ^ 11 R ¯ sum ( x 1 , y 1 ) ,
s . t . O 11 ( x 1 , y 1 ) 1 ϵ R ^ 2 ,
where R ¯ sum ( x 1 , y 1 ) and O 11 ( x 1 , y 1 ) represent substituting ( x 1 , y 1 ) into R ¯ sum and O 11 , respectively. It is shown in (18) that O 11 is a monotonically increasing function w.r.t. R ^ 11 . Thus, the upper limit of R ^ 11 is expressed as R ^ 11 ϵ , where R ^ 11 ϵ is the solution of O 11 ( x 1 , y 1 ) = 1 ϵ R ^ 2 . Together with Lemma 1, the optimal choice of R ^ 11 is given by R ^ 11 = min { R ^ 11 ϵ , R ^ 11 } .

5. Numerical Results

In this section, we present numerical results to investigate the performance of the proposed covert communication scheme. Unless otherwise stated, we set β 0 = 20 dB, q b = [ 0 , 0 , 10 ] m, q w = [ 0 , 100 , 0 ] m, q 2 = [ 50 , 50 , 0 ] m, z 1 = 25 m, P 1 max = 10 W, P 1 min = 1 W, P 2 = 2 W, σ b 2 = σ w 2 = 60 dBm. In this section, we compared the proposed method with NOMA systems, which can be regarded as a special case of RSMA where all power is allocated to s 11 .
Figure 4 shows the maximum ESR versus the expected minimum DEP with different ECR constraints in RSMA and NOMA systems, where R ^ 2 = 3 bpcu. We observe that the curves remain stable initially, but decrease as the expected minimum DEP increases. When the covertness constraint is loose ( t x w 2 + t w 2 ), the placement of U1 remains unchanged at x 1 = y 1 = 0 . As the covertness constraint increases, U1 moves closer to Willie while moving further from the BS, thereby leading to a decrement in ESR. Additionally, a higher ECR constraint results in a lower ESR, implying that O 11 1 is not zero at the maximum ESR. Moreover, the proposed scheme has a higher ESR than NOMA with the same minimum DEP.
Figure 5 depicts O 11 1 of R ^ 11 versus R ^ 2 for different covertness constraints in RSMA and NOMA systems. In this case, we do not consider the ESR constraint. We find that NOMA has a higher outage probability than RSMA to maximize the ESR. Moreover, as R ^ 2 increases, the O 11 1 of RSMA increases, while that of NOMA decreases. When τ = 0 (i.e., at maximum R ^ 2 ), the O 11 1 of both systems are equal. In NOMA systems, fixed power is allocated to s 11 ( α = 1 ). As R ^ 2 increases, decreasing O 11 1 to increase R ¯ 2 will result in a larger ESR. In RSMA systems, with the increment of R ^ 2 , more power is allocated to s 11 , and more outages can be tolerated to increase the ESR.
Figure 6 plots the maximum ESR versus R ^ 2 for different covertness constraints, where ϵ = 0.8 R ^ 2 . Similar to Figure 5, we observe that the maximum ESR of RSMA increases while that of NOMA decreases as R ^ 2 increases. Specifically, when the covertness constraint is looser, RSMA achieves a higher O 11 1 and ESR compared to NOMA. This can be attributed to the fact that the channel gain between the BS and U1 is stronger. The stronger channel gain results in R 1 playing a more crucial role in determining ESR, thus leading to an increase in O 11 1 .

6. Conclusions

In this paper, we investigated the covert communication in UAV-assisted uplink RSMA system, where U1 adopts an RS strategy with random transmit power to guarantee U2’s covert and reliable transmission. Specially, we studied the optimal power allocation factor for s 11 and s 12 . Then, we derived closed-form expressions of minimum DEP, ESR, and UAV’s optimal target rate that maximizes ESR. Constrained by the minimum DEP and ECR, we maximized the ESR by optimizing the position and target rate of the UAV. Numerical results showed that the proposed scheme outperforms NOMA systems in terms of the ESR constraint by the same DEP and ECR.

Author Contributions

Conceptualization, Z.D. and X.Y.; methodology, Z.D.; software, Z.D.; validation, Z.D.; formal analysis, Z.D.; investigation, Z.D.; data curation, Z.D.; writing—original draft preparation, Z.D.; writing—review and editing, Z.D, X.Y. and L.W.; visualization, Z.D.; supervision, X.Y.; project administration, L.W. and T.Z.; funding acquisition, L.W., T.Z. and X.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant No. 62271412, 62271399, and partly supported by Natural Science Basic Research Plan in Shaanxi Province of China under grant No. 2022KJXX-39.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PLSPhysical layer security
AWGNAdditive white Gaussian noise
UAVUnmanned aerial vehicle
RSMARate-splitting multiple access
NOMANon-orthogonal multiple access
RSRate-splitting
BSBase station
ESRExpected sum rate
DEPDetection error probability
3DThree-dimensional
CSIChannel state information
LOSLine-of-sight
SINRSignal-to-interference-plus-noise ratio
LRTLikelihood ratio test
FAPFalse alarm probability
MDPMiss detection probability
KKTKarush–Kuhn–Tucker

Appendix A. Proof of Lemma 1

Taking the derivative of (20) w.r.t. R ^ 11 yields
R ¯ sum R ^ 11 = f a b + ( c + b R ^ 11 ) log e 2 2 R ^ 11 .
By setting R ¯ sum R ^ 11 = 0 , we have
a b + ( c + b R ^ 11 ) log e 2 2 R ^ 11 = 0 1 + c b + R ^ 11 log e 2 e 1 + c b + R ^ 11 log e 2 = a e 2 c / b b .
According to the definition of Lambert W Function, i.e., x = W ( ν ) is the solution of x e x = ν ( ν 0 ) , (A2) can be rephrased as
1 + c b + R ^ 11 log e 2 = W a e 2 c / b b R ^ 11 = log 2 e W a e 2 c / b b 1 c b .
It is obviously that R ¯ sum is a concave function since (A1) is monotonically decreasing w.r.t R ^ 11 . Therefore, the solution of (A3) is a maximum point. In addition, R ^ 11 should be no less than 0, which completes the proof.

Appendix B. Proof of Lemma 2

The Lagrangian of this problem is
L ( x 1 , y 1 , κ ) = x 1 2 + y 1 2 + κ [ ( x 1 x w ) 2 + ( y 1 y w ) 2 t ] .
Taking the derivative of L w.r.t to x 1 and y 1 obtains the Karush–Kuhn–Tucker (KKT) conditions
2 x 1 + 2 κ ( x 1 x w ) = 0 ,
2 y 1 + 2 κ ( y 1 y w ) = 0 ,
κ [ ( x 1 x w ) 2 + ( y 1 y w ) 2 t ] = 0 ,
( x 1 x w ) 2 + ( y 1 y w ) 2 t
κ 0 .
When κ = 0 , it’s obvious that x 1 = y 1 = 0 . Meanwhile, to satisfy (A5d), one obtains t x w 2 + y w 2 .
When κ > 0 , after some manipulations, we have x 1 = κ x w 1 + κ , y 1 = κ y w 1 + κ , κ = 1 + x w 2 + y w 2 t , and 0 < t < x w 2 + y w 2 . The proof is completed.

References

  1. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China-Inf. Sci. 2022, 65, 1–16. [Google Scholar] [CrossRef]
  2. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.P.; Al-Dhahir, N. Secrecy-Energy Efficient Hybrid Beamforming for Satellite-Terrestrial Integrated Networks. IEEE Trans. Commun. 2021, 69, 6345–6360. [Google Scholar] [CrossRef]
  3. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Top. Signal Process. 2013, 31, 1921–1930. [Google Scholar] [CrossRef] [Green Version]
  4. Sobers, T.V.; Bash, B.A.; Guha, S.; Towsley, D.; Goeckel, D. Covert Communication in the Presence of an Uninformed Jammer. IEEE Trans. Wirel. Commun. 2017, 16, 6193–6206. [Google Scholar] [CrossRef]
  5. Wang, D.; Zhou, F.; Lin, W.; Ding, Z.; Al-Dhahir, N. Cooperative Hybrid Non-orthogonal Multiple Access-Based Mobile-Edge Computing in Cognitive Radio Networks. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 1104–1117. [Google Scholar] [CrossRef]
  6. Lin, Z.; Lin, M.; Wang, J.B.; de Cola, T.; Wang, J. Joint Beamforming and Power Allocation for Satellite-Terrestrial Integrated Networks with Non-Orthogonal Multiple Access. IEEE J. Sel. Top. Signal Process. 2019, 13, 657–670. [Google Scholar] [CrossRef] [Green Version]
  7. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs Collaboration Framework for Uplink Secure Rate Maximization in NOMA-Enabled IoT Networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  8. Zhou, G.; Mao, Y.; Clerckx, B. Rate-Splitting Multiple Access for Multi-Antenna Downlink Communication Systems: Spectral and Energy Efficiency Tradeoff. IEEE Trans. Wirel. Commun. 2022, 21, 4816–4828. [Google Scholar] [CrossRef]
  9. Li, X.; Fan, Y.; Yao, R.; Wang, P.; Qi, N.; Miridakis, N.I.; Tsiftsis, T.A. Rate-Splitting Multiple Access-Enabled Security Analysis in Cognitive Satellite Terrestrial Networks. IEEE Trans. Veh. Technol. 2022, 71, 11756–11771. [Google Scholar] [CrossRef]
  10. Liu, H.; Bai, Z.; Lei, H.; Pan, G.; Kim, K.J.; Tsiftsis, T.A. A New Rate Splitting Strategy for Uplink CR-NOMA Systems. IEEE Trans. Veh. Technol. 2022, 71, 7947–7951. [Google Scholar] [CrossRef]
  11. Yang, Z.; Chen, M.; Saad, W.; Xu, W.; Shikh-Bahaei, M. Sum-Rate Maximization of Uplink Rate Splitting Multiple Access (RSMA) Communication. IEEE. Trans. Mob. Comput. 2022, 21, 2596–2609. [Google Scholar] [CrossRef]
  12. Lin, Z.; Lin, M.; de Cola, T.; Wang, J.B.; Zhu, W.P.; Cheng, J. Supporting IoT with Rate-Splitting Multiple Access in Satellite and Aerial-Integrated Networks. IEEE Internet Things J. 2021, 8, 11123–11134. [Google Scholar] [CrossRef]
  13. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.P.; Al-Dhahir, N. Secure and Energy Efficient Transmission for RSMA-Based Cognitive Satellite-Terrestrial Networks. IEEE Wirel. Commun. Lett. 2021, 10, 251–255. [Google Scholar] [CrossRef]
  14. Wang, M.; Yang, W.; Lu, X.; Hu, C.; Liu, B.; Lv, X. Channel Inversion Power Control Aided Covert Communications in Uplink NOMA Systems. IEEE Wirel. Commun. Lett. 2022, 11, 871–875. [Google Scholar] [CrossRef]
  15. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1735–1750. [Google Scholar] [CrossRef]
  16. Yan, S.; Hanly, S.V.; Collings, I.B. Optimal Transmit Power and Flying Location for UAV Covert Wireless Communications. IEEE J. Sel. Areas Commun. 2021, 39, 3321–3333. [Google Scholar] [CrossRef]
  17. Rao, H.; Xiao, S.; Yan, S.; Wang, J.; Tang, W. Optimal Geometric Solutions to UAV-Enabled Covert Communications in Line-of-Sight Scenarios. IEEE Trans. Wirel. Commun. 2022, 21, 10633–10647. [Google Scholar] [CrossRef]
  18. Su, Y.; Fu, S.; Si, J.; Xiang, C.; Zhang, N.; Li, X. Optimal Hovering Height and Power Allocation for UAV-aided NOMA Covert Communication System. IEEE Wirel. Commun. Lett. 2023, 1–5. [Google Scholar] [CrossRef]
  19. 3GPP. Technical Specification Group Radio Access Network; Study on Channel Model for Frequencies from 0.5 to 100 GHz (Release 14); Technical Specification (TS) 38.901; Version 14.3.0; 3rd Generation Partnership Project (3GPP). 2018. Available online: https://www.etsi.org/deliver/etsitr/138900138999/138901/14.00.0060/tr138901v140000p.pdf (accessed on 6 March 2023).
  20. Zhou, X.; Yan, S.; Shu, F.; Chen, R.; Li, J. UAV-Enabled Covert Wireless Data Collection. IEEE J. Sel. Areas Commun. 2021, 39, 3348–3362. [Google Scholar] [CrossRef]
  21. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving Covert Wireless Communications Using a Fulsl-Duplex Receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef] [Green Version]
  22. Corless, R.M.; Gonnet, G.H.; Hare, D.E.; Jeffrey, D.J.; Knuth, D.E. On the Lambert W function. Adv. Comput. Math. 1996, 5, 329–359. [Google Scholar] [CrossRef]
Figure 1. The uplink RSMA covert communication system model.
Figure 1. The uplink RSMA covert communication system model.
Drones 07 00237 g001
Figure 2. (a) A sample for splitting s 1 into s 11 and s 12 . (b) An illustration of power allocation and decoding order.
Figure 2. (a) A sample for splitting s 1 into s 11 and s 12 . (b) An illustration of power allocation and decoding order.
Drones 07 00237 g002
Figure 3. Procedure for solving optimization problem (Section 4).
Figure 3. Procedure for solving optimization problem (Section 4).
Drones 07 00237 g003
Figure 4. The maximum ESR versus the expected minimum DEP for different ECR constraints in RSMA and NOMA systems, where R ^ 2 = 3 bpcu.
Figure 4. The maximum ESR versus the expected minimum DEP for different ECR constraints in RSMA and NOMA systems, where R ^ 2 = 3 bpcu.
Drones 07 00237 g004
Figure 5. The outage probability of R ^ 11 under H 1 for different covertness constraints in RSMA and NOMA systems, where ϵ = 0.8 R ^ 2 .
Figure 5. The outage probability of R ^ 11 under H 1 for different covertness constraints in RSMA and NOMA systems, where ϵ = 0.8 R ^ 2 .
Drones 07 00237 g005
Figure 6. The maximum ESR versus the target rate of U2 R ^ 2 for different covertness constraints in RSMA and NOMA systems, where ϵ = 0.8 R ^ 2 .
Figure 6. The maximum ESR versus the target rate of U2 R ^ 2 for different covertness constraints in RSMA and NOMA systems, where ϵ = 0.8 R ^ 2 .
Drones 07 00237 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Duan, Z.; Yang, X.; Zhang, T.; Wang, L. Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems. Drones 2023, 7, 237. https://doi.org/10.3390/drones7040237

AMA Style

Duan Z, Yang X, Zhang T, Wang L. Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems. Drones. 2023; 7(4):237. https://doi.org/10.3390/drones7040237

Chicago/Turabian Style

Duan, Zhengxiang, Xin Yang, Tao Zhang, and Ling Wang. 2023. "Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems" Drones 7, no. 4: 237. https://doi.org/10.3390/drones7040237

APA Style

Duan, Z., Yang, X., Zhang, T., & Wang, L. (2023). Optimal Position and Target Rate for Covert Communication in UAV-Assisted Uplink RSMA Systems. Drones, 7(4), 237. https://doi.org/10.3390/drones7040237

Article Metrics

Back to TopTop