Next Article in Journal
High-Frequency Forecasting of Stock Volatility Based on Model Fusion and a Feature Reconstruction Neural Network
Next Article in Special Issue
Random Routing Algorithm for Enhancing the Cybersecurity of LEO Satellite Networks
Previous Article in Journal
Experimental Validation and Applications of mm-Wave 8 × 8 Antenna-in-Package (AiP) Array Platform
Previous Article in Special Issue
DNN Beamforming for LEO Satellite Communication at Sub-THz Bands
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization

School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(23), 4056; https://doi.org/10.3390/electronics11234056
Submission received: 3 November 2022 / Revised: 29 November 2022 / Accepted: 29 November 2022 / Published: 6 December 2022
(This article belongs to the Special Issue Satellite-Terrestrial Integrated Internet of Things)

Abstract

:
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted communication networks have been widely used in civil and military fields. However, the open accessibility of wireless channels brings a huge risk of privacy disclosure to UAV-based networks. This paper considers a multi-UAV-assisted covert communication system based on Wireless Powered Communication (WPC) and Clustered-Non-Orthogonal-Multiple-Access (C-NOMA), aiming to hide the transmission behavior between UAVs and legitimate ground users (LGUs). Specifically, the UAVs serve as aerial base stations to provide services to LGUs, while avoiding detection by the ground warden. In order to improve the considered covert communication performance, the average uplink covert rate of all clusters in each slot is maximized by jointly optimizing the cluster scheduling variable, subslot allocation, LGU transmit power and multi-UAV trajectory subject to covertness constraints. The original problem is a mixed integer non-convex problem, which are typically difficult to solve directly. To solve this challenge, this paper decouples it into four sub-problems and solves the sub-problems by alternating iterations until the objective function converges. The simulation results show that the proposed multi-UAV-assisted covert communication scheme can effectively improve the average uplink covert rate of all clusters compared with the benchmark schemes.

1. Introduction

In recent years, unmanned aerial vehicle (UAV)-assisted wireless communication has attracted great attention from civil and military applications, such as disaster rescue, monitoring and data relaying [1,2,3]. Benefiting from high altitude, UAVs can establish Line-of-Sight (LoS) links for air–ground communication, which provides a significant performance gain compared to the traditional cellular communication with typically Non-Line-of-Sight (NLoS) transmission.
In particular, when the user device is located in the disaster area, the base station (BS) may be damaged and, thus, cannot provide reliable services to the user. Due to flexible deployment and high mobility, UAVs are able to act as flying base stations and can provide wireless connections to disconnected user devices [4]. In addition, UAVs can also collect mobile data and disseminate information to assist with wireless services of users with versatile requirements [5].
Although UAVs have myriad advantages, the energy of user devices is limited [6]. Therefore, there is an urgent problem to solve in UAV-assisted wireless communication regarding how to simultaneously provide a convenient energy supply and information access services for user devices. In recent years, Wireless Powered Communication (WPC) has developed into a solution for energy supply in wireless communication [7,8].
WPC uses radio frequency (RF) signals, whose energy can be partially collected, converted and stored in user devices [9]. The user device can harvest energy from the downlink RF signal and then send information to the uplink by utilizing the harvested energy. Cheng et al. [10] studied a UAV-assisted wireless powered Internet of Things. Specifically, when hovering in the air, the UAV communicates and supplies power to user devices, thereby, effectively dealing with the energy limitations of user devices and prolonging their endurance.
On the other hand, since the amount of user devices has recently experienced exponential growth, it is crucial to utilize spectrum resources more efficiently. Traditional orthogonal multiple access (OMA) has difficulty meeting the requirements of large-scale connections of user devices [11]. Fortunately, Non-Orthogonal-Multiple-Access (NOMA) can adapt to the large-scale connectivity and high-efficiency spectrum utilization in wireless communication networks [12,13,14,15,16]. Compared with OMA, NOMA provides services to multiple user devices over the same time, frequency or pattern by leveraging power multiplexing that has higher throughput, lower delay communication and improved spectral efficiency [17,18,19,20,21,22].
In addition, NOMA recovers the information from the receiver using successive interference cancellation (SIC) technology. However, the complexity brought by SIC increases linearly with increases in the number of user devices, resulting in significant increases in processing delays [23]. Therefore, when serving as the flying base station, the UAV can leverage clustered NOMA (C-NOMA), which can not only effectively improve spectrum resource utilization but also reduce the decoding difficulty at the receiver to thereby achieve a good trade-off between high throughput and low decoding complexity [24].
Although UAV-assisted wireless communication has brought technical conveniences, new challenges have also followed. The dominant LoS link makes the confidential information transmitted by the UAV more easily intercepted by the warden on the ground due to the broadcast nature of the wireless channel in the UAV network. Some works have studied such security issues from the perspective of Physical Layer Security (PLS) [25,26,27]. Though PLS can protect the information content of wireless communications, it is highly necessary to hide legal communication behaviors in confidential or private scenarios, such as distributed ground reconnaissance systems.
Fortunately, covert communication technology can meet the requirements of hiding UAV information transmissions. In covert communication, the sender transmits information to the receiver in a covert manner to prevent the warden from detecting the wireless transmissions [28,29]. Bash et al. [30] proved that transmissions of exceeding O n bits of information will result in the warden’s detection error probability approaching zero. Goeckel et al. [31] showed that, when the warden cannot know the noise power accurately, the sender can covertly transmit O n bits of information to the receiver.
Yan et al. [32] analyzed the covert performance of air–ground wireless communication systems and then jointly optimized the transmission power and altitude of UAVs. Zhou et al. [33] assumed that the warden had an unlimited number of observations in each time-slot, and synergistically optimized the transmission power and trajectory of UAVs to maximize the covert throughput of the air–ground communication system. Wang et al. [34] improved the communication quality between the UAV and legitimate ground users (LGUs) outside the monitoring area to the greatest extent by jointly optimizing the transmission power and fixed position of the UAV. Jiang et al. [35] resolved the problem of robust resource allocation and UAV trajectory optimization to maximize the average covert rate of multiple LGUs.
From the above analysis, we can see that there are two shortcomings in existing research on UAV covert communication: (1) The single UAV or single user situation has been primarily studied, while multi-UAV or multi-user cases have been overlooked. (2) The influence of limited energy storage on continuous communication of user devices is not considered. As far as we know, there has been no technical attention to the orchestration of WPC and NOMA for multi-UAV-assisted covert communication. Therefore, this paper proposes a multi-UAV-assisted covert communication system, where WPC is utilized to provide wireless radio frequency energy to LGUs while C-NOMA is exploited to improve the system spectral efficiency. The contributions of this paper are summarized as follows.
  • A multi-UAV-assisted covert communication system based on WPC and C-NOMA is proposed. First, a traversal search strategy is adopted to dynamically cluster LGUs. NOMA is applied to intra-cluster LGUs, while TDMA is adopted by inter-clusters. For multi-user scenarios, we deploy multiple UAVs to serve LGUs. In the downlink sub-slot, LGUs collectively harvest energy from UAV wireless signals. In the uplink sub-slot, LGUs transmit data to UAVs while the warden attempts to detect data transmission between UAVs and LGUs with a limited number of observations.
  • The closed-form analytic expression of the minimum average detection error probability of the warden is derived. Specifically, when the warden can select the detection threshold, the expressions of false-alarm and missed-detection probability are derived, and then the detection error probability at the warden is determined. By analyzing the detection performance, the covertness constraint is determined. According to periodic flight mode, the covert communication performance of the proposed system is investigated.
  • A joint optimization scheme for multi-UAV trajectory and resource allocation is proposed. Since there are co-channel interferences between UAVs and LGUs in the uplink, the associated scheduling between UAVs and LGUs should be carefully designed to select the appropriate LGU to upload data to the specific UAV. The objective of this scheme is to maximize the average uplink covert rate of all clusters over the entire flight cycle by reasonably designing the cluster scheduling variable, sub-slot allocation, LGU transmit power and multi-UAV trajectory under the premise of the covertness constraints.
  • A high-efficiency algorithm is proposed. In order to enhance the performance of the covert communication system, an alternative iterative algorithm is proposed with respect to the cluster scheduling variable, sub-slot allocation, multi-UAV transmission power and trajectory. Specifically, the originally non-convex optimization problem is divided into four sub-problems. Then, each non-convex sub-problem is transformed into a convex one by variable relaxation and the successive convex approximation method and is then solved using the CVX tool. Finally, the optimization objective converges through alternate iterations.
The organizational structure of this paper is as follows. In Section 2, the multi-UAV-assisted covert communication system model is given, and then the corresponding optimization problem is formulated. In Section 3, the proposed algorithm and its derivations are presented. Section 4 gives the simulation parameters, numerical results and necessary discussions. Finally, Section 5 concludes this paper.

2. System Model and Problem Formulation

As shown in Figure 1, this paper considers a multi-UAV-assisted covert communication system based on WPC and C-NOMA, consisting of M UAVs, G legitimate ground users (LGUs) and a ground warden, M , G N + . In Figure 1, G LGUs are divided into J clusters, and each cluster contains K LGUs, G = J K , J , K N + , and j J = 1 , 2 , . . . , J , k K = 1 , 2 , . . . , K . The k-th LGU in the j-th cluster is denoted as G j , k , whose horizontal coordinate is expressed as W j , k = x j , k , y j , k T .
The UAVs transmit energy to LGUs, and LGUs transmit confidential information to UAVs, while the warden detects the communication behavior between UAVs and LGUs. Assume that each UAV flies at a fixed altitude H above the horizontal ground and has the same flight cycle T. Without losing generality, in a 3D Cartesian coordinate system, the horizontal coordinate of UAVs m M = 1 , 2 , . . . , M in timeslot l L = 1 , 2 , . . . , L is denoted as q m [ l ] = x m [ l ] , y m [ l ] T , and the warden’s position is expressed as q w = x w , y w T .
When all UAVs fly in periodic mode, the terminal position q m [ L ] coincides with the starting position q m [ 1 ] . Suppose that the UAVs have a constant speed in each timeslot, and the maximum speed of UAVs is denoted as V max . Therefore, the mobility constraints of UAVs can be written as follows.
q m [ 1 ] = q m [ L ] , m
| | q m [ l + 1 ] q m [ l ] | | 2 V max T L 2 , l = 1 , 2 , . . . , L 1
| | q m [ l ] q c [ l ] | | 2 d min 2 , m , l , m c
where d min stands for the minimum safe distance between UAVs. Each timeslot is partitioned into downlink sub-slot δ 0 [ l ] for energy transfer and uplink sub-slot δ 1 [ l ] for data transmission, respectively. As the air–ground wireless channel is dominated by the LoS link, the channel gains between the m-th UAV and the k-th LGU in the j-th cluster, and between the k-th LGU in the j-th cluster and the warden can be, respectively, represented as
h j , k l = β 0 d j , k 2 l , l , j , k
h gw l = β 0 d gw 2 l , l
where β 0 stands for the channel power gain at the unit distance d 0 = 1 m . d j , k [ l ] represents the distance between the k-th LGU in the j-th cluster and UAVs in the l-th timeslot, and d gw [ l ] represents the distance between the k-th LGU in the j-th cluster and the warden in the l-th timeslot, which are, respectively, written as
d j , k l = H 2 + q m l W j , k 2 , l , j , k
d gw l = H 2 + W j , k q w 2 , j , k , l
In particular, the channel power gain difference of intra-cluster LGUs in the j-th cluster in the l-th timeslot can be expressed as
Δ h j l = r = 1 N 1 h j , r + 1 l 2 h j , r l 2 , j , l
The sum of the channel power gains of all clusters in the l-th timeslot is given by
S l = j = 1 J Δ h j l , l
In the downlink, the energy harvested by the k-th LGU in the j-th cluster in the l-th timeslot LGUs can be written as
E j , k l = μ h j , k l P m l δ 0 l , l , j , k , m
where μ is the energy conversion efficiency, P m [ l ] denotes the transmit power of the m-th UAV in the l-th timeslot, satisfying the following constraint
0 P m l P max , l
In the uplink, LGUs upload data to UAVs by utilizing the harvested energy. The transmit power of the k-th LGU in the j-th cluster in the l-th timeslot is given by
P j , k l = E j , k l δ 1 l = μ h j , k l P m l δ 0 l δ 1 l , l , j , k , m
Assume that each UAV only communicates with an associated cluster in each timeslot. Define a binary UAV-cluster scheduling variable α j , m [ l ] . If the j-th cluster uploads data to the m-th UAV in sub-slot δ 1 [ l ] , then α j , m [ l ] = 1 ; otherwise, α j , m [ l ] = 0 . Hence, the scheduling variable is subject to the following constraints
α j , m l 0 , 1 , j , m , l
j = 1 J α j , m l 1 , m , l
m = 1 M α j , m l 1 , j , l
In the l-th timeslot, the uplink covert rate of the k-th LGU G j , k in the j-th cluster can be represented as
R j , k [ l ] = m = 1 M log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 , l
where N 0 stands for the noise power. b = k + 1 K P j , b [ l ] h j , b [ l ] represents the intra-cluster interference, c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] is the co-channel interference generated by UAV c ( c = 1 , . . . , M , c m ) to the j-th cluster when UAV m serves the j-th cluster in the l-th time slot. Therefore, the average uplink covert rate of the j-th cluster over the entire flight cycle of the UAVs can be written as
R j l = 1 L l = 1 L k = 1 K R j , k l , l , j
In covert communication, we suppose that the warden makes a limited number of observations and then determines whether there is data transmission between the UAVs and LGUs based on the received signals, i.e.,
y w ( i ) l = n w l , H 0 β 0 P j , k l H 2 + W j , k q w 2 x l + n w l , H 1
where the null hypothesis H 0 means that there is no data transmission between UAVs and LGUs, while the alternative hypothesis H 1 indicates that LGUs upload data. y w ( i ) [ l ] represents the signal received by the warden during the i-th detection in the l-th timeslot, i = 1 , 2 , . . . , I , x [ l ] stands for the transmitted signal of UAVs in the l-th timeslot, following the complex Gaussian distribution with mean value of 0 and variance of 1, and n w [ l ] represents the additive white Gaussian noise (AWGN) at the warden in the l-th timeslot. As such, the signal received by the warden is subject to
y w ( i ) l C N 0 , σ 2 , H 0 C N 0 , P j , k l h gw l + σ 2 , H 1
where σ 2 is the power of AWGN.
In practice, the warden may not accurately know the power of AWGN due to the dynamic nature of communication environments. Therefore, following [36], the noise uncertainty is considered in this paper. Noise power σ w 2 is a random variable subject to a known distribution. We assume that σ w , dB 2 [ σ ^ dB 2 ρ dB , σ ^ dB 2 + ρ dB ] follows a uniform distribution in the value range. Then, the probability density function (PDF) of σ w 2 is given by
f σ w 2 x = 1 2 x ln ρ , if 1 ρ σ ^ 2 x ρ σ ^ 2 , 0 , otherwise .
where σ w , dB 2 = 10 log 10 ( σ w 2 ) , σ ^ dB 2 = 10 log 10 ( σ ^ 2 ) , σ ^ 2 denotes the nominal noise power, ρ dB = 10 log 10 ( ρ ) is a parameter for measuring the uncertainty of noise, and ρ 1 .
Suppose that D 0 and D 1 , respectively, represent favorable decisions for H 0 and H 1 . The false alarm probability and the missed detection probability in the l-th timeslot are written as P FA l = Δ P ( D 1 | H 0 ) and P MD l = Δ P ( D 0 | H 1 ) . Define ξ l = P FA l + P MD l as the warden’s detection error probability in the l-th timeslot. The UAV goal is to make ξ [ l ] in each timeslot approach 1, which can be written as
ξ l = P FA l + P MD l 1 ε , l
where 0 ε 1 stands for an arbitrarily small value that determines the covertness constraint, also known as the coverage constraint.
The objective of this paper is to simultaneously optimize the cluster scheduling variable A = α j , m [ l ] , j , m , l , uplink sub-slot δ 1 = δ 1 l , l , downlink sub-slot δ 0 = δ 0 [ l ] , l , transmit power of LGUs P = p j , k [ l ] , j , k , l and multi-UAV trajectory Q = q m [ l ] , m , l under the premise of covertness constraints, to maximize the average uplink covert rate of all clusters over the entire flight cycle. The corresponding optimization problem can be written as
max A , δ 0 , δ 1 , P , Q 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K R j , k l λ , l
δ 0 l + δ 1 l δ , l
( 1 ) , ( 2 ) , ( 3 ) , ( 13 ) , ( 14 ) , ( 15 ) , ( 21 )

3. Proposed Solution

In this section, for the proposed mixed integer nonconvex optimization problem (22), we first decompose it into four sub-problems with respect to the cluster scheduling variable A , uplink and downlink sub-slots δ 1 and δ 0 , LGU transmit power P and multi-UAV trajectory Q . Then, the relaxation variable method and SCA technique are utilized to transform the corresponding subproblems into convex forms. Finally, the optimization objective is converged upon through alternate iterations.

3.1. Subslot Optimization

Given A , P and Q , the optimization problem with respect to sub-slots δ 1 and δ 0 can be described as follows
max δ 0 , δ 1 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K R j , k l λ , l
δ 0 l + δ 1 l δ , l
First, we simplify (23a) according to the following Lemma 1. Then, a resource allocation algorithm combined bisection method and Lagrangian multiplier method is proposed to optimize the uplink and downlink sub-slots.
Lemma 1.
For any given multi-UAV trajectory, the uplink covert rate of the j-th cluster can be written as
R j = 1 L l = 1 L k = 1 K R j , k [ l ] = 1 L l = 1 L m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ]
where a j , k [ l ] = μ h j , k 2 [ l ] P m [ l ] N 0 .
Proof. 
The detailed proof is presented in Appendix A.
According to Lemma 1, the objective function in (23a) can be expressed as
R j = 1 L l = 1 L k = 1 K R j , k [ l ] = 1 L l = 1 L m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ]
Then, the second-order partial derivatives of (25) with respect to δ 0 [ l ] and δ 1 [ l ] are, respectively, given by
2 R j δ 0 [ l ] 2 = 1 L ln 2 l = 1 L m = 1 M α j , m [ l ] k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] 2 δ 1 [ l ] δ 1 [ l ] + k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] 2 < 0
2 R j δ 1 [ l ] 2 = 1 L ln 2 l = 1 L m = 1 M α j , m [ l ] k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] 2 δ 1 [ l ] δ 1 [ l ] + k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] 2 < 0
Clearly, R j in (25) is concave with respect to δ 0 [ l ] and δ 1 [ l ] . As the constraints in (23b) and (23c) are affine functions, (23) is a convex optimization problem, which can be treated by the Lagrange multiplier method. The Lagrangian function is given as follows
= 1 L l = 1 L m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + α δ δ 0 [ l ] δ 1 [ l ] + β m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] λ
where α and β denote Lagrange multipliers. The first-order partial derivatives of (29) with respect to δ 0 [ l ] and δ 1 [ l ] are, respectively, represented as
δ 0 [ l ] = 1 ln 2 1 L + β m = 1 M α j , m [ l ] k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 1 [ l ] δ 1 [ l ] + k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] α
δ 1 [ l ] = 1 L + β m = 1 M α j , m [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] 1 ln 2 k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + k = 1 K a j , k [ l ] δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] α
According to the Karush–Kuhn–Tucker (KKT) conditions, the optimal solution can be obtained by setting (29) and (30) to zero. We let (29) be equal to (30), and then Equation (31) can be given by
m = 1 M α j , m [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] 1 ln 2 k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] + δ 1 [ l ] δ 1 [ l ] + k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 0 [ l ] = 0
According to the constraint (23c), (31) can be further expressed as (32)
m = 1 M α j , m [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ δ 0 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ δ 0 [ l ] 1 ln 2 k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ δ δ 0 [ l ] + k = 1 K a j , k [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 0 [ l ] = 0
It is easy to find from (32) that δ 0 [ l ] is the only variable. As such, the optimal downlink sub-slot δ 0 * [ l ] can be obtained by solving Equation (32). When the difference between the upper and lower thresholds of δ 0 [ l ] reaches a certain accuracy after multiple iterations, the bisection method can be adopted to iteratively search for the downlink sub-slot δ 0 * [ l ] . For the sake of making full use of the whole timeslot, the uplink sub-slot δ 1 * [ l ] can be selected as
δ 1 * [ l ] = δ δ 0 * [ l ]

3.2. UAV-Cluster Scheduling Optimization

Given δ 1 , δ 0 , P and Q , the optimization problem with respect to cluster scheduling variable A can be described as follows
max A 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K R j , k l λ , l
( ( 13 ) , ( 14 ) , ( 15 ) )
Due to the non-convexity of (34b) and binary variable A , (34) is also a mixed integer non-convex optimization problem. As such, we can relax α j , m [ l ] 0 , 1 to 0 α j , m [ l ] 1 , j , m , l and then introduce a relaxation variable { λ j , k [ l ] } . Thus, (34) can be rewritten as
max A , λ j , k l 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K m = 1 M α j , m [ l ] δ 1 [ l ] λ j , k [ l ] λ , j
log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 λ j , k [ l ] , j , k , m
0 α j , m [ l ] 1 , j , m , l
( 14 ) and ( 15 )
Clearly, the solution of (35) is also applicable to (34), because the two problems are equivalent to each other when (35c) takes the equal sign. Note that (35b) and (35c) are non-convex functions, and thus (35) is also a non-convex problem. It can be transformed into a convex optimization problem through a Taylor series expansion. Specifically, α j , m [ l ] λ j , k [ l ] in (35b) is first converted into the following form
α j , m [ l ] λ j , k [ l ] = α j , m [ l ] + λ j , k [ l ] 2 2 α j , m 2 l + λ j , k 2 l 2
Note that α j , m [ l ] + λ j , k [ l ] 2 in (36) is convex with respect to α j , m [ l ] and λ j , k [ l ] . The lower bound of α j , m [ l ] + λ j , k [ l ] 2 can be obtained through Taylor series expansion as
α j , m [ l ] + λ j , k [ l ] 2 θ j , m l ˜ b [ l ] = α j , m l ˜ [ l ] + λ j , k l ˜ [ l ] 2 + 2 α j , m l ˜ [ l ] + λ j , k l ˜ [ l ] α j , m [ l ] α j , m l ˜ [ l ] + 2 α j , m l ˜ [ l ] + λ j , k l ˜ [ l ] λ j , k [ l ] λ j , k l ˜ [ l ]
Clearly, the left side of (35c) is convex with respect to α c , f [ l ] . Similarly, the lower bound of R j , k [ l ] can be obtained by its first-order Taylor series expansion. Thus, we have the following derivations
R j , k [ l ] = log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 R j , k l b ˜ [ l ]
where
R j , k l b ˜ [ l ] = log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f l ˜ [ l ] P f , k [ l ] h f , k [ l ] + N 0 c = 1 , c m M f = 1 J k = 1 K P f , k [ l ] h f , k [ l ] × P j , k [ l ] h j , k [ l ] log 2 ( e ) × α c , f [ l ] α c , f l ˜ [ l ] b = k K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f l ˜ [ l ] P f , k [ l ] h f , k [ l ] + N 0 b = k K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f l ˜ [ l ] P f , k [ l ] h f , k [ l ] + N 0
Now, (34) has been transformed into a convex optimization problem (40) as follows
max A , λ j , k l 1 L l = 1 L k = 1 K R j , k l
s . t . 1 L l = 1 L k = 1 K m = 1 M δ 1 [ l ] θ j , m l b ˜ [ l ] α j , m 2 [ l ] + λ j , k 2 [ l ] 2 λ , j
R j , k l b ˜ [ l ] λ j , k [ l ] , j , k , m
( 14 ) , ( 15 ) and ( 35 d )

3.3. Transmit Power Optimization

Given δ 1 , δ 0 , A and Q , the optimization problem with respect to the LGU transmit power P can be described as follows
max P 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 λ
( 21 )
P j , k l 0 , j , k , l
To facilitate derivations, the logarithmic function in (41b) can be written as the difference between two concave functions with respect to P j , b l , as follows
R j , k [ l ] = log 2 b = k K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 R ˜ f , m [ l ]
where
R ˜ f , m [ l ] = log 2 b = k + 1 K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0
To further deal with (41b), in each iteration, we can replace R ˜ f , m [ l ] with its first-order Taylor series expansion to convert (43) into a convex constraint with respect to P j , b l . For P j , b ( l ˜ ) l in the l ˜ -th iteration, we have the following derivations
R ˜ f , m [ l ] R ˜ f , m ub [ l ] = log 2 b = k + 1 K P j , b l ˜ [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k l ˜ [ l ] h f , k [ l ] + N 0 + B j , m [ l ] P j , b [ l ] P j , b l ˜ [ l ]
where
B j , m [ l ] = c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] h f , k [ l ] log 2 e g = 1 , g m M f = 1 J k = 1 K α g , f ˜ [ l ] P f ˜ , k ˜ l ˜ [ l ] h f ˜ , k ˜ [ l ] + b ˜ = k ˜ + 1 K P f ˜ , b ˜ l ˜ [ l ] h f ˜ , b ˜ [ l ] + N 0
We can obtain R ˜ f , m ub [ l ] as the upper bound of R ˜ f , m [ l ] in the Taylor series expansion. We assume that the warden can always obtain the minimum value of ξ by utilizing the optimized τ . To this end, it is necessary to first derive the optimal solution τ that can minimize ξ . Considering the noise uncertainty at the warden, ξ can be expressed as
ξ = P FA + P MD = σ w 2 > τ + P j , k [ l ] h gw [ l ] + σ w 2 < τ = 1 τ P j , k [ l ] h gw [ l ] < σ w 2 < τ = 1 max τ P j , k [ l ] h gw [ l ] , σ ^ 2 ρ τ f σ w 2 x d x
where f σ w 2 ( x ) is given in (20). τ is the detection threshold at the l-th time slot.
The first derivative of ξ with respect to τ is given by
d ξ d τ = 1 2 ln ρ × 1 τ , τ P j , k [ l ] h gw [ l ] + σ ^ 2 ρ 1 2 ln ρ 1 τ 1 τ P j , k [ l ] h gw [ l ] , τ > P j , k [ l ] h gw [ l ] + σ ^ 2 ρ
When τ P j , k [ l ] h gw [ l ] + σ ^ 2 / ρ , ξ is a decreasing function. When τ > P j , k [ l ] h gw [ l ] + σ ^ 2 / ρ , ξ is an increasing function. Therefore, we have
τ min = P j , k [ l ] h gw [ l ] + σ ^ 2 ρ
Substituting (48) into (46), then we have
ξ min = 1 1 2 ln ρ ln 1 + ρ P j , k [ l ] h gw [ l ] σ ^ 2
Substituting (49) into problem (41c), the original problem can be expressed as
ln 1 + ρ P j , k [ l ] h gw [ l ] σ ^ 2 2 ε ln ρ
Note that (50) is a concave function with respect to P j , k [ l ] . It is known that the first-order approximation of any concave function is its upper bound. Therefore, for any given feasibility point P ˜ j , k [ l ] , l , we have
ln 1 + ρ P j , k [ l ] h gw [ l ] σ ^ 2 g 1 P j , k [ l ] , P ˜ j , k [ l ] , l
where
g 1 P j , k [ l ] , P ˜ j , k [ l ] = ln 1 + ρ P ˜ j , k [ l ] h gw l σ ^ 2 + ρ h gw l P j , k [ l ] P ˜ j , k [ l ] σ ^ 2 + ρ P ˜ j , k [ l ] h gw l , j , k , l
Note that any given feasibility point P ˜ j , k [ l ] , l , g 1 ( P j , k [ l ] , P ˜ j , k [ l ] ) is a linear function with respect to transmit power P j , k [ l ] . Thus, g 1 ( P j , k [ l ] , P ˜ j , k [ l ] ) is a convex function.
Hence, (41) can be rearranged as follows
max P 1 L l = 1 L k = 1 K R j , k l
s . t . k = 1 K m = 1 M α j , m [ l ] δ 1 [ l ] log 2 b = k K P j , b [ l ] h j , b [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] h f , k [ l ] + N 0 R ˜ f , m u b [ l ] λ , j
g 1 P j , k [ l ] , P ˜ j , k [ l ] 2 ε ln ρ
P j , k l 0 , j , k , l

3.4. UAV Trajectory Optimization

Given δ 1 , δ 0 , A and P , we introduce a slack variable s 1 , and then the optimization problem with respect to multi-UAV trajectory Q can be formulated as follows
max Q 1 L l = 1 L s 1
s . t . s 1 k = 1 K R j , k [ l ]
s 1 λ
( 1 ) , ( 2 ) , ( 3 ) , ( 21 )
Since constraint (54b) is non-convex with respect to Q , it is difficult to directly solve (54). The approximate solution of problem (54) can be obtained by adopting the successive convex approximation technique. The following Theorem 1 transforms (54) into a convex problem. Before Theorem 1 is given, the non-convex constraint (54b) is converted into a convex one using Lemma 2 below.
Lemma 2.
We can transform constraint (54b) into the following convex form
s 1 R ˜ l b ˜
where
R ˜ l b ˜ = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + β j , k [ l ] H 2 + | | q m l ˜ [ l ] W j , k | | 2 1 ln 2 m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] β j , k [ l ] | | q m [ l ] W j , k | | 2 | | q m l ˜ [ l ] W j , k | | 2 H 2 + | | q m l ˜ [ l ] W j , k | | 2 2 + β j , k [ l ] H 2 + | | q m l ˜ [ l ] W j , k | | 2
Proof. 
The detailed proof is presented in Appendix B.
Similar to the method of (41c), (21) can be transformed as follows
ln 1 + ρ P m [ l ] β 0 σ ^ 2 ( H 2 + q m l q w 2 ) 2 ε ln ρ
Note that (57) is convex with respect to q m l q w 2 ; thus, (54 g) is a convex function.
In particular, we have
| | q m [ l ] q u [ l ] | | 2 | | q m l ˜ [ l ] q u l ˜ [ l ] | | 2 + 2 q m l ˜ [ l ] q u l ˜ [ l ] T × q m [ l ] q u [ l ]
According to Lemma 2, the following Theorem 1 turns (54) into a convex constraint problem.
Theorem 1.
Given Q l ˜ = q l ˜ [ l ] , l , after ( l ˜ + 1 ) -th iterations, (54) is transformed as
max Q 1 L l = 1 L s 1
s . t . s 1 R ˜ l b ˜
s 1 λ
( 1 ) , ( 2 ) , ( 58 )
ln 1 + ρ P m [ l ] β 0 σ ^ 2 ( H 2 + q m l q w 2 ) 2 ε ln ρ
Proof of Theorem 1.
According to Lemma 2, we can obtain the lower bound of k = 1 K R j , k [ l ]  as
k = 1 K R j , k [ l ] > R ˜ l b ˜
As R ˜ l b ˜ is convex with respect to Q , we can see that the objective function and the constraints in (59) are convex. Hence, (59) is a convex optimization problem that can be solved with the CVX tool.
The proof is completed.
   □

3.5. Proposed Algorithm

Algorithm 1 exhibits the complete steps of the proposed iterative algorithm.
Algorithm 1: The Iterative Algorithm to Solve Problem (22).
1 Initialize: A ( 0 ) , δ 0 ( 0 ) δ 1 ( 0 ) , P ( 0 ) , Q ( 0 ) and l ˜ = 0 .
2 Repeat
3      Solve problem (23) with given A ( l ˜ ) , P ( l ˜ ) and Q ( l ˜ ) , and then denote the solution as δ 0 ( l ˜ + 1 ) δ 1 ( l ˜ + 1 ) .
4      Solve problem (35) with given δ 0 ( l ˜ + 1 ) δ 1 ( l ˜ + 1 ) , P ( l ˜ ) and Q ( l ˜ ) , and then denote the solution as A ( l ˜ + 1 ) .
5      Solve problem (42) with given δ 0 ( l ˜ + 1 ) δ 1 ( l ˜ + 1 ) , A ( l ˜ + 1 ) and Q ( l ˜ ) , and then denote the solution as P ( l ˜ + 1 ) .
6      Solve problem (55) with given δ 0 ( l ˜ + 1 ) δ 1 ( l ˜ + 1 ) , A ( l ˜ + 1 ) and P ( l ˜ + 1 ) , and then denote the solution as Q ( l ˜ + 1 ) .
7      Update l ˜ = l ˜ + 1 .
8 Until: The increment of the objective value is below a predefined threshold.

4. Numerical Results and Discussion

The simulation results are presented in this section to verify the effectiveness of the proposed joint optimization scheme. The simulation parameters are as follows. A multi-UAV-assisted covert communication system consisting of M = 2 UAVs, G = 12 LGUs and a warden is considered. All LGUs are randomly distributed in an area of 1000 × 1000 m 2 . LGUs are divided into J = 6 clusters, and each cluster contains K = 2 LGUs.
Suppose that the UAVs fly at a fixed altitude H = 100 m with a flight cycle T = 60 s. The number of timeslots is N = 60 , and thus each timeslot lasts δ = 1 s. The maximum flight speed of the UAVs is V max = 40 m/s. The noise power, channel power gain and energy conversion efficiency are, respectively, set as N 0 = 120 dBm, β 0 = 20 dB and μ = 0.85 . The maximum and minimum thresholds of δ 0 [ l ] are rendered as δ 0 [ l ] max = 0.9999 and δ 0 [ l ] min = 0.0001 when we utilize the bisection method to search for the optimal downlink sub-slot [12].
The remaining parameters are set as ρ dB = 3 , ε = 0.005 and σ ^ 2 = 120 , respectively. For simplicity, the initial trajectories of UAV1 and UAV2 are designed as circles [37]. Specifically, we first calculate the geometric center of the horizontal ordinates of all LGUs as L d = j = 1 J k = 1 K W j , k / ( J × K ) = L x , L y T to determine the half of the distance between L d and the farthest LGU as r d = max W j , k L d / 2 , j , k . Then, we set the centers of the initial trajectories as O 1 = L x r d , L y T and O 2 = L x + r d , L y T and the radius as r 1 = r 2 = min r d / 2 , V max T / 2 π . Hence, the position of the UAV m in timeslot l is given by
q m ( 0 ) l = x m + r m sin 2 π ( l 1 ) L 1 , y m + r m cos 2 π ( l 1 ) L 1 T
Figure 2 shows the optimized multi-UAV trajectory for different warden positions. Here, two representative warden positions are selected to verify the effectiveness of the proposed algorithm. As expected, it can be seen that the UAVs fly as close to the LGUs as possible while keeping away from the warden by adjusting their respective trajectories. Specifically, UAV1 flies faster near the warden but slower near the LGUs mainly because this contributes to maintaining better channel conditions and improving the average uplink covert rate of LGUs.
The trajectory trend of UAV2 is similar to that of UAV1. It can be seen from Figure 2a,b that UAV1 and UAV2 cannot approach LGUs that are far apart from geometric center L d due to the limitations of the flight cycle and maximum flight speed. Instead, they relinquish some distant LGUs to achieve the optimization objective. In fact, UAV1 and UAV2 prefer to serve LGUs with better channel conditions to improve the average uplink covert rate.
Figure 3 shows the UAV flight speed when the warden is located at 450 , 450 T . It can be seen that UAV1 has a higher flight speed in the first eight timeslots, while UAV2 has a higher flight speed in timeslots 25–34. Combined with Figure 2a, we found that UAV1 and UAV2 fly away from the warden in the same timeslots, which can greatly reduce the correctness of the warden’s decision. In timeslots 20–28 and 48–54, UAV1 maintains a low flight speed because it needs to hover above the LGUs it serves for a period to receive more information. In the remaining time, UAV1 must fly to the next LGU as soon as possible at a higher speed. The speed trend of UAV2 is similar to that of UAV1.
Figure 4 shows the optimized multi-UAV trajectory for different coverage constraints. Note that the distance between the UAVs and the warden decreases when ε decreases gradually. Intuitively, we can expect that, as the coverage constraint becomes more stringent, the distance between the UAVs and the warden will become larger, which is, however, inconsistent with the above simulation results. This is mainly because, although the proposed scheme synergistically optimizes the UAV transmit power and trajectory, the transmit power has a greater impact on the effect of covert communication.
Essentially, covert communication is a technology that effectively prevents information from being intercepted, identified and located by the warden via controlling the characteristics of wireless signals. Hence, compared with ε = 0.005 , UAV1 and UAV2 have higher transmit power when ε = 0.01 while flying farther away from the warden. The UAV trajectory trend for ε = 0.0005 is similar to those for ε = 0.01 and ε = 0.005 . The simulation results in Figure 5 also confirm this interpretation.
Figure 5 shows the multi-UAV transmit power under different coverage constraints. Note that the transmit power of UAV1 and UAV2 for ε = 0.01 is greater than that for ε = 0.005 and ε = 0.0005 , which allows the UAVs to transmit with a higher power, thus, obtaining a higher average uplink covert rate. It can be seen that UAV1 has lower transmit power in timeslots 4–6, while UAV2 has lower transmit power in timeslots 25–35. Combined with Figure 4, it can be found that UAV1 and UAV2 fly away from the warden with low transmit power to ensure the covertness constraint in the same timeslots. In addition, the transmit power of UAV1 and UAV2 presents an opposite variation trend because the UAVs have to adjust their respective transmit power to relieve the co-channel interference.
Figure 6 presents the average uplink covert rate versus noise uncertainty for different coverage constraints. It can be seen from Figure 6 that the average uplink covert rate improves with the increase in noise uncertainty, which is because a greater noise uncertainty will increase the difficulty for the warden to make correct decisions when detecting the transmission behavior between the UAVs and LGUs. Therefore, the increase in noise uncertainty can not only enhance information transmission between the UAVs and LGUs but also satisfy more strict covertness constraints. In addition, Figure 6 also confirms that a more loose coverage constraint helps to improve the average uplink covert rate.
Figure 7 shows the average uplink covert rates of all LGUs under different schemes. Five schemes were selected for comparison in the simulation. Scheme 1: The initial cluster scheduling variable, sub-slot duration, LGU transmit power and multi-UAV trajectories. Scheme 2: Only the sub-slot duration, LGU transmit power and multi-UAV trajectories are optimized. Scheme 3: Only the cluster scheduling variable, sub-slot duration and multi-UAV trajectories are optimized. Scheme 4: Only the cluster scheduling variable, LGU transmit power and multi-UAV trajectories are optimized. Scheme 5: Synergistically optimize the cluster scheduling variable, sub-slot duration, LGU transmit power and multi-UAV trajectory, i.e., the proposed joint optimization scheme.
It can be seen from Figure 7 that the average uplink covert rate of all LGUs for the proposed scheme is significantly higher than that of other schemes. It is observed that the average uplink covert rate of the five schemes is enhanced with the increase in the flight cycle, which is because a large flight cycle can provide more time to the UAVs to hover above each LGU and receive more information, thereby, greatly improving the covert transmission rate. In addition, it is noted that, compared with the cluster scheduling variable and sub-slot duration optimization, the transmit power optimization of LGUs has a greater impact on the average uplink covert rate.
Figure 8 shows the average uplink covert rate of all LGUs under different multiple access schemes. Here, the C-NOMA adopted in this paper is compared with OFDMA. As a typical OMA scheme, OFDMA divides the transmission bandwidth into several orthogonal non-overlapping subbands so that each LGU has an exclusive subband. As shown in Figure 8, the C-NOMA scheme is superior to OFDMA under the same conditions because intra-cluster NOMA can boost the spectral efficiency and elevate the average uplink covert rate.

5. Conclusions

Aiming at secure communication in multi-user scenarios, in this paper, we proposed a multi-UAV-assisted covert communication system based on WPC and C-NOMA. Specifically, UAVs exploited WPC to transmit energy and data with LGUs in the presence of a warden. NOMA was applied to intra-cluster LGUs, while TDMA was adopted by inter-clusters to achieve an excellent trade-off between high frequency spectral efficiency and system complexity. In addition, a joint optimization scheme of the cluster scheduling variable, sub-slot allocation, LGU transmit power and multi-UAV trajectory was proposed to maximize the average uplink covert rate.
Furthermore, an iterative algorithm was proposed to achieve the optimization objective. The simulation results validate the following conclusions. First, compared with the benchmark schemes, the proposed joint optimization scheme effectively improved the average uplink covert rate of all clusters in each timeslot. Secondly, UAVs achieved covert transmission while minimizing multi-user interference by actively adjusting the flight speed and transmit power. Furthermore, the looser covertness constraint and greater noise uncertainty helped to improve the average uplink covert rate. Finally, the proposed algorithm demonstrated good convergence and could adaptively adjust the multi-UAV trajectory according to the warden’s position.

Author Contributions

Conceptualization, X.Q.; methodology, X.W., Y.L. and Y.Z.; software, X.W., Y.L. and Y.Z.; investigation, X.W., Y.L. and Y.Z.; writing—original draft preparation, X.Q.; visualization, X.Q.; supervision, X.W. and M.X.; project administration, X.W. and M.X.; funding acquisition, X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 1. 
Substituting (12) into (16), k = 1 K R j , k [ l ] can be simplified as
k = 1 K R j , k [ l ] = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + μ h j , k 2 [ l ] P m [ l ] δ 0 [ l ] δ 1 [ l ] b = k + 1 K μ h j , b 2 [ l ] P m [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] μ h f , k 2 [ l ] P m [ l ] δ 0 [ l ] δ 1 [ l ] + N 0 = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + a j , k [ l ] δ 0 [ l ] δ 1 [ l ] b = k + 1 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 b = k K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 b = k + 1 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 b = 1 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 b = 2 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 . b = 2 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 b = 3 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 . . . b = k 1 K a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 a j , b [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 × a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ] + 1 = m = 1 M α j , m [ l ] δ 1 [ l ] log 2 1 + k = 1 K a j , k [ l ] δ 0 [ l ] δ 1 [ l ] + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] a f , k [ l ] δ 0 [ l ] δ 1 [ l ]
The proof is completed. □

Appendix B

Proof of Lemma 2. 
According to (16), the uplink covert rate k = 1 K R j , k [ l ] of the j-th cluster satisfies the following expression
k = 1 K R j , k [ l ] = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] β 0 H 2 + | | q m [ l ] W j , b | | 2 + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] β 0 H 2 + | | q m [ l ] W f , k | | 2 + N 0 > m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + P j , k [ l ] h j , k [ l ] b = k + 1 K P j , b [ l ] β 0 H 2 + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] β 0 H 2 + N 0 = R ˜
Clearly, inequality k = 1 K R j , k [ l ] > R ˜ holds.
Let β j , k [ l ] = P j , k [ l ] β 0 b = k + 1 K P j , b [ l ] β 0 H 2 + c = 1 , c m M f = 1 J k = 1 K α c , f [ l ] P f , k [ l ] β 0 H 2 + N 0 .
Then, R ˜ can be further simplified as
R ˜ = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + β j , k [ l ] H 2 + | | q m [ l ] W j , k | | 2
At this point, R ˜ is still non-convex. It is easy to observe that the lower bound of the convex function can be obtained through Taylor series expansion. Therefore, the first-order Taylor series expansion of the left side of (A3) is given as follows
R ˜ A l ˜ [ l ] + B l ˜ [ l ] | | q m [ l ] W j , k | | 2 | | q m l ˜ [ l ] W j , k | | 2 = R ˜ l b ˜
where
A l ˜ [ l ] = m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] log 2 1 + β j , k [ l ] H 2 + | | q m l ˜ [ l ] W j , k | | 2
B l ˜ [ l ] = 1 ln 2 m = 1 M k = 1 K α j , m [ l ] δ 1 [ l ] β j , k [ l ] H 2 + | | q m l ˜ [ l ] W j , k | | 2 2 + β j , k [ l ] H 2 + | | q m l ˜ [ l ] W j , k | | 2
Since q m l ˜ [ l ] and q m [ l ] stand for the obtained trajectory in the l ˜ -th and ( l ˜ + 1 ) -th iterations, A l ˜ [ l ] and B l ˜ [ l ] are constants. The lower bound R ˜ lb ˜ of R ˜ can be obtained using a Taylor series expansion, which is convex with respect the multi-UAV trajectory Q . Thus, we can find the convex constraint (55).
The proof is completed. □

References

  1. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef] [Green Version]
  2. Na, Z.; Li, B.; Liu, X.; Wang, J.; Zhang, M.; Liu, Y.; Mao, B. UAV-Based Wide-Area Internet of Things: An Integrated Deployment Architecture. IEEE Netw. 2021, 35, 122–128. [Google Scholar] [CrossRef]
  3. Lu, J.; Tang, M. Performance Analysis for IRS-Assisted MEC networks with Unit Selection. Phys. Commun. 2022, 55, 101869. [Google Scholar] [CrossRef]
  4. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-Assisted Emergency Networks in Disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar] [CrossRef] [Green Version]
  5. Lyu, J.; Zeng, Y.; Zhang, R. Cyclical Multiple Access in UAV-Aided Communications: A Throughput-Delay Tradeoff. IEEE Wirel. Commun. Lett. 2016, 5, 600–603. [Google Scholar] [CrossRef] [Green Version]
  6. Li, B.; Na, Z.; Lin, B. UAV Trajectory Planning from a Comprehensive Energy Efficiency Perspective in Harsh Environments. IEEE Netw. 2022, 36, 62–68. [Google Scholar] [CrossRef]
  7. Liu, C.H.; Chen, Z.; Tang, J.; Xu, J.; Piao, C. Energy-Efficient UAV Control for Effective and Fair Communication Coverage: A Deep Reinforcement Learning Approach. IEEE J. Sel. Areas Commun. 2018, 36, 2059–2070. [Google Scholar] [CrossRef]
  8. Ye, H.T.; Kang, X.; Joung, J.; Liang, Y.C. Optimization for Full-Duplex Rotary-Wing UAV-Enabled Wireless-Powered IoT Networks. IEEE Trans. Wirel. Commun. 2020, 19, 5057–5072. [Google Scholar] [CrossRef]
  9. Yu, Y.; Tang, J.; Huang, J.; Zhang, X.; Thus, D.K.C.; Wong, K.K. Multi-Objective Optimization for UAV-Assisted Wireless Powered IoT Networks Based on Extended DDPG Algorithm. IEEE Trans. Commun. 2021, 69, 6361–6374. [Google Scholar] [CrossRef]
  10. Khairy, S.; Balaprakash, P.; Cai, L.X.; Cheng, Y. Constrained Deep Reinforcement Learning for Energy Sustainable Multi-UAV Based Random Access IoT Networks With NOMA. IEEE J. Sel. Areas Commun. 2021, 39, 1101–1115. [Google Scholar] [CrossRef]
  11. Feng, W.; Tang, J.; Zhao, N.; Fu, Y.; Zhang, X.; Cumanan, K.; Wong, K.K. NOMA-based UAV-aided networks for emergency communications. China Commun. 2020, 17, 54–66. [Google Scholar] [CrossRef]
  12. Na, Z.; Liu, Y.; Shi, J.; Liu, C.; Gao, Z. UAV-Supported Clustered NOMA for 6G-Enabled Internet of Things: Trajectory Planning and Resource Allocation. IEEE Internet Things J. 2021, 8, 15041–15048. [Google Scholar] [CrossRef]
  13. Cao, Y.; Zhao, N.; Chen, Y.; Jin, M.; Fan, L.; Ding, Z.; Yu, F.R. Privacy Preservation via Beamforming for NOMA. IEEE Trans. Wirel. Commun. 2019, 18, 3599–3612. [Google Scholar] [CrossRef] [Green Version]
  14. Jia, M.; Zhang, X.; Sun, J.; Gu, X.; Guo, Q. Intelligent Resource Management for Satellite and Terrestrial Spectrum Shared Networking toward B5G. IEEE Wirel. Commun. 2020, 27, 54–61. [Google Scholar] [CrossRef]
  15. Ding, Z.; Lei, X.; Karagiannidis, G.K.; Schober, R.; Yuan, J.; Bhargava, V.K. A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends. IEEE J. Sel. Areas Commun. 2017, 35, 2181–2195. [Google Scholar] [CrossRef] [Green Version]
  16. Benjebbour, A.; Saito, Y.; Kishiyama, Y.; Li, A.; Harada, A.; Nakamura, T. Concept and practical considerations of non-orthogonal multiple access (NOMA) for future radio access. In Proceedings of the 2013 International Symposium on Intelligent Signal Processing and Communication Systems, Naha, Japan, 12–15 November 2013; pp. 770–774. [Google Scholar] [CrossRef]
  17. Islam, S.M.R.; Zeng, M.; Dobre, O.A.; Kwak, K.S. Resource Allocation for Downlink NOMA Systems: Key Techniques and Open Issues. IEEE Wirel. Commun. 2018, 25, 40–47. [Google Scholar] [CrossRef] [Green Version]
  18. Ding, Z.; Liu, Y.; Choi, J.; Sun, Q.; Elkashlan, M.; Chih-Lin, I.; Poor, H.V. Application of Non-Orthogonal Multiple Access in LTE and 5G Networks. IEEE Commun. Mag. 2017, 55, 185–191. [Google Scholar] [CrossRef] [Green Version]
  19. Al-Abbasi, Z.Q.; Thus, D.K.C. Resource Allocation in Non-Orthogonal and Hybrid Multiple Access System with Proportional Rate Constraint. IEEE Trans. Wirel. Commun. 2017, 16, 6309–6320. [Google Scholar] [CrossRef] [Green Version]
  20. Jia, M.; Gao, Z.; Guo, Q.; Lin, Y.; Gu, X. Sparse Feature Learning for Correlation Filter Tracking toward 5G-Enabled Tactile Internet. IEEE Trans. Ind. Inform. 2020, 16, 1904–1913. [Google Scholar] [CrossRef]
  21. Zeng, J.; Lv, T.; Liu, R.P.; Su, X.; Peng, M.; Wang, C.; Mei, J. Investigation on Evolving Single-Carrier NOMA Into Multi-Carrier NOMA in 5G. IEEE Access 2018, 6, 48268–48288. [Google Scholar] [CrossRef]
  22. Yadav, A.; Quan, C.; Varshney, P.K.; Poor, H.V. On Performance Comparison of Multi-Antenna HD-NOMA, SCMA, and PD-NOMA Schemes. IEEE Wirel. Commun. Lett. 2021, 10, 715–719. [Google Scholar] [CrossRef]
  23. Liu, X.; Ding, H.; Hu, S. Uplink Resource Allocation for NOMA-Based Hybrid Spectrum Access in 6G-Enabled Cognitive Internet of Things. IEEE Internet Things J. 2021, 8, 15049–15058. [Google Scholar] [CrossRef]
  24. Qin, P.; Zhu, Y.; Zhao, X.; Feng, X.; Liu, J.; Zhou, Z. Joint 3D-Location Planning and Resource Allocation for XAPS-Enabled C-NOMA in 6G Heterogeneous Internet of Things. IEEE Trans. Veh. Technol. 2021, 70, 10594–10609. [Google Scholar] [CrossRef]
  25. Feng, Y.; Yan, S.; Yang, Z.; Yang, N.; Yuan, J. Beamforming Design and Power Allocation for Secure Transmission with NOMA. IEEE Trans. Wirel. Commun. 2019, 18, 2639–2651. [Google Scholar] [CrossRef] [Green Version]
  26. Na, Z.; Ji, C.; Lin, B.; Zhang, N. Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things. IEEE Internet Things J. 2022, 9, 16284–16296. [Google Scholar] [CrossRef]
  27. Zhang, L.; Gao, C. Deep Reinforcement Learning based IRS-assisted Mobile Edge Computing under Physical-Layer Security. Phys. Commun. 2022, 55, 101896. [Google Scholar] [CrossRef]
  28. Du, H.; Niyato, D.; Xie, Y.A.; Cheng, Y.; Kang, J.; Kim, D.I. Performance Analysis and Optimization for Jammer-Aided Multiantenna UAV Covert Communication. IEEE J. Sel. Areas Commun. 2022, 40, 2962–2979. [Google Scholar] [CrossRef]
  29. Yan, S.; Hanly, S.V.; Collings, I.B. Optimal Transmit Power and Flying Location for UAV Covert Wireless Communications. IEEE J. Sel. Areas Commun. 2021, 39, 3321–3333. [Google Scholar] [CrossRef]
  30. Bash, B.A.; Goeckel, D.; Towsley, D. Limits of Reliable Communication with Low Probability of Detection on AWGN Channels. IEEE J. Sel. Areas Commun. 2013, 31, 1921–1930. [Google Scholar] [CrossRef]
  31. Goeckel, D.; Bash, B.; Guha, S.; Towsley, D. Covert Communications When the Warden Does Not Know the Background Noise Power. IEEE Commun. Lett. 2016, 20, 236–239. [Google Scholar] [CrossRef]
  32. Yan, S.; Hanly, S.V.; Collings, I.B.; Goeckel, D.L. Hiding Unmanned Aerial Vehicles for Wireless Transmissions by Covert Communications. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
  33. Zhou, X.; Yan, S.; Hu, J.; Sun, J.; Li, J.; Shu, F. Joint Optimization of a UAV’s Trajectory and Transmit Power for Covert Communications. IEEE Trans. Signal Process. 2019, 67, 4276–4290. [Google Scholar] [CrossRef] [Green Version]
  34. Wang, H.M.; Zhang, Y.; Zhang, X.; Li, Z. Secrecy and Covert Communications Against UAV Surveillance via Multi-Hop Networks. IEEE Trans. Commun. 2020, 68, 389–401. [Google Scholar] [CrossRef] [Green Version]
  35. Jiang, X.; Yang, Z.; Zhao, N.; Chen, Y.; Ding, Z.; Wang, X. Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications. IEEE Trans. Veh. Technol. 2021, 70, 1989–1994. [Google Scholar] [CrossRef]
  36. He, B.; Yan, S.; Zhou, X.; Lau, V.K.N. On Covert Communication With Noise Uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef] [Green Version]
  37. Wang, J.; Na, Z.; Liu, X. Collaborative Design of Multi-UAV Trajectory and Resource Scheduling for 6G-Enabled Internet of Things. IEEE Internet Things J. 2021, 8, 15096–15106. [Google Scholar] [CrossRef]
Figure 1. Multi-UAV-assisted covert communication system.
Figure 1. Multi-UAV-assisted covert communication system.
Electronics 11 04056 g001
Figure 2. Optimized multi-UAV trajectory for different warden positions. (a) The warden is located at 450 , 450 T . (b) The warden is located at 580 , 540 T .
Figure 2. Optimized multi-UAV trajectory for different warden positions. (a) The warden is located at 450 , 450 T . (b) The warden is located at 580 , 540 T .
Electronics 11 04056 g002
Figure 3. The UAV flight speed when the warden is located at 450 , 450 T .
Figure 3. The UAV flight speed when the warden is located at 450 , 450 T .
Electronics 11 04056 g003
Figure 4. Optimized multi-UAV trajectory for different coverage constraints.
Figure 4. Optimized multi-UAV trajectory for different coverage constraints.
Electronics 11 04056 g004
Figure 5. The UAVs’ transmit power for different coverage constraints. (a) UAV1 transmit power; (b) UAV2 transmit power.
Figure 5. The UAVs’ transmit power for different coverage constraints. (a) UAV1 transmit power; (b) UAV2 transmit power.
Electronics 11 04056 g005
Figure 6. The average uplink covert rate under different noise uncertainties.
Figure 6. The average uplink covert rate under different noise uncertainties.
Electronics 11 04056 g006
Figure 7. The average uplink covert rate for different optimization schemes.
Figure 7. The average uplink covert rate for different optimization schemes.
Electronics 11 04056 g007
Figure 8. The average uplink covert rates for C-NOMA and OFDMA.
Figure 8. The average uplink covert rates for C-NOMA and OFDMA.
Electronics 11 04056 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Qin, X.; Wu, X.; Xiong, M.; Liu, Y.; Zhang, Y. Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization. Electronics 2022, 11, 4056. https://doi.org/10.3390/electronics11234056

AMA Style

Qin X, Wu X, Xiong M, Liu Y, Zhang Y. Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization. Electronics. 2022; 11(23):4056. https://doi.org/10.3390/electronics11234056

Chicago/Turabian Style

Qin, Xiaofei, Xu Wu, Mudi Xiong, Ye Liu, and Yue Zhang. 2022. "Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization" Electronics 11, no. 23: 4056. https://doi.org/10.3390/electronics11234056

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop