Next Article in Journal
Prediction of Tunnel Face Stability Using a Naive Bayes Classifier
Previous Article in Journal
Sediment Erosion Characteristics and Mechanism on Guide Vane End-Clearance of Hydro Turbine
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks

1
College of Communications Engineering, Army Engineering University of PLA, Nanjing 210007, China
2
Sixty-Third Research Institute, National University of Defense Technology, Nanjing 210007, China
3
Command and Control Engineering College, Army Engineering University of PLA, Nanjing 210007, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2019, 9(19), 4138; https://doi.org/10.3390/app9194138
Submission received: 26 July 2019 / Revised: 25 September 2019 / Accepted: 26 September 2019 / Published: 2 October 2019

Abstract

:
This paper investigates secure transmission in unmanned aerial vehicle (UAV) relay-assisted millimeter wave (mmWave) networks, where the selected UAV relay performs secure transmission in both the on-off and non-on-off schemes. Meanwhile, there are multiple eavesdroppers randomly distributed on the ground and attempting to wiretap the transmission. Leveraging the air-to-ground channel model and the tools of stochastic geometry, the novel expressions of transmit probability (TP) and secrecy outage probability (SOP) are derived in both the on-off and non-on-off transmission schemes with perfect beam alignment. The secrecy performance improvement is demonstrated in the on-off transmission scheme, and we find that there exists an optimal altitude of UAV relays to achieve the best TP. In addition, due to the limitations of UAV carriers, such as its low computational capacity and high mobility, the perfect beam alignment is difficult to achieve in the mmWave networks aided by UAV relays, and the effect of beam alignment error on the secrecy performance is investigated in the considered networks. Analyzing the numerical and simulation results, we find that the SOP will not have obvious deterioration when the beam alignment error is relatively small, and the SOP can be improved by using the antennas with a large number of elements. However, in high beam alignment error regime, the antenna arrays with a smaller number of elements will provide the better SOP.

1. Introduction

Millimeter wave (mmWave) has attracted considerable research attention due to its plentiful available spectrum resources [1,2,3]. Nevertheless, with the high frequencies, mmWave signals are extremely sensitive to the blockage effect, and their path losses are severe. As such, the mmWave communication links are prone to outage, especially in an environment with dense blockage, e.g., a mountainous area. To this end, deploying the unmanned aerial vehicle (UAV) relays in the air has been investigated for performance improvement and disconnection recovery in the mmWave networks [4,5].
Although the performance improvement can be obtained by employing the UAV relays, it also makes the transmission vulnerable to eavesdroppers due to the inherent broadcast of the wireless networks. As such, it is one of the key concerns to provide a secure communication in UAV relay-assisted mmWave networks. In contrast to the conventional upper-layer security methods mainly based on cryptographic protocols [6], physical-layer security has been emerged as a powerful approach to protect information transmission against wiretapping by exploiting the randomness of wireless medium, e.g., noise and interference [7]. Some potential application scenarios and challenges in terms of physical-layer security are presented in [8,9,10,11]. In this paper, we focus on secure on-off transmission in UAV relay-assisted mmWave networks.

1.1. Related Work and Motivation

Cooperative relay has been identified as an effective technique to improve the system performance of mmWave networks, and has attracted considerable attention recently [12,13,14]. To be specific, in [12], the coverage probability of the mmWave networks aided by relay, in which the base stations and relays are modeled under the stochastic geometry framework, has been investigated in both the best path and best relay selection protocols. Deploying the directional antennas at relays helps improve the reliability in the mmWave networks, the maximum achievable rate of the mmWave relay networks has been examined by considering the beamwidth of directional antennas in [13]. In addition, Lin et al. [14] has demonstrated the effects of co-channel interference on outage performance in the mmWave relay networks. Nevertheless, all above mentioned works focus on the mmWave communication networks on the ground.
At present, due to the flexible deployment and the supply of line-of-sight (LOS) links for UAV, operating the UAVs as relays has emerged as a promising way for performance enhancement in wireless communication networks [15,16,17]. Specifically, considering an UAV relay-assisted network, the authors in [15] have studied the channel model and examined the system performance in terms of average rate, outage probability, and bit error rate. In [16], the authors have investigated the conditions of establishing multi-hop single link or multiple dual-hop links by using UAV relays for the purpose of achieving better outage performance. In addition, Chen et al. [17] has demonstrated the effect of the altitude of UAV relay on the reliability performance in the UAV relay-assisted communication networks, then they has explored the optimal altitude of UAV relay for minimum outage probability. However, these works only investigate the performance of UAV relay-assisted networks without secrecy consideration.
Physical-layer security can protect information transmission with lower computation complexity in UAV relay networks [18,19,20]. Considering an UAV relay system, where multiple relays and eavesdroppers exist in the air, the secrecy outage probability (SOP) has been examined in [18]. Meantime, in [19], the average secrecy rate of the UAV relay networks has been studied. Involving the mmWave bands, the related literature is small. In our previous work [20], we have considered an UAV-enabled mmWave communication system, in which a source transmits the signals to a destination via a determined UAV relay, physical-layer security has been studied by using the 3D directional antenna pattern. It is worth mentioning that the on-off transmission [21,22], as an effective measure to guarantee the transmission quality and further enhance physical-layer security, still has not been investigated in UAV relay networks.
On the other hand, the existing works of mmWave communication networks mainly considered that the perfect beam alignment occurs at the legitimate nodes. However, due to the practical limitations, e.g., the limited computational capacity and mobility of transmitters and receivers, the beam alignment error is inevitable in practical mmWave communication scenarios. In [23], the average rate and coverage performance has been examined in the mmWave cellular networks with beam alignment errors, which are modeled as independent Gaussian distributions. Later, Cheng et al. [24] has adopted flat-top model to describe the beam alignment error of directional antenna, and the coverage probability of mmWave cellular networks has been studied. Please note that these works have not clarified that how the beam alignment errors affect the secrecy performance in UAV relay-assisted mmWave networks.
In summary, contrasting to the previous works, the secure communication in the UAV relay-assisted mmWave networks is still an open issue. First, with the aid of UAV relay in the mmWave networks, how to design the on-off transmission scheme to further enhance the physical-layer security is a challenging work. In addition, taking into account the practical limitation in terms of imperfect beam alignment at legitimate nodes, the effects of beam alignment errors on the secrecy performance of UAV relay-assisted mmWave networks still needs to be investigated.

1.2. Contribution

In this paper, we investigate the secure on-off transmission in UAV relay-assisted mmWave networks, and the secrecy performance is examined by considering the beam alignment errors. Our main contributions are summarized as follows:
  • Considering a ground mmWave communication networks aided by multiple UAV relays, where multiple eavesdroppers randomly distribute on the ground. More specifically, the locations of UAV relays and eavesdroppers are modeled as independent Poisson Point Processes (PPPs), and the opportunistic relay selection scheme is adopted. Then, the on-off transmission scheme is designed to enhance the secrecy performance of the considered networks, and we find that the lower SOP can be obtained by adopting the higher threshold of data transmission.
  • With perfect beam alignment, the new closed-form expressions of transmit probability (TP) and SOP are derived in both the on-off and non-on-off transmission schemes by using the tools of stochastic geometry and Gauss–Chebyshev integration. It is revealed that the TP is not a monotonous function versus the altitude of UAV relays, which means that the best TP can be obtained by properly designing the UAV relays’ altitude. In addition, the secrecy performance has remarkable positive correlations with the transmit power and the number of antenna elements.
  • Taking into account the beam alignment error, a typical error model is adopted under the 3D antenna pattern, and the tractable expressions of the SOP are derived. Analyzing the numerical and simulation results, we find that the SOP will not have obvious deterioration with small beam alignment error, and we can enhance the secrecy performance by using the antenna array with large number of elements. However, when the beam alignment error is severe, the antenna array with smaller number of elements provides the lower SOP.
The remainder of this article is organized as follows. The system model is presented in Section 2. In Section 3, we examine the TP and SOP in both the on-off and non-on-off transmission schemes, and the SOPs with beam alignment error are analyzed. Then, the simulation results are shown in Section 4. Finally, we summarize the conclusions in Section 5.

2. System Model

2.1. Network Model

Consider a mmWave UAV system consisting of one source (S), one destination (D), multiple UAV relays and multiple eavesdroppers, as shown in Figure 1. We assume that the direct link from S to D is disconnected since mmWave signals are easy to be blockaded on the ground, and the communication occurs via a selected UAV relay ( R 0 ). To be specific, S first sends the messages to R 0 , and R 0 employs the decode-and-forward protocol to forward its received signals to D. Meanwhile, there are multiple ground eavesdroppers randomly distributed around D and out of the coverage area of S, which means that the eavesdroppers only wiretap the transmission from R 0 to D, similar to [25,26,27]. In addition, the distribution of UAV relays follows a homogeneous PPP Φ U with density λ U , and we assume that all UAV relays are deployed inside a circular disc with radius Q and at the same altitude H [16,28]. The ground eavesdroppers are modeled as an independent homogeneous PPP Φ E with density λ E .
For facilitating the analysis, a 3D polar coordinate system is adopted, in which S and D locate at d S D , π , 0 and 0 , 0 , 0 respectively. Then, for the UAV relay R x at r , θ , H , the distance from S to R x and R x to D are represented as d S R x = d S D 2 + r 2 2 r d S D cos ( θ π ) + H 2 , and d R x D = r 2 + H 2 .

2.2. Antenna and Beam Alignment Error Model

To compensate high path loss of mmWave signals, we assume that the directional antenna arrays are deployed at all nodes. A 3D sectorized antenna model is adopted to approximate the antenna gain pattern [28,29], and the diagram is given as Figure 2. More specifically, the antenna gain between node i and j is expressed as G i j G M i G M j , G M i G m j , G m i G M j , G m i G m j with probability P M i P M j , P M i P m j , P m i P M j , P m i P m j , where i , j S , R 0 , D , E e denote the source, the selected UAV relay, the destination or the eavesdropper at location e, G M i G m i represents the array gain of the main lobe (side lobe) at node i, and P M i P m i is the probability that the array gain G M i G m i occurs. In the scenario without beam alignment error, we assume that the legitimate nodes can adjust their antenna orientations and align to each other. Then, for the selected UAV relay R 0 , the maximum of beam depression angle is calculated as θ max = 2 arctan Q / H , and the probability that the ground eavesdroppers fall in the main lobe of UAV relay can be expressed as P M R 0 = θ a R θ d R / π θ max , where θ a R and θ d R are the azimuth angle and depression angle of the UAV relay, respectively. Moreover, the probability that the eavesdropper E e aligns to the selected UAV relay can be written as P M E e = θ a E θ d E / π π θ d E , where θ a E and θ d E are the azimuth and elevation angles of the eavesdropper. Accordingly, we can obtain P m R 0 = 1 P M R 0 and P m E e = 1 P M E e .
We consider that the legitimate nodes S, R x and D will estimate the angles of arrival and departure, and adjust the antenna steering orientations to obtain the maximum directive gains. However, due to the errors in angles estimations, the beam alignment error is inevitable in practical applications. In this paper, the 3D antenna gain is adopted in which the beam alignment occurs when the main lobe of the antenna array aligns the target in both azimuth and elevation. We denote the beam alignment error in the azimuth (elevation) at node k S , R 0 , D as ε a k ε d k , and the errors are modeled as independent Gaussian-distributed variables with zero mean [23,30]. For simplicity, we assume that the variances of the beam alignment errors in the azimuth and elevation at node k are same, denoting as σ k 2 . Thus, the cumulative distribution functions (CDFs) of ε a k and ε d k are expressed as F ε a k x = F ε d k x = e r f x / 2 σ k , where e r f · is the error function.

2.3. Channel Model

Due to the blockage effects, the air-to-ground links can be LOS or non-line-of-sight (NLOS). Similar to [31], the occurrence probabilities of LOS and NLOS are given as p L r = 1 / 1 + a exp b arctan H / r a , and p N r = 1 p L r , where r is the horizontal distance from UAV to the ground node, and a and b are the environment dependent constant values. Moreover, the propagation characteristics for LOS and NLOS links are different in mmWave bands [32,33]. Giving the link of length d, the path loss can be given as L d = C j d α j for j L , N , where C j = 10 ζ j is the intercept of the link with parameter ζ j , α j is the path loss exponent, and L and N denote that the link is LOS or NLOS. In addition, the small-scale fading for each link is modeled as independent Nakagami-m fading [34]. More specifically, the small-fading channel gain between two nodes follows normalized Gamma random variable, and for a LOS link, it is expressed as h i j 2 Γ N L , 1 ; for a NLOS link, h i j 2 Γ N N , 1 , where i , j S , R x , D , E e .
Based on the above assumptions on antenna and channel models, the signal to noise (SNR) at the legitimate receiver is written as
γ i j = P t G i j h i j 2 L d i j N 0 , i S , R x , j R x , D ,
where P t is the transmit power, R x Φ U is the available UAV relay at position x, d i j is the distance from node i to j and N 0 denotes the noise power. In addition, we focus on the non-colluding eavesdropping case, where all eavesdroppers process the received signals independently. As such, the secrecy performance is dominated by the largest SNR at the most malicious eavesdropper, which is written as
γ E = max E e Φ E P t G R 0 E e h R 0 E e 2 L d R 0 E e N 0 .

2.4. Relay Selection and Transmission Scheme

Under the decode-and-forward relaying strategy, we adopt an opportunistic relay selection scheme with two phases. First, we select a set of UAV relays, which can successfully decode the messages received from S. Specifically, for a potential UAV relay R x Φ U , if the channel capacity between S and R x is greater than a threshold C t h , the relay R x can decode the S’s messages correctly [35,36], and the decoding set is defined as Φ ^ = R x Φ U , C S R x > C t h . After that, the UAV relay R 0 , which provides the lowest path loss to D, is selected from Φ ^ to forward the S’s messages to D. To this end, the selected relay offers the minimum length of LOS or NLOS link to D.
Based on the above system model, there are multiple ground eavesdroppers monitoring the transmission of R 0 D link and attempting to interpret the confidential messages. In order to enhance physical-layer security, the on-off transmission scheme is adopted at R 0 , as done in [21,22]. More specifically, based on the pilot signals from D, R 0 can obtain the channel capacity C R 0 D of the R 0 D link. Then R 0 performs data transmission only when C R 0 D is above the threshold μ . In order to highlight the effect of secrecy performance in the on-off transmission scheme, the conventional non-on-off transmission scheme is analyzed in this paper as well, in which the selected UAV relay R 0 always transmits the signals after decoding the messages from S.
To further clarify the relay selection and on-off transmission scheme, we also depict the detailed scheduling period of these two processes as Figure 3. The relay selection process contains three parts:
T 1 : S sends the pilot symbols to all UAV relays, and the UAV relays calculate the channel capacities of their links from S, then Φ ^ can be obtained.
T 2 : The UAV relays in Φ ^ transmit the pilot signals to D, then D can find R 0 .
T 3 : D responds the selection results to the UAV relays, and the selection process is completed.
After that, the selected UAV relay R 0 performs on-off transmission, which is divided into four time slots:
T 4 : D sends the pilot signals to R 0 , and R 0 calculated the channel capacity C R 0 D .
T 5 : If the C R 0 D > μ , R 0 sends the indicator signals to S. But when C R 0 D μ , R 0 keeps silent and waits the next pilot signals from D.
T 6 : After S receives the indicator signals, it transmits the date symbols to R 0 .
T 7 : R 0 forwards the messages to D by using decode-and-forward strategy.
It should be mentioned that there are beam training phases before S and R 0 transmit the data symbols [37,38,39], which is not our focus.

3. Secrecy Evaluation

In this section, we first present the probability distribution function (PDF) of the horizontal distance from the selected UAV relay R 0 to the destination D. Then, we derive the closed-form expressions of the TP and SOP with and without the on-off transmission strategy. Furthermore, the effect of beam alignment error on the secrecy performance is analyzed.

3.1. Preliminary Analysis

For an UAV relay R x , the probability of including in the decoding set Φ ^ depends on the distance from S to R x . To be specific, the UAV relay R x is more likely to be contained in Φ ^ when it is closed to S. Meantime, the channels between S and R x with different x are independent, then Φ ^ can be regarded as an inhomogeneous PPP. The density of the point process is derived as
λ ^ x = λ U Pr C S R x > C t h = λ U Pr P t G S R x h S R x 2 L d S R x N 0 > 2 C t h 1 = λ U Pr h S R x 2 > N 0 2 C t h 1 P t G S R x L d S R x = λ U j L , N p j r Γ N j , N 0 2 C t h 1 d S R x α j P t G S R x C j Γ N j
where r is the horizontal distance from S to R x .
The opportunistic relay selection assumes the selected UAV relay R 0 , which offer the lowest path loss to D, is selected to forward S’s messages. It is easy to know that R 0 is the nearest relay in Φ ^ L ( Φ ^ N ) from D, where Φ ^ L ( Φ ^ N ) is the LOS (NLOS) decoding UAV relay set with density p L r λ ^ x ( p N r λ ^ x ).
Lemma 1.
Denoting the horizontal distance from D to the nearest LOS (NLOS) UAV relay as r L ( r N ), the PDF of r j , j L , N is presented as
f r j r = i = 1 T w i θ r p j r λ ^ r , θ i e v j r ,
where T is the abscissas of the quadrature by using Gauss–Chebyshev integration, θ i = π 1 + cos 2 i 1 π 2 T , w i θ = π T θ i y θ i , and v j r is written as
v j r = i , k = 1 T w i θ w k r r k p j r k λ ^ r k , θ i ,
where r k = r 2 1 + cos 2 k 1 π 2 T , w k r = π T r k y r k .
Proof. 
See Appendix A. □
Lemma 2.
Giving that the selected UAV relay is LOS, the conditional PDF of r L is written as
g r L r = f r L r A L e ν N max 0 , C N C L 2 α N r 2 + H 2 α L α N H 2 ,
where A L is the probability that R 0 is LOS, and its expression is given as
A L = k = 0 T w k r e ν N max 0 , C N C L 2 α N r k 2 + H 2 α L α N H 2 f r L r k .
Proof. 
See Appendix B. □
Similar to (6), giving that the selected UAV relay is NLOS, the conditional PDF of r N is written as
g r N r = f r N r A N e ν L min Q , C L C N 2 α L r 2 + H 2 α N α L H 2 ,
where A N = 1 A L is the probability that R 0 is NLOS.

3.2. Performance Analysis with Perfect Beam Alignment

In this subsection, considering the perfect beam alignment between the legitimate transmitter and receiver, the new closed-form expressions for the TP and SOP are derived in the on-off transmission scheme. For comparison, we then consider the conventional non-on-off transmission scheme and present the SOP.

3.2.1. On-Off Transmission Scheme

In this scheme, with the pilot signals from the destination D, the selected UAV relay R 0 sends the messages only when the channel capacity C R 0 D is above a threshold μ . Then, the TP is derived as
p t x = Pr C R 0 D > μ R 0 Φ ^ = Pr h R 0 D 2 > N 0 2 μ 1 P t G R 0 D L d R 0 D Pr R 0 Φ ^ = j L , N A j 0 Q Γ N j , N 0 2 μ 1 d R 0 D α j P t G R 0 D C j Γ N j g j r d r j L , N A j 0 Q g j r d r = a j L , N A j i = 1 T w ¯ i r τ j μ , r i , H , G R 0 D g r j r i j L , N A j i = 1 T w ¯ i r g r j r i
where step (a) is due to the Gauss–Chebyshev integration, r i = Q 2 1 + cos 2 i 1 π 2 T , w ¯ i r = π T r i Q r i and τ j μ , r i , H , G R 0 D is written as
τ j μ , r i , H , G R 0 D = Γ N j , N 0 2 μ 1 r i 2 + H 2 α j 2 P t G R 0 D C j Γ N j .
The SOP is the probability that the secrecy outage occurs when R 0 performs data transmission. As such, the SOP in on-off scheme is derived as
p s o p o n o f f = 1 Pr C R 0 D C E > C S C R 0 D > μ R 0 Φ ^ = 1 Pr γ E < 1 + γ R 0 D C s 1 , γ R 0 D > 2 μ 1 p t x = 1 1 p t x j L , N A j 0 Q 2 μ 1 g j r F γ E 1 + x 2 C S 1 f γ R 0 D , j x d r d x b 1 1 p t x j L , N A j i , k = 1 T w ¯ i r w k x g j r i F γ E β x k f γ R 0 D , j x k ,
where F γ E · is the CDF of γ E , f γ R 0 D , j · is the PDF of γ R 0 D with LOS or NLOS R 0 D link, β y = 1 + y C s 1 , step (b) is due to the fact that the maximal γ R 0 D can be approximated as γ R 0 D max = 5 P t N L G M R 0 G M D L H N 0 , and x k = γ R 0 D max + 2 μ 1 γ R 0 D max 2 μ 1 2 cos 2 k 1 π 2 T and w k x = π T x k 2 μ + 1 γ R 0 D max x k are the parameters by using Gauss–Chebyshev integration.
We note that (11) is calculated by using the CDF of γ E and the PDF of γ R 0 D when R 0 D link is LOS or NLOS. Without loss of generality, we only take into account the eavesdroppers inside a circular area, and the radius is set as Q for simplicity. Then, the CDF of γ E is derived as
F γ E x = Pr max e Φ E γ E e x = E Φ E e Φ E Pr γ E e x = c exp λ E R 2 Pr γ E e > x d R 2 = exp λ E G R 0 E Pr G R 0 E = V j L , N Ξ j V , x ,
where step (c) is due to the void probability of PPP, Ξ j V , x is given as
Ξ j V , x = 0 2 π 0 Q p j r Pr γ E e , j > x Φ E j r d r d θ = 2 π Γ N j 0 Q Γ N j , N 0 x d R 0 E e α j P t V C j p j r r d r = 2 π Γ N j i = 1 T w ¯ i r Γ N j , N 0 x r i 2 + H 2 α j 2 P t V C j p j r i r i ,
where Φ E j , j L , N is the set of LOS or NLOS eavesdroppers seen from R 0 .
Then, the PDF of γ R D , j is derived as
f γ R 0 D , j x = Pr h R 0 D 2 < N 0 x d R 0 D α j P t G R 0 D C j = 1 Γ N j γ N j , N 0 x d R 0 D α j P t G R 0 D C j = d 1 Γ N j N 0 x d R 0 D α j P t G R 0 D C j N j x N j 1 e N 0 x d R 0 D α j P t G R 0 D C j ,
where step (d) is due to ([40], Equation (0.410)) and ([40], Equation (8.350.1)).
Finally, we can calculate the SOP in the on-off transmission scheme by substituting (12) and (14) into (11).
Remark 1.
We clarify that the TP in the on-off transmission scheme is affected by the threshold μ, the transmit power P t , the antenna gains of the legitimate links and the altitude of UAV relays H, as indicated by (9). It is worth mentioning that the TP is not a monotonous function of H. Specifically, when H starts to increase, the TP increases due to the larger LOS probability of the R 0 D link. But if H is large enough, the path loss is severe, which will cause the decrease of TP. Moreover, when P t , the TP p t x 1 according to (9), and the SOP p s o p o n o f f approaches a constant due to the fact that the secrecy capacity C R 0 D C E is mainly affected by the channel states of legitimate and eavesdropping links if P t is large enough.

3.2.2. Non-On-Off Transmission Scheme

For comparison, we also give the TP and SOP for conventional non-on-off scheme, in which the selected UAV relay R 0 always transmits the signals after receiving the messages from S. It is obvious that the TP in non-on-off transmission scheme is p t x n o n = 1 . And the SOP is derived as
p s o p n o n = 1 Pr γ R 0 D > 2 C s ( 1 + γ E ) 1 = 1 j L , N A j i T w ¯ i r g r j r i 0 β ¯ x F γ R 0 D , j y f γ E x d z d y = e 1 j L , N A j i T w ¯ i r g r j r i 0 F γ E x f γ R 0 D , j β ¯ x β ¯ x d y f 1 j L , N A j i , k T w ¯ i r w ¯ k x g r j r i F γ E x k f γ R 0 D , j β ¯ x ¯ k β ¯ x ¯ k ,
where F γ E · and f γ R 0 D , j · are given as (12) and (14), step (e) is obtained by using integration by parts, step (f) is due to the maximum γ R 0 D max is approximated as γ R 0 D max = 5 P t N L G R 0 M G D M L H σ 2 , w ¯ k x = π T x ¯ k γ R 0 D max x ¯ k , x ¯ k = γ R 0 D max 2 1 + cos 2 k 1 π 2 T , and β ¯ y = 2 C s 1 + y 1 .

3.3. Performance Analysis with Beam Alignment Error

Based on the antenna model mentioned in Section 2.2, the beam alignment occurs when the orientation of the target node falls in the main lobe of the transmitter’s antenna gain. For the 3D antenna, if the additive beam alignment error is not larger than half of the main-lobe beamwidth in both of the azimuth and elevation, i.e., ε a k θ a k / 2 , ε d k θ d k / 2 , k S , R x , D , the beam alignment is deemed to be achieved. Then the probability that node k align its target node is calculated by
P A k = F ε a k θ a k 2 F ε d k θ d k 2 = e r f θ a k 2 2 σ k e r f θ d k 2 2 σ k .
Since the existence of beam alignment error, the antenna gain between the legitimate nodes i and j, i , j S , R 0 , D , which is denoted as G i j , can be described as a discrete random variable. As such, the PDF of G i j can be given by
f G i j ( y ) = P A i P A j δ y G M i G M j + P A i P ¯ A j δ y G M i G m j + P ¯ A i P A j δ y G m i G M j + P ¯ A i P ¯ A j δ y G m i G m j ,
where P ¯ A i = 1 P A i ( P ¯ A j = 1 P A j ), and δ · is the Kronecker delta function.
Let the p s o p o n o f f y 1 , y 2 and p s o p n o n y 1 , y 2 be the SOP in the on-off and non-on-off transmission schemes when G S R 0 = y 1 and G R 0 D = y 2 . The SOP in the on-off transmission scheme is formulated as
p ^ s o p o n o f f = 0 0 p s o p o n o f f y 1 , y 2 f G S R 0 y 1 f G R 0 D y 2 d y 1 d y 2 = G S R 0 Pr G S R 0 = y 1 G R 0 D Pr G R 0 D = y 2 p s o p o n o f f y 1 , y 2 ,
where G i j belongs to G M i G M j , G M i G m j , G m i G M j , G m i G m j with probability P A i P A j , P A i P ¯ A j , P ¯ A i P A j , P ¯ A i P ¯ A j for i , j S , R 0 , D . The SOP in the non-on-off scheme is similar to (18), but replacing p ^ s o p o n o f f and p s o p o n o f f y 1 , y 2 with p ^ s o p n o n and p s o p n o n y 1 , y 2 , respectively.
Remark 2.
It can be clarified that the beam alignment probability of node k is affected by the main-lobe beamwidth in both the azimuth and elevation θ a k , θ d k and the beam alignment error σ k , as indicated by (16). Obviously, the SOPs in both the on-off and non-on-off transmission schemes increase as σ k becomes large. This is because that the larger σ k degrades the channel qualities of legitimate links. Nevertheless, when the error is relatively small, the SOP would not have a decided change because the main lobe of the transmitter’s antenna still can cover the target nodes. In addition, when σ k is severe, the SOP is worse by using the antenna array with larger number of elements due to its lower side-lobe gain and narrow beamwidth.

4. Simulation Results

In this section, some simulation results are provided to show the secrecy performance of UAV relay-assisted mmWave networks under both the on-off and non-on-off transmission schemes, and the impact of beam alignment error is discussed. Monte Carlo simulations are conducted in each figure to verify our numerical results. We consider that the uniform planar square antenna is adopted at each node, the antenna element number of the S, UAV relays, D and eavesdroppers are denoted as N l , l S , R x , D , E e , and the main-lobe beamwidth, the antenna gain of the main lobe and side lobe of an N element antenna are given in Table 1. In addition, the mmWave communication operates at carrier frequency 28 GHz, and the simulation parameters are shown in Table 2.
Figure 4 shows the TP versus the UAV relays’ altitude H with different μ and in both the on-off and non-on-off transmission schemes. First, under the on-off transmission scheme, we find that the TP first increases and then decreases as H becomes large. It can be explained that larger H causes higher LOS probability, but if the LOS probability is large enough, the TP is mainly affected by the path loss, which increases as H becomes large. Secondly, the TP increases by decreasing the transmission threshold μ . It demonstrates that we can adjust the TP by changing μ under on-off transmission scheme. In addition, as C t h increases, no matter μ equals to 4, 4.5, or 5, the TP decreases. The reason is that the selected UAV relay would be closer to S for achieving the decoding process when C t h increases, which causes that the path loss of second hop increases.
In Figure 5, we plot the SOP versus the transmit power P t for different N R x and in both the on-off and non-on-off schemes. Observing from Figure 5, the SOP with N R x = 16 outperforms the SOP with N R x = 9 since the received SNR can be enhanced by adopting the antennas array with large amount of elements. Furthermore, the SOP can be improved in the on-off transmission scheme especially with large μ . This is because that the selected relay performs data transmission only when the channel quality of R 0 D link beyond μ in the on-off transmission scheme, and larger μ means better channel from R 0 to D when transmission occurs. It is worth mentioning that the SOP is not a monotonous function of P t when μ is large. It can be explained that the improvement of SOP is obvious with large μ in the low P t region due to the large gap between legitimate and eavesdropping channel capacities, but the eavesdroppers also benefit from larger P t , as such, the channel capacity gap becomes narrow and then approach a constant as P t continue increasing.
Figure 6 illustrates the effect of the eavesdropper density λ E on the SOP with different beam alignment error σ k and in both the on-off and non-on-off transmission schemes. Obviously, with the increasing of λ E , no matter σ k equals to 0°, 8° or 10°, the SOP increases in both two transmission schemes. Besides, the SOP becomes large as σ k deteriorates. The reason is that the channel capacities of legitimate links decrease due to the lower channel gain when σ k increases. Nevertheless, the SOP in on-off transmission scheme outperforms the SOP in non-on-off transmission scheme. It demonstrates that the secrecy performance in the considered networks can be improved by using the on-off transmission scheme.
Figure 7 shows the SOP versus the beam alignment error σ k with different N R x in both the on-off and non-on-off transmission schemes. It can be observed that the SOP increases as σ k becomes large. However, we can find that the increase of SOP is not remarkable when σ k is relatively small. This is because the target nodes still can fall in the main lobe of the transmit antenna when σ k is small. Moreover, it is noteworthy that the SOP can be improved by adopting the on-off transmission scheme, but the improvement is slighter when N R x = 16 . It can be explained that the channel capacity of R x D link always exceeds μ = 5 due to the high antenna gain with N R x = 16 . In addition, when σ k is not too large, the better SOP can be obtained by adopting more antenna elements due to the high antenna gain. However, in the high σ k regime, the antenna array with lesser elements will provide better SOP due to its larger beamwidth of the main lobe.

5. Conclusions

In this paper, we investigate secure transmission in UAV relay-assisted mmWave networks where the beam alignment is achieved or not. The closed-form expressions for TP and SOP in both the on-off and non-on-off transmission schemes are derived by considering the beam alignment error or not. Analyzing the numerical and simulation results, we find that the SOP indeed can be improved by using the on-off transmission scheme, and the SOP can be further decreased by increasing the threshold of data transmission. In addition, the TP is not a monotonous function of the UAV relays’ altitude in the on-off transmission scheme, and there exist an optimal altitude of UAV relay to obtain the best TP. Moreover, the SOP will not deteriorate when the beam alignment error is relatively small, and we can improve the SOP by adopting the antenna with more elements. Nevertheless, in the high alignment error regime, the antenna array with smaller number of elements provides the better SOP.

Author Contributions

R.M. and Y.Z. conceived the model; R.M. performed the performance analysis and simulation results; W.Y. and S.W. analyzed the numerical and simulation; R.M. wrote the paper; and W.Y., S.W. provided some suggestions and revised the paper.

Funding

This work was supported by the National Natural Science Foundation of China (No. 61771487 and No. 61471393).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 1.
To obtain the PDF of r j , j L , N , we first derived the complementary cumulative distribution function (CCDF) of r j as
F ¯ r j r = Pr r j > r = g exp R 2 Pr r j < r d R 2 = exp 0 r 0 2 π p j z λ ^ z , θ z d θ d z ,
where step (g) is due to the PPP’s void probability.
Then, the PDF of r j can be calculated by
f r j r = d F ¯ r j r d r = r p j r 0 2 π λ ^ r , θ d θ e v j r = h r p j r e v j r i = 1 T w i θ λ ^ r , θ i ,
where step (h) is derived by using Gauss–Chebyshev integration [23], T is the abscissas of integration, θ i = π 1 + cos 2 i 1 π 2 T , w i θ = π T θ i y θ i , and v j r is given by
v j r = 0 r 0 2 π p j z λ ^ z , θ z d θ d z = 0 r z p j z i = 1 T w i θ λ ^ r , θ i d z = i , k = 1 T w i θ w k r r k p j r k λ ^ r k , θ i ,
where r k = r 2 1 + cos 2 k 1 π 2 T , and w k r = π T r k y r k by using Gauss–Chebyshev integration. □

Appendix B

Proof of Lemma 2.
First, the probability that the selected UAV relay is LOS is derived as
A L = Pr C L d L α L > C N d N α N = 0 Q F ¯ r N max 0 , C N C L 2 α N r 2 + H 2 α L α N H 2 f r L r d y = i = 0 T w i r e ν N max 0 , C N C L 2 α N r i 2 + H 2 α L α N H 2 f r L r i .
Accordingly, we can easily obtain the A N = 1 A L , which is the probability that the nearest NLOS UAV relay is selected.
Giving that the selected UAV relay is LOS, we then derive the CCDF of the horizontal distance from D to the nearest LOS UAV relay, and its derivations are written as
G ¯ r L r = Pr r L > r r N > max 0 , C N C L 2 α N r 2 + H 2 α L α N H 2 = r Pr r N > max 0 , C N C L 2 α N z 2 + H 2 α L α N H 2 r L > z f r L z d z A L .
Finally, we can obtain the PDF g r L as (6) by using the derivation g r L y = d G ¯ r L y d y . □

References

  1. Jung, H.; Lee, I.-H. Performance Analysis of Millimeter-Wave Multi-hop Machine-to-Machine Networks Based on Hop Distance Statistics. Sensors 2018, 18, 204. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Ojaroudi Parchin, N.; Alibakhshikenari, M.; Jahanbakhsh Basherlou, H.; A Abd-Alhameed, R.; Rodriguez, J.; Limiti, E. MM-Wave Phased Array Quasi-Yagi Antenna for the Upcoming 5G Cellular Communications. Appl. Sci. 2019, 9, 978. [Google Scholar] [CrossRef]
  3. Hefnawi, M. Hybrid Beamforming for Millimeter-Wave Heterogeneous Networks. Electronics 2019, 8, 133. [Google Scholar] [CrossRef]
  4. Zhou, Y.; Cheng, N.; Lu, N.; Shen, X.S. Multi-UAV-Aided Networks: Aerial-Ground Cooperative Vehicular Networking Architecture. IEEE Veh. Technol. Mag. 2015, 10, 36–44. [Google Scholar] [CrossRef]
  5. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput Maximization for UAV-Enabled Mobile Relaying Systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  6. Yang, N.; Wang, L.; Geraci, G.; Elkashlan, M.; Yuan, J.; Renzo, M.D. Safeguarding 5G wireless communication networks using physical layer security. IEEE Commun. Mag. 2015, 53, 20–27. [Google Scholar] [CrossRef]
  7. Xiang, Z.; Yang, W.; Pan, G.; Cai, Y.; Song, Y. Physical Layer Security in Cognitive Radio Inspired NOMA Network. IEEE J. Sel. Top. Signal Process. 2019, 13, 700–714. [Google Scholar] [CrossRef]
  8. Wu, Y.; Khisti, A.; Xiao, C.; Caire, G.; Wong, K.-K.; Gao, X. A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead. IEEE J. Sel. Areas Commun. 2018, 36, 679–695. [Google Scholar] [CrossRef]
  9. Pan, G.; Ye, J.; Ding, Z. Secure Hybrid VLC-RF Systems with Light Energy Harvesting. IEEE Trans. Commun. 2017, 65, 4348–4359. [Google Scholar] [CrossRef]
  10. Pan, G.; Ye, J.; Ding, Z. On Secure VLC Systems With Spatially Random Terminals. IEEE Commun. Lett. 2017, 21, 492–495. [Google Scholar] [CrossRef]
  11. Song, Y.; Yang, W.; Xiang, Z.; Liu, Y.; Cai, Y. Secure Transmission in mmWave Wiretap Channels: On Sector Guard Zone and Blockages. Entropy 2019, 21, 427. [Google Scholar] [CrossRef]
  12. Biswas, S.; Vuppala, S.; Xue, J.; Ratnarajah, T. On the Performance of Relay Aided Millimeter Wave Networks. IEEE J. Sel. Top. Signal Process. 2016, 10, 576–588. [Google Scholar] [CrossRef]
  13. Yang, G.; Xiao, M. Performance Analysis of Millimeter-Wave Relaying: Impacts of Beamwidth and Self-Interference. IEEE Trans. Commun. 2018, 66, 589–600. [Google Scholar] [CrossRef]
  14. Lin, Z.; Peng, X.; Chin, F.; Feng, W. Outage Performance of Relaying with Directional Antennas in the Presence of Co-Channel Interferences at Relays. IEEE Wirel. Commun. Lett. 2012, 1, 288–291. [Google Scholar] [CrossRef]
  15. Chen, X.; Hu, X.; Zhu, Q.; Zhong, W.; Chen, B. Channel Modeling and Performance Analysis for UAV Relay Systems. China Commun. 2018, 15, 89–97. [Google Scholar]
  16. Chen, Y.; Zhao, N.; Ding, Z.; Alouini, M.-S. Multiple UAVs as Relays: Multi-Hop Single Link Versus Multiple Dual-Hop Links. IEEE Trans. Wirel. Commun. 2018, 17, 6348–6359. [Google Scholar] [CrossRef]
  17. Chen, Y.; Feng, W.; Zheng, G. Optimum Placement of UAV as Relays. IEEE Commun. Lett. 2018, 22, 248–251. [Google Scholar] [CrossRef]
  18. Liu, H.; Yoo, S.-J.; Kwak, K.S. Opportunistic relaying for low-altitude UAV swarm secure communications with multiple eavesdroppers. J. Commun. Netw. 2018, 20, 496–508. [Google Scholar] [CrossRef]
  19. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving Physical Layer Security Using UAV-Enabled Mobile Relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
  20. Sun, X.; Yang, W.; Cai, Y.; Ma, R.; Tao, L. Physical Layer Security in Millimeter Wave SWIPT UAV-Based Relay Networks. IEEE Access 2019, 7, 35851–35862. [Google Scholar] [CrossRef]
  21. Hu, J.; Yang, W.; Yang, N.; Zhou, X.; Cai, Y. On-Off-Based Secure Transmission Design with Outdated Channel State Information. IEEE Trans. Veh. Technol. 2016, 65, 6075–6088. [Google Scholar] [CrossRef]
  22. Yang, W.; Tao, L.; Sun, X.; Ma, R.; Cai, Y.; Zhang, T. Secure On-off Transmission in mmWave Systems with Randomly Distributed Eavesdroppers. IEEE Access 2019, 7, 32681–32692. [Google Scholar] [CrossRef]
  23. Di Renzo, M. Stochastic Geometry Modeling and Analysis of Multi-Tier Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015, 14, 5038–5057. [Google Scholar] [CrossRef]
  24. Cheng, M.; Wang, J.-B.; Wu, Y.; Xia, X.-G.; Wong, K.-K.; Lin, M. Coverage Analysis for Millimeter Wave Cellular Networks With Imperfect Beam Alignment. IEEE Trans. Veh. Technol. 2018, 67, 8302–8314. [Google Scholar] [CrossRef]
  25. Jia, S.; Zhang, J.; Zhao, H.; Lou, Y.; Xu, Y. Relay Selection for Improved Physical Layer Security in Cognitive Relay Networks Using Artificial Noise. IEEE Access 2018, 6, 64836–64846. [Google Scholar] [CrossRef]
  26. Zou, Y.; Wang, X.; Shen, W. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks. IEEE J. Sel. Areas Commun. 2013, 31, 2099–2111. [Google Scholar] [CrossRef] [Green Version]
  27. Krikidis, I.; Thompson, J.; Mclaughlin, S. Relay selection for secure cooperative networks with jamming. IEEE Trans. Wirel. Commun. 2009, 8, 5003–5011. [Google Scholar] [CrossRef]
  28. Zhu, Y.; Zheng, G.; Fitch, M. Secrecy rate analysis of UAV-enabled mmWave networks using Matérn hardcore point processes. IEEE J. Sel. Areas Commun. 2018, 36, 1397–1409. [Google Scholar] [CrossRef]
  29. Venugopal, K.; Valenti, M.C.; Heath, R.W. Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies. IEEE Trans. Wirel. Commun. 2016, 15, 6175–6188. [Google Scholar] [CrossRef]
  30. Thornburg, A.; Heath, R.W. Ergodic Rate of Millimeter Wave Ad Hoc Networks. IEEE Trans. Wirel. Commun. 2018, 17, 914–926. [Google Scholar] [CrossRef]
  31. Al-Hourani, A.; Kandeepan, S.; Lardner, S. Optimal LAP altitude for maximum coverage. IEEE Wirel. Commun. Lett. 2014, 3, 569–572. [Google Scholar] [CrossRef]
  32. Bai, T.; Heath, R.W. Coverage and Rate Analysis for Millimeter-Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2015, 14, 1100–1114. [Google Scholar] [CrossRef]
  33. Sun, X.; Yang, W.; Cai, Y.; Tao, L.; Liu, Y.; Huang, Y. Secure Transmissions in Wireless Information and Power Transfer Millimeter-Wave Ultra-Dense Networks. IEEE Trans. Inf. Forensics Secur. 2019, 14, 1817–1829. [Google Scholar] [CrossRef]
  34. Wang, C.; Wang, H.-M. Physical Layer Security in Millimeter Wave Cellular Networks. IEEE Trans. Wirel. Commun. 2016, 15, 5569–5585. [Google Scholar] [CrossRef] [Green Version]
  35. Belbase, K.; Zhang, Z.; Jiang, H.; Tellambura, C. Coverage Analysis of Millimeter Wave Decode-and-Forward Networks with Best Relay Selection. IEEE Access 2018, 6, 22670–22683. [Google Scholar] [CrossRef]
  36. Zhao, R.; Yuan, Y.; Fan, L.; He, Y.C. Secrecy Performance Analysis of Cognitive Decode-and-Forward Relay Networks in Nakagami-m Fading Channels. IEEE Trans. Commun. 2017, 65, 549–563. [Google Scholar] [CrossRef]
  37. Alkhateeb, A.; Ayach, O.E.; Leus, G.; Heath, R.W. Channel Estimation and Hybrid Precoding for Millimeter Wave Cellular Systems. IEEE J. Sel. Top. Signal Process. 2014, 8, 831–846. [Google Scholar] [CrossRef] [Green Version]
  38. Heath, R.W.; González-Prelcic, N.; Rangan, S.; Roh, W.; Sayeed, A.M. An Overview of Signal Processing Techniques for Millimeter Wave MIMO Systems. IEEE J. Sel. Top. Signal Process. 2016, 10, 436–453. [Google Scholar] [CrossRef]
  39. Gao, Z.; Hu, C.; Dai, L.; Wang, Z. Channel Estimation for Millimeter-Wave Massive MIMO With Hybrid Precoding Over Frequency-Selective Fading Channels. IEEE Commun. Lett. 2016, 20, 1259–1262. [Google Scholar] [CrossRef] [Green Version]
  40. Gradshteyn, I.; Ryzhik, I. Table of Integrals Series and Product, 7th ed.; Academic: New York, NY, USA, 2007. [Google Scholar]
Figure 1. System Model.
Figure 1. System Model.
Applsci 09 04138 g001
Figure 2. Illation of 3D antenna gain.
Figure 2. Illation of 3D antenna gain.
Applsci 09 04138 g002
Figure 3. Scheduling period of the relay selection and on-off transmission processes.
Figure 3. Scheduling period of the relay selection and on-off transmission processes.
Applsci 09 04138 g003
Figure 4. The TP versus the altitude of UAV relay when P t = 30 dBm, N R x = 9 , and λ U = 5 × 10 4 .
Figure 4. The TP versus the altitude of UAV relay when P t = 30 dBm, N R x = 9 , and λ U = 5 × 10 4 .
Applsci 09 04138 g004
Figure 5. The SOP versus the transmit power P t when H = 120 m, C t h = 4 , C s = 1 , λ R = 1 × 10 3 , and λ E = 2 × 10 3 .
Figure 5. The SOP versus the transmit power P t when H = 120 m, C t h = 4 , C s = 1 , λ R = 1 × 10 3 , and λ E = 2 × 10 3 .
Applsci 09 04138 g005
Figure 6. The SOP versus the density of eavesdroppers λ E when P t = 30 dBm, H = 120 , N R x = 9 , C t h = 4 , C s = 1 , and λ U = 5 × 10 4 .
Figure 6. The SOP versus the density of eavesdroppers λ E when P t = 30 dBm, H = 120 , N R x = 9 , C t h = 4 , C s = 1 , and λ U = 5 × 10 4 .
Applsci 09 04138 g006
Figure 7. The SOP versus the eavesdropper density λ E when P t = 30 dBm, H = 120 m, C t h = 4 , C s = 1 , λ U = 5 × 10 4 , and λ E = 1.5 × 10 3 .
Figure 7. The SOP versus the eavesdropper density λ E when P t = 30 dBm, H = 120 m, C t h = 4 , C s = 1 , λ U = 5 × 10 4 , and λ E = 1.5 × 10 3 .
Applsci 09 04138 g007
Table 1. 3D Antenna Pattern [29].
Table 1. 3D Antenna Pattern [29].
Number of antenna elementsN
Main-lobe Beamwidth θ a = θ d N 3
Main-lobe Gain G M N
Side-lobe Gain G m N 3 2 π N sin 3 2 N N 3 2 π sin 3 2 N
Table 2. Simulation Parameters.
Table 2. Simulation Parameters.
TypeValues
Distance between S and D800 m
Radius of UAV relay area Q = 200 m
Number of antenna elements N S = 16 , N D = N E e = 4
Blockage parameters a = 9.6 , b = 0.28
Path loss parameters α L = 2 , ζ L = 61.4 α N = 2.92 , ζ N = 72
Small-scale fading parameters N L = 3 , N N = 2
Noise power [23] N 0 ( dBm ) = 174 + 10 lg ( B W ) + N F
Noise figure N F = 10 dB
Bandwidth BW = 1 GHz

Share and Cite

MDPI and ACS Style

Ma, R.; Yang, W.; Zhang, Y.; Wang, S. Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks. Appl. Sci. 2019, 9, 4138. https://doi.org/10.3390/app9194138

AMA Style

Ma R, Yang W, Zhang Y, Wang S. Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks. Applied Sciences. 2019; 9(19):4138. https://doi.org/10.3390/app9194138

Chicago/Turabian Style

Ma, Ruiqian, Weiwei Yang, Yu Zhang, and Songqing Wang. 2019. "Secure On-Off Transmission in UAV Relay-Assisted mmWave Networks" Applied Sciences 9, no. 19: 4138. https://doi.org/10.3390/app9194138

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop