Advanced Search
Turn off MathJax
Article Contents
MIAO Chen, QIN Yuxuan, MA Ruiqian, LIN Zhi, MA Yue, ZHANG Wentao, WU Wen. Covert Communication Of UAV Aided By Time Modulated Array Perception[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT240606
Citation: MIAO Chen, QIN Yuxuan, MA Ruiqian, LIN Zhi, MA Yue, ZHANG Wentao, WU Wen. Covert Communication Of UAV Aided By Time Modulated Array Perception[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT240606

Covert Communication Of UAV Aided By Time Modulated Array Perception

doi: 10.11999/JEIT240606
Funds:  The National Natural Science Foundation of China (62301254, 62171464), The Natural Science Foundation of Jiangsu Province (BK20230916), China Postdoctoral Science Foundation (2023M731700), The Research and Innovation Fund of National University of Defense Technology (22-ZZCX-07), Comprehensive National Science Center of Hefei
  • Received Date: 2024-07-16
  • Rev Recd Date: 2025-01-19
  • Available Online: 2025-01-25
  •   Objective  With the widespread application of Unmanned Aerial Vehicle (UAV) communication technology in military and civilian domains, ensuring secure information transmission within UAV networks has received increasing attention. Covert communication is an effective approach to conceal information transmission. However, existing methods, such as digital beamforming, improve covert communication performance but increase system size and power consumption. This study proposes a UAV short-packet covert communication method based on Time Modulated Planar Array (TMPA) sensing. A TMPA-UAV covert communication system architecture is introduced, along with a two-dimensional Direction of Arrival (DOA) estimation method. A covert communication model is established, and a closed-form expression for the covert constraint is derived using Kullback-Leibler (KL) divergence. Based on the estimated angle of Willie, the TMPA switching sequence is optimized to maximize signal gain in the target direction while minimizing gain in non-target directions. Covert throughput is selected as the optimization objective, and a one-dimensional search method determines the optimal data packet length and transmission power.  Results and Discussions  Simulations show that the Root Mean Square Error (RMSE) for DOA estimation in both directions approaches 0°, with RMSE decreasing significantly as the Signal-to-Noise Ratio (SNR) increases (Fig. 4). With a fixed elevation angle and azimuth angles varying between 0° and 60°, a comparison between the proposed method and the traditional DOA estimation method for time-modulated arrays indicates that the proposed method reduces DOA estimation error to the order of 0.1°, significantly improving accuracy. Beamforming simulations based on the estimation results (Fig. 6) show a SideLobe Level (SLL) below –30 dB and a beamwidth of 5°, meeting design requirements. Covert communication simulations reveal the existence of an optimal data packet length that maximizes covert throughput (Fig. 7). A stricter covert tolerance imposes tighter constraints on covert communication (Fig. 8), requiring Alice to use lower transmission power and shorter block lengths to communicate covertly with Bob. When the beamforming error angle is small, the system maintains high covert throughput (Fig. 9). Within a UAV flight height range of 50 m to 90 m, covert throughput remains low; however, when the height exceeds 90 m, throughput increases rapidly. Beyond 130 m, UAV height has little effect on maximum covert throughput, and performance reaches its optimal state. Therefore, controlling UAV flight height appropriately is crucial for effective communication between legitimate links.  Conclusions  This study proposes a TMPA-based multi-antenna UAV sensing-assisted covert communication system for short packets. A TMPA-based DOA estimation method is introduced to determine the relative position of non-cooperative nodes. The Compressed Sensing (CS) algorithm optimizes the beam radiation pattern, maximizing gain at the legitimate destination node while creating nulls at the non-cooperative node's location. A closed-form expression for covert constraints is derived using KL divergence, and covert throughput is maximized through the joint optimization of packet length and transmission power. Simulations analyze the relationships between the number of array elements, covert tolerance, beam direction error angles, UAV height, and covert throughput. Results indicate that an optimal packet length maximizes covert throughput. Additionally, increasing the number of array elements and relaxing covert constraints can improve covert throughput. Practical system design should comprehensively optimize these factors.
  • loading
  • [1]
    王超, 安建平, 邢成文, 等. 面向空间信息网络的隐蔽通信技术综述[J]. 中国科学: 信息科学, 2024, 54(6): 1319–1349. doi: 10.1360/SSI-2023-0101.

    WANG Chao, AN Jianping, XING Chengwen, et al. A review of covert communication technologies for space information networks[J]. SCIENTIA SINICA Informationis, 2024, 54(6): 1319–1349. doi: 10.1360/SSI-2023-0101.
    [2]
    JIANG Xu, CHEN Xinying, and TANG Jie, et al. Covert communication in UAV-assisted air-ground networks[J]. IEEE Wireless Communications, 2021, 28(4): 190–197. doi: 10.1109/MWC.001.2000454.
    [3]
    WU Qingqing, MEI Weidong, and ZHANG Rui. Safeguarding wireless network with UAVs: A physical layer security perspective[J]. IEEE Wireless Communications, 2019, 26(5): 12–18. doi: 10.1109/MWC.001.1900050.
    [4]
    WANG Huiming, ZHANG Yan, ZHANG Xu, et al. Secrecy and covert communications against UAV surveillance via multi-hop networks[J]. IEEE Transactions on Communications, 2020, 68(1): 389–401. doi: 10.1109/TCOMM.2019.2950940.
    [5]
    BLOCH M R. Covert communication over noisy channels: A resolvability perspective[J]. IEEE Transactions on Information Theory, 2016, 62(5): 2334–2354. doi: 10.1109/TIT.2016.2530089.
    [6]
    BASH B A, GOECKEL D, and TOWSLEY D. Limits of reliable communication with low probability of detection on AWGN channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1921–1930. doi: 10.1109/JSAC.2013.130923.
    [7]
    LI Xingwang, TIAN Zhifa, HE Wenjing, et al. Covert communication of STAR-RIS aided NOMA networks[J]. IEEE Transactions on Vehicular Technology, 2024, 73(6): 9055–9060. doi: 10.1109/TVT.2024.3349543.
    [8]
    ZHANG Liwei, LI Guoxin, CHEN Jin, et al. Joint transmit power and trajectory optimization for UAV covert communication assisted by artificial noise[C]. 2023 International Conference on Ubiquitous Communication (Ucom), Xi’an, China, 2023: 46–51. doi: 10.1109/Ucom59132.2023.10257626.
    [9]
    LIN Shengbin, XU Yitao, WANG Haichao, et al. Multi-Antenna covert communication assisted by UAV-RIS with imperfect CSI[J]. IEEE Transactions on Wireless Communications, 2024, 23(10): 13841–13855. doi: 10.1109/TWC.2024.3405201.
    [10]
    马越. 基于时间调制阵列的波束形成与DOA估计关键技术研究[D]. [博士论文], 南京理工大学, 2022. doi: 10.27241/d.cnki.gnjgu.2022.000157.

    MA Yue. Research on key techniques of beamforming and DOA estimation based on time-modulated array[D]. [Ph. D. dissertation], Nanjing University of Science and Technology, 2022. doi: 10.27241/d.cnki.gnjgu.2022.000157.
    [11]
    朱全江. 空时四维天线阵理论与应用基础研究[D]. [博士论文], 电子科技大学, 2015.

    ZHU Quanjiang. Studies on the theory and basic applications of space-time four-dimensional antenna arrays[D]. [Ph. D. dissertation], University of Electronic Science and Technology of China, 2015.
    [12]
    金荣洪. "时间调制天线阵列理论与应用技术"专题前言[J]. 电波科学学报, 2022, 37(6): 911–912.

    JIN Ronghong. Preface to the special issue on ‘theory and application technologies of time-modulated antenna arrays’[J]. Chinese Journal of Radio Science, 2022, 37(6): 911–912.
    [13]
    MA Yue, MA Ruiqian, YANG Weiwei, et al. Covert communication using time modulated retrodirective array[J]. IEEE Wireless Communications Letters, 2024, 13(2): 510–514. doi: 10.1109/LWC.2023.3334021.
    [14]
    ZHANG Yuchen, ZHANG Yichi, WANG Jianquan, et al. Distance-angle beamforming for covert communications via frequency diverse array: Toward two-dimensional covertness[J]. IEEE Transactions on Wireless Communications, 2023, 22(12): 8559–8574. doi: 10.1109/TWC.2023.3263939.
    [15]
    HOANG T M, VAN Q N, DUNG L T, et al. Performance analysis and optimization of multi-antenna UAV-Aided multi-user backscatter SPC systems[J]. IEEE Transactions on Intelligent Vehicles, 2024, 9(1): 1028–1039. doi: 10.1109/TIV.2023.3315281.
    [16]
    李兴旺, 王新莹, 田心记, 等. 基于非理想条件可重构智能超表面辅助无线携能通信-非正交多址接入系统通感性能研究[J]. 电子与信息学报, 2024, 46(6): 2434–2442. doi: 10.11999/JEIT231395.

    LI Xingwang, WANG Xinying, TIAN Xinji, et al. Communication and sensing performance analysis of RIS-assisted SWIPT-NOMA system under non-ideal conditions[J]. Journal of Electronics & Information Technology, 2024, 46(6): 2434–2442. doi: 10.11999/JEIT231395.
    [17]
    MA Ruiqian, YANG Weiwei, GUAN Xinrong, et al. Covert mmWave communications with finite blocklength against spatially random wardens[J]. IEEE Internet of Things Journal, 2024, 11(2): 3402–3416. doi: 10.1109/JIOT.2023.3296414.
    [18]
    INCE A N, EVRENDILEK C, WILHELMSEN D, et al. Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications[M]. New York: Springer, 2012: 400. doi: 10.1007/978-1-4615-6159-0.
    [19]
    马越, 马瑞谦, 杨炜伟, 等. 基于时间调制阵列的共孔径干扰辅助短包隐蔽通信[J]. 电子与信息学报, 2024, 46(5): 1977–1985. doi: 10.11999/JEIT231115.

    MA Yue, MA Ruiqian, YANG Weiwei, et al. Shared-aperture jammer assisted covert communication using time modulated array[J]. Journal of Electronics & Information Technology, 2024, 46(5): 1977–1985. doi: 10.11999/JEIT231115.
    [20]
    CLARK B and FLINT J A. A method for forming distributed beams in time-modulated planar arrays[J]. IEEE Transactions on Antennas and Propagation, 2018, 66(12): 6958–6964. doi: 10.1109/TAP.2018.2871878.
    [21]
    TAO Liwei, YANG Weiwei, YAN Shihao, et al. Covert communication in downlink NOMA systems with random transmit power[J]. IEEE Wireless Communications Letters, 2020, 9(11): 2000–2004. doi: 10.1109/LWC.2020.3011191.
    [22]
    MA Ruiqian, YANG Weiwei, SHI Hui, et al. Covert communication with a spectrum sharing relay in the finite blocklength regime[J]. China Communications, 2023, 20(4): 195–211. doi: 10.23919/JCC.fa.2022-0490.202304.
    [23]
    高飞, 黄博. 基于谐波分析的两阵元时间调制阵列测向方法[J]. 电子科技, 2015, 28(12): 158–160,172. doi: 10.16180/j.cnki.issn1007-7820.2015.12.043.

    GAO Fei and HUANG Bo. A direction-finding method based on harmonic analysis of two-element time modulated arrays[J]. Electronic Science and Technology, 2015, 28(12): 158–160,172. doi: 10.16180/j.cnki.issn1007-7820.2015.12.043.
    [24]
    兰少峰, 刘升. 布谷鸟搜索算法研究综述[J]. 计算机工程与设计, 2015, 36(4): 1063–1067. doi: 10.16208/j.issn1000-7024.2015.04.044.

    LAN Shaofeng and LIU Sheng. Overview of research on Cuckoo search algorithm[J]. Computer Engineering and Design, 2015, 36(4): 1063–1067. doi: 10.16208/j.issn1000-7024.2015.04.044.
    [25]
    JIAO Linhang, ZHANG Ran, LIU Mingqian, et al. Placement optimization of UAV relaying for covert communication[J]. IEEE Transactions on Vehicular Technology, 2022, 71(11): 12327–12332. doi: 10.1109/TVT.2022.3190677.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(1)

    Article Metrics

    Article views (167) PDF downloads(46) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return