Next Article in Journal
Robust Collision-Free Guidance and Control for Underactuated Multirotor Aerial Vehicles
Next Article in Special Issue
A Non-Stationary Cluster-Based Channel Model for Low-Altitude Unmanned-Aerial-Vehicle-to-Vehicle Communications
Previous Article in Journal
Efficient Focus Autoencoders for Fast Autonomous Flight in Intricate Wild Scenarios
Previous Article in Special Issue
MobileRaT: A Lightweight Radio Transformer Method for Automatic Modulation Classification in Drone Communication Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Joint Optimization of UAV-Assisted Covert Communication Systems with NOMA for Hydropower Internet of Things

1
State Grid Corporation of China, Beijing 100031, China
2
State Grid Electric Power Research Institute, Nanjing 210003, China
3
State Grid Xin Yuan Company Limited, Beijing 100056, China
4
School of Electronic and Optical Engineering, Nanjing University of Science and Technology, Nanjing 210094, China
*
Author to whom correspondence should be addressed.
Drones 2023, 7(10), 610; https://doi.org/10.3390/drones7100610
Submission received: 14 July 2023 / Revised: 16 September 2023 / Accepted: 18 September 2023 / Published: 27 September 2023
(This article belongs to the Special Issue UAVs Communications for 6G)

Abstract

:
The intelligent terminals deployed in hydropower IoT can quickly sense the status of hydropower equipment, thus improving the efficiency of system control and operation. However, communication security between the base station and intelligent terminals challenges the IoT hydropower plant. In this paper, we propose a UAV-assisted covert communication system (CCS), where a UAV acts as the base station to provide communication service to ground terminals monitored by malicious users. To improve access effectiveness, we adopt non-orthogonal multiple access (NOMA) for intelligent terminals to access the hydropower IoT. Since two devices can synchronously access the communication system with the NOMA scheme, we select one terminal to receive covert messages and the other to interfere with the malicious users to detect confidential communications. To maximize the covert rate, we formulate the optimization problem that jointly optimizes the transmit power, the altitude of the UAV, and trajectory under the constraints of covertness and the finite length of the transmission message block. Additionally, we transform the optimization problem into a geometric planning one, which is solved by a developed sequential geometric planning (SGP) approximation algorithm. Simulation results show the proposed algorithm can improve the covert rate compared to the traditional methods.

1. Introduction

Recently, intelligent terminals have become popular in the hydropower Internet of Things (IoT), which can be used to collect boundary data and automatically analyze the collected data, thereby improving the efficiency of hydropower plants. According to [1], there is a scope of study for monitoring the performance under conditions in real-time in hydropower, as it is difficult to predict the behavior of the machine using the existing methods. To improve the real-time and reliability of information exchange of hydropower plants, an IoT-aided hydropower system was proposed in [2] based on message queuing telemetry transport. Furthermore, to enhance energy and spectrum efficiency of the hydropower IoT, the advanced multiple access technology known as non-orthogonal multiple access (NOMA) has been identified as a promising solution for facilitating terminal access to wireless networks due to its advantages, such as low latency, extremely dense coverage, and high fairness [3]. Especially, in hydropower IoT, NOMA can improve energy efficiency and spectrum utilization by providing lower power consumption and more efficient data transmission solutions for IoT devices to support various IoT applications [4]. However, developing a secure communication scheme based on NOMA is a major challenge in IoT networks for hydropower plants.
The production of hydropower plants is characterized by corruptibility and sudden changes, which requires quick and close monitoring of hydropower equipment to ensure safe production. In this case, it is urgent to design the communication system to transmit the monitored data safely, reliably, and regularly to the control center. To ensure absolute security, traditional hydropower plants are not connected to a network or the Internet, and thus bring greater inconvenience and low productive efficiency. However, the amount of sensitive data is very small and can be easily cracked by using cryptographic methods with obtained cipher texts. To improve productive efficiency, covert communication is used for hydropower plants to collect parameters and hand out instructions. In this case, covert communication has attracted much attention as a key technology for network security. Traditionally, covert communication systems (CCS) are designed by using network protocols, such as transmission control protocols (TCP), Internet protocol (IP), and media access control (MAC) protocols [5]. However, these communication systems cannot be used for wireless sensors in IoT systems. In this scenario, wireless covert communication is adopted as an effective method for secure communication of intelligent terminals. However, wireless CCSs cannot achieve a high covert rate in complex environments due to the barriers between the transmitter and receiver.
In a hydropower plant, there are volumes of power generation equipment, hydraulic mechanical equipment, electrical equipment and systems, flood gates, and hydraulic buildings, which form a complex communication environment. Moreover, the IoT network for a hydropower plant usually covers a larger range than traditional IoT networks. Owing to the barriers and the large range coverage, traditional wireless covert communication cannot be deployed in hydropower plants. In this case, the UAV-aided covert communication is used as the base station to receive the collected data from sensors and the handout instructions to the devices. To solve the problem, existing works have focused on secure communication with Unmanned Aerial Vehicle (UAV) communication networks, launching an UAV to avoid being blocked by barriers [6]. Furthermore, the transmission behavior of an UAV cannot be determined, and thus, the UAV-assisted covert communication cannot be easily detected by malicious users [4]. Accordingly, the authors of [7] propose a covert wireless communication method to transmit covert information from Alice to Bob under the monitor of Willie. Moreover, an UAV-assisted millimeter wave wireless system is proposed in [8], where the flight altitude, beam number and transmit power of the UAV are jointly optimized. Similarly, the transmit power and the position of the monitored UAV are jointly optimized in [9] to maximize the covert rate for legitimate receivers on the ground. To ensure covertness, the transmit power and trajectory of the UAV are jointly optimized in [10]. In addition, stationary UAV-aided CCSs are designed in [8,9], where the UAVs hover at a fixed position. However, in these works, the length transmission message block (LTMB) is assumed to be infinite, which is impractical.
In practice, the LTMB transmitted via a channel limits transmission efficiency, which thus requires the transmitted messages with short block lengths to be short for practical CCSs [11]. In this sense, the LTMB affects the performance of a CCS, i.e., the detection performance of Willie, covert rate [12]. For example, according to [12,13], finite LTMB imposes a significant impact on the data rate of the channel from Alice to Bob. Therefore, not only the covertness, but also a specified finite LTMB play important roles in the optimization of the CCS to maximize the covert rate [14]. Since the collected parameters and instruments are small blocks with a few bits for a hydropower plant, we adopt the finite LTMB for the covert channels. To improve the performance of the system, we optimize not only the transmit power of the base station, but also the length of the block length. However, how to optimize the performance of a CCS with a finite LTMB remains a challenge.
Recently, UAV-assisted covert communication with NOMA has been widely investigated. As a typical work, the authors of [15] proposed an optimized scheme of the covert communication of downlink NOMA systems by studying the behavior of the outage probability of NOMA users and the expected minimum detection error probability under the uncertain channel knowledge. Inspired by this idea, the optimization algorithm has been designed for the intelligent reflecting surface (IRS)-assisted NOMA systems to maximize the covert rates by jointly optimizing the transmit power and the IRS reflect beamforming [16]. Similarly, the covert communication scheme was developed for NOMA systems under uncertain channel distribution information to maximize the expected covert rate [17]. In addition, an iterative algorithm was proposed in [18] for UAV-assisted NOMA communication to jointly optimize time slots, transmit power, and trajectories, which ultimately improves the covert rate of UAV-assisted data transmission. The authors of [19] optimized a multiple inputs multiple outputs (MIMO)-NOMA system by minimizing the delay in UAV-assisted caching networks.
In this paper, we propose an UAV-assisted CCS, in which the UAV provides a covert wireless communication service to terminals accessing hydropower IoT networks via NOMA. The UAV acts as a transmitter of covert messages and thus communicates with terminal devices with line of sight (LoS) without being blocked by the barrier in complex hydropower plants. Furthermore, transmit power and the flying altitude of the UAV are optimized to maximize the covert rate under the constraint of covertness and the length of the transmission block. In particular, the contributions of this paper are listed as follows.
  • To protect privacy in the hydropower IoT, we propose an UAV-assisted covert communication scheme for the hydropower IoT, where the UAV can communicate with terminals via covert communication channels. Furthermore, the edge terminals the hydropower IoT by using NOMA to reduce energy and spectrum consumption. Moreover, the proposed UAV-assisted covert communication scheme can also be applied to those IoT systems with complex communication environments and large cover ranges.
  • We propose a UAV-aided CCS by using NOMA, where the UAV devices act as a transmitter to transmit covert messages under the monitor of malicious users, one accessed terminal with NOMA receives covert messages, and the other accessed terminal jams the communication of the eavesdropper.
  • To maximize the covert rate, we formulate the optimization problem to optimize the transmit power and the altitude of the UAV under a finite transmission block and the covertness.
  • To solve the formulated nonconvex optimization problem, we first convert the signal programming (SP) into a geometric planning (GP) problem and then adopt a symbolic geometric planning approximation (SGPA) algorithm to solve the optimization problem. Furthermore, the convergence is proved by verifying the given conditions.
The remainder of the paper is organized as follows. In Section 2, we present the UAV-assisted CCS with NOMA and introduce covertness as the measurement metric of the CCS. In Section 3, the optimization problem of the CCS is formulated by optimizing the finite block length under the covertness constraint. Then, the joint optimization problem is transformed into a SP problem. The solution algorithm with the approximation of SGPA is developed, and the convergence of the algorithm is analyzed. Section 4 presents the numerical results, and the conclusion is given in Section 5.

2. System Model

Figure 1 demonstrates the UAV-assisted CCS deployed in a hydropower IoT, where the UAV serves as the transmitter of covert messages, providing covert communication services to terminal devices. According to [20,21], NOMA can be used for multi-connectivity, high-speed, and high-reliability scenarios in 5G communication networks to improve performance and efficiency, which can support two devices synchronously accessing the IoT in a hydropower plant. Therefore, in the UAV-assisted CCS with NOMA, two cooperative users, denoted as U1 and U2, receive the covert messages transmitted from the UAV. In addition, there is a monitor denoted as Willie, who keeps monitoring the communication between the UAV and legitimate users to detect covert communications.
In this paper, we adopt a multiuser-based NOMA power allocation method that can utilize different channel gains among multiplexed users. First, we use the NOMA technique to send signals from different users. On the receiver side, successive interference cancellation (SIC) is used to detect the desired signal. Second, the power allocation of the user depends on the distance between the user and the UAV, which means the user with a far distance receives more transmit power than the user with a normal distance. Then, based on the above power allocation method, the power of user one and user two is jointly optimized. In addition, we use the finite LTMB for the UAV to transmit covert messages to the terminals, which is assumed to be N. Since NOMA is adopted as the access mode for terminals, N sub-channels are used by the UAV to transmit covert messages. Add to that, we assume that the UAV knows Willie’s position.
Without loss of generality, we assume that U1 is located far from the UAV and close to Willie, called weak NOMA user, and that U2 is close to the UAV and far from Willie, called strong NOMA user. Since the rate of the channel between the UAV and U2 is higher than the rate between UAV and U1, the transmit power of the UAV of the signal to the U2 is lower than that of U1. In this scenario, the UAV transmits the covert messages to strong NOMA users, i.e., U2, and U1 is selected as a jammer to jam Willie to detect the covert communication between the UAV and U2. In hydro-power IoT, U1, U2, and Willie are sensors or devices, equipped with a single antenna.

2.1. Covert Wireless Communication with UAV

In this paper, we adopt the Cartesian coordinate system to describe the position, where the coordinates of U1, U2, and Willie are q j = x j , y j , j = u 1 , u 2 , w . In addition, the coordinates of the best position for UAV communication are q i = x i , y i , and the altitude of UAV is denoted by H, H min H H max . Let h j , j u 1 , u 2 , w be the channel fading from the UAV to the users, where u 1 , u 2 , and w denote U1, U2, and Willie, respectively.
The air-to-ground channel model between the UAV and the users is provided by 3GPP specifications. Accordingly, the path loss depends on the line-of-sight (LOS) and non-line-of-sight (NLoS) links. For low-altitude UAVs and short-range LoS communication, the UAV-ground channels are mostly been dominated by the LoS link. For example, the authors of [22] proposed a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. The channels are assumed to be well modeled by the quasi-static block fading LoS links and follow the distance-dependent path loss model. In addition, ref [23] proposed a UAV-assisted multi-user communication system based on NOMA, which uses the line of sight air-to-ground communication. Therefore, according to [18,24], the communication between the UAV and a ground user is modeled as an LoS link, and thus we can obtain the expression
h j = β q i q j 2 + H 2 , j = u 1 , u 2 , w
Since h w is known to Willie, as additional power is received from the UAV, Willie can determine that covert communications exist. To avoid being detected by Willie, the transmit power of the UAV is random. For the communication between UAV and U1, a random power transmission scheme is adopted, where the transmit power follows a uniform distribution over 0 , P u 1 max . Accordingly, the probability density function of P u 1 is given in Equation (2)
f P u 1 ( x ) = 1 P u 1 max , if 0 x P u 1 max , 0 , otherwise ,
where P u 1 max is the maximum transmit power of the UAV to U1.
When the UAV transmits signals to U1 and U2, the received signals can be expressed as
y u 1 [ k ] = P u 1 h u 1 x u 1 [ k ] + P u 2 h u 1 x u 2 [ k ] + n u 1 [ k ] ,
and
y u 2 [ k ] = P u 1 h u 2 x u 1 [ k ] + P u 2 h u 2 x u 2 [ k ] + n u 2 [ k ] ,
where k = 1 , 2 , , N , x k is denoted as the signal transmitted by the UAV in the k-th covert channel. P u 1 and P u 2 denote the transmit power of the UAV communicating with U1 and U2, respectively. n k is the received Gaussian white noise with the variance, denoted by σ u 1 2 , being 0. In the proposed CCS with NOMA, the transmission between the UAV and U1 can provide a cover for the covert transmission of U2. Since P u 1 > P u 2 , by using the SIC decoder, we can express the received signal-to-interference plus noise ratio (SINR) of U1 as
γ u 1 = P u 1 h u 1 2 P u 1 h u 1 2 + σ u 1 2 .
The received SINR of U2 is
γ u 2 = P u 2 h u 2 2 σ u 2 2 .
Then, with the obtained channel model, we can analyze the performance of the system with finite LTMB.

2.2. Performance of the System with Finite LTMB

According to [25], the  decoding error probability (DEP) at U2 cannot be negligible when n is finite. Given a DEP, denoted by δ , according to [25,26], the data rate from UAV to U2 can be approximated as
R log 2 1 + γ u 2 γ u 2 γ u 2 + 2 n γ u 2 + 1 2 Q 1 ( δ ) ln ( 2 ) + log 2 ( n ) 2 n ,
where Q 1 · is the inverse of the Q function.
Similarly, given the data rate R, the DEP at U2 is given by
δ = Q n 1 + γ u 2 ln 1 + γ u 2 + 1 2 ln ( n ) R ln 2 γ u 2 γ u 2 + 2 .

2.3. Detection of Covert Communications by Willie

In this paper, we assumed that Willie knows the transmit power of the UAV, the channel gain of the UAV to Willie, and the noise distribution at Willie. In this case, the signal received by Willie can be expressed as a binary hypothesis test
y w [ i ] = P u 1 h w x 1 [ i ] + n w [ i ] , H 0 P u 1 x 1 [ i ] + P u 2 x 2 [ i ] h w + n w [ i ] , H 1 ,
where H 0 is the hypothesis that the UAV is not communicating with the covert user U2 and the hypothesis that the UAV is communicating with U2. n w [ i ] is Willie’s received Gaussian noise with the variance 0. According to [9,27,28], the optimal decision criterion for Willie’s total detection error probability is
T w = Δ 1 N i = 1 N y w [ i ] 2 > < D 0 D 1 τ ,
where T w denotes the received power of Willie, τ is defined as Willie’s detection threshold, and  D 0 and D 1 are the binary decisions supporting H 0 and H 1 , respectively.
Note that the transmit power between the UAV and the user is considered to be fixed within each time slot. However, the transmit power of the UAV is assumed to change in different time slots for the reason of being undetectable.
Assuming that the channels are infinitely many, i.e., N 0 , combining Equations (6) and (7), we can derive the following expression:
T w = P u 1 h w 2 + σ w 2 , H 0 P u 1 + P u 2 h w 2 + σ w 2 , H 1 ,
Assuming that the initial probabilities of H 0 and H 1 are equal, Willie’s detection performance is measured by its DEP, which is defined as
ξ = P F + P M ,
where P F = Δ Pr D 1 H 0 is the false alarm probability (FAP) and P M = Δ Pr D 0 H 1 is the missed detection probability (MDP).
According to Equations (10) and (11), we can derive the total detection error probability ξ , which contains an incomplete gamma function [29]. In this paper, we use the Kullback–Leibler (KL) scatter as a lower bound ξ * for the minimum detection error rate, expressed as
ξ * 1 1 2 D P F , P M ,
where ξ * 1 ε is defined as the covertness constraint and ε is the covertness constraint limiting constant. According to Equation (13), it holds that
D P F , P M 2 ε 2 .
In the following sections, Equation (14) is used as the covertness constraint.

3. Problem Optimization

3.1. Problem Formulation

From the square root law theorem, the covert rate is no more than O ( n ) bits for the CCS with n covert channels, when n . For the CCS with finite channels, we cannot use the square root theorem to calculate the covert rate, since the DEP of the system with finite covert channels cannot be negligent [30,31]. In this paper, the covert rate of the CCS is considered as the objective function of the CCS with finite LTMB. Thus, we can obtain the following expression:
η = n R 1 δ ,
where η is the average number of bits transmitted from UAV to U2 with the n covert channel.
To maximize the covert rate, we formulate the joint optimization problem:
( P 1 ) max n , P u 1 , P u 2 , H η , s . t .
n N ,
P u 1 + P u 2 P max ,
P u 1 > P u 2 ,
D P F , P M 2 ε 2 ,
H min H H max .
where P max is the maximum transmit power of the UAV. To maximize the covert rate, we optimize the UAV-assisted NOMA CCS under several constraints, including LTMB, maximum transmit power of the UAV, covertness, and flying altitude. This is because the design of n and P affects both the covert rate of the channel from UAV to U2 and the detection performance of Willie. Also, due to the mobility of the UAV, the flight altitude constraint is adopted to maximize the covert with guaranteed covertness. In the following, we first find the optimal values of n and P that maximize the effective throughput η under the D P F , P M 2 ε 2 and n N constraints. Secondly, due to the nonconvexity of problem P1, we need to focus on converting the covertness constraint Equation (20). Finally, we design the SGPA algorithm.

3.2. Optimization of Transmit Power

In this subsection, we find the value of n ( n N ) to maximize the covert rate under the constraint as follows:
D P F , P M 2 ε 2 ,
Assuming that the UAV communicates with U2, the KL scatter D ^ P F , P M can be expressed as
D ^ P F , P M = n ln P + σ w 2 σ w 2 P P + σ w 2 .
According to the limitation of the covert channel numbers, the optimal D P F , P M and n can be assumed as
n * = N ,
and
D ^ P F , P M = n * ln P + σ w 2 σ w 2 P P + σ w 2 = 2 ε 2 .
where n * is the optimal value.
According to [32], we can obtain the optimal solution of transmit power:
P * = σ w 2 + P * ln P * σ w 2 + 1 2 ε 2 N .
In Equation (26), as  n = N , the covert rate achieves the maximum value. From Equation (26), we can see that the P * decreases as n increases. Traditionally, to ensure the covertness, we select PU1 and PU2, which are smaller than P max , rather than P max as adopted in traditional systems. With the over-KL scatter D P F , P M can be rewritten as
D P F , P M = N ln 1 + P u 2 * h w 2 P u 1 h w 2 + σ w 2 P u 2 * h w 2 P u 2 * + P u 1 h w 2 + σ w 2 .
P u 2 * is analogous to P * , and the same level of covert performance can be achieved by optimizing P u 2 * when n * = N is optimal.

3.3. Covertness Constraint

For the optimal finite block, problem P1 can be transformed as
( P 2 ) max P u 1 , P u 2 * , H η * , s . t .
P u 1 + P u 2 * P max ,
P u 1 > P u 2 * ,
D P F , P M 2 ε 2 ,
H min H H max .
However, ( P 2 ) is still not convex. In the following, we first cope with the constraint of covertness given in Equation (19), which can be expressed with the KL scatter D P F , P M , see Equation (33).
D P F , P M = N ln 1 P u 2 h w 2 P u 2 + P u 1 h w 2 + σ w 2 N P u 2 h w 2 P u 2 + P u 1 h w 2 + σ w 2 = N f ( t ) ,
where f t and t are, respectively, defined as
f ( t ) = ln ( 1 t ) t
and
t = P u 2 h w 2 P u 2 + P u 1 h w 2 + σ w 2
Since f 0 = 0 and lim t 1 f t = , it holds that f t is a monotonically increasing function.
Combining Equations (20) and (33) yields
f t 2 ε 2 N .
Let t * be the root of f t = 2 ε 2 / N , t 0 , 1 , and substituting Equation (1) into Equation (34), Equation (36) can be expressed as
P u 2 β P u 2 + P u 1 β + σ w 2 q i q w 2 + H 2 t * .
In this way, Equation (20) can be transformed into a symbolic function, see Equation (37). With the standard form of the symbolic geometric programming (SGP) problem [33], we transform the maximization problem in ( P 2 ) into a minimization problem:
( P 3 ) max P u 1 , P u 2 * , H 1 η * , s . t .
P u 1 + P u 2 * P max ,
P u 1 > P u 2 * ,
P u 2 β P u 2 + P u 1 β + σ w 2 q i q w 2 + H 2 t * ,
H min H H max .
However, the symbolic geometric programming of ( P 3 ) is a class of nonlinearly constrained optimization problems that cannot be solved directly. In this context, we employ Continuous Geometric Planning to approximate ( P 3 ) .

3.4. Approximation with Continuous Geometric Planning

To solve ( P 3 ) , we change the left-hand side of Equation (37) into a positive term form in the GP. According to [25], the positive denominator in Equation (37) is then replaced by using a single term with the geometric mean approximation.
First, the denominator of the positive term is denoted as
θ = P u 1 + P u 2 β + σ w 2 q i q w 2 + H 2 ,
Then, the approximation of the positive term can be expressed as
θ ˜ = σ w 2 q i q w 2 λ 0 λ 0 × P u 2 β λ 1 λ 1 × P u 1 β λ 2 λ 2 × σ w 2 H 2 λ 3 λ 3 .
Define A 0 = σ w 2 q i q w 2 , A 1 = P u 2 β , A 2 = P u 1 β , A 3 = σ w 2 H 2 , and we can derive
λ i = A i θ , i = 0 , , 3 .
Therefore, this method is derived from the geometric mean inequality of classical arithmetic [33] by replacing the arithmetic mean with the geometric mean. In this paper, the SP problem approximates a standard GP problem, and then ( P 3 ) can be approximated with the GP:
( P 4 ) max P u 1 , P u 2 * , H 1 η * , s . t .
P u 2 β θ ˜ t * ,
P u 1 + P u 2 * P max ,
P u 1 > P u 2 * ,
H min H H max .
Accordingly, the problem P 4 is convex and can be solved with CVX.

3.5. Optimization Algorithm

With the approximation method, we develop the SGPA, as presented in Algorithm 1.
In Algorithm 1, we first set the initialization values for various parameters. Then, on line 1, we set a feasible value for the altitude of the UAV, the length of the finite block, and the transmit power, i.e., N, H 0 , P u 1 0 , P u 2 * 0 ). To ensure the feasibility, the height H 0 is set to its minimum value, i.e.,  H min . According to the finite block length n * = N , the transmit power of U2 is set to a small positive value P u 2 * 0 , which can guarantee covertness. On the contrary, the transmit power of U1 is set to be as high as possible, which can be expressed as P max P u 2 * 0 ). On line 3, The approximation λ i is updated according to Equations (44) and (45). Then, the approximate solution is derived by the GP problem, if the optimization result of the throughput satisfies the threshold α . If the accuracy is not satisfied, jump to step 3 to continue the cycle. Finally, the solution to the problem is obtained, and the optimized parameters are outputted.
Algorithm 1 Iterative optimization algorithm.
Input: Set the initial values for n, ε , P max , H min , H max , and β .
Output:  H = H r + 1 , P u 2 * = P u 2 r + 1 P u 1 = P u 1 r + 1 , η = η r + 1 as the optimal solution.
  1: Find a feasible solution by setting N, H 0 , P u 1 0 , P u 2 * 0 .
  2: Set the number of iterations r = 0.
  3: Update λ i , i = 0 , , 3 .
  4: Obtain the approximate solution of the GPB H r + 1 , P u 1 r + 1 , P u 2 r + 1 , η r + 1 .
  5: if  η r + 1 η r α  then
             break.
  6: else
              r = r + 1 .
  7: end if
  8: return to step 2.
By comparing the size analysis of θ ˜ and θ , we can observe that the geometric mean approximation sequence converged to the point, at which the Karush–Kuhn–Tucker (KKT) condition is satisfied.
According to [33], we list these conditions as follows. First, θ θ ˜ . This is a tight constraint given in Equation (37) to ensure that any solution to the GP problem is a feasible solution to the SP problem. Since the geometric mean method is used to approximate the arithmetic mean, this condition can be guaranteed.
Second, θ H r , P u 2 r , P u 1 r θ ˜ H r , P u 2 r , P u 1 r , with which we can ensure that the solution to the GP problem can reduce value for the objective function in each iteration. From Equations (44) and (45), the geometric mean is equal to the arithmetic mean, and thus the condition can be satisfied.
Third, θ H r , P u 2 r , P u 1 r θ ˜ H r , P u 2 r , P u 1 r , with which we can ensure that the KKT condition for the SP problem can be satisfied by the convergence of a series of GP approximations.

4. Numerical Results

In this section, to evaluate the performance of the proposed algorithm, we constructed the simulation system according to a hydropower plant with a complex communication environment, as illustrated in Figure 1. Specifically, 2000 sensors are used to collect data from hydropower equipment, and 4000 devices are used to receive instructions from the UAV via the covert communication channel in the hydropower plant. We conduct simulations on Matlab2017a and present the numerical results for the Intelligent UAV-assisted CCS with NOMA, which is applied in the hydropower IoT. To evaluate the performance of the proposed system, we implement finite length of transmission message block-Time Division Multiple Access (FLTMB-TDMA) [34], and infinite length of transmission block as the benchmarks [35]. Furthermore, Algorithm 1 is designed based on Successive Convex Approximation (SCA) and Dinkelbach to solve the formulated optimization problem. The parameters are listed in Table 1.
Figure 2 shows the UAV trajectories of the proposed scheme, infinite length of transmission message block NOMA (IFLTMB-NOMA), and finite length of transmission message block NOMA (FLTMB-TDMA) with periods T = 45 s.
From Figure 2, we can observe that when the flight period is small, the trajectories of the UAV adopting three schemes are much closer. There is also a small difference among the three schemes, the IFLTMB-NOMA scheme is more sensitive to the eavesdropper than the FLTMB-TDMA scheme when the UAV flies close to U1. When FLTMB-TDMA is adopted, the UAV flies closer to the user in the presence of Willie. In the TDMA scheme, due to the limited flight time, the time slots are first allocated to the closest user of the UAV to achieve a better channel quality and thus improve the data rate. In this way, the trajectory of the UAV with the TDMA scheme is closer to Willie than that of the NOMA scheme. We also observe that the UAV using the NOMA scheme is farther from Willie, which ensures the covertness of the covert communication.
Figure 3 plots the covert rate of the proposed UAV aided with NOMA versus iterative numbers. In general, the global optimum solution can usually be obtained.
We observe that the proposed SGPA algorithm can converge quickly with different parameter settings. When the number of SGPA iterations reaches around three, the covert rate of the proposed CCS remains almost constant with the increase in iteration numbers. In addition, according to [33], the proposed algorithm converges polynomial approximation at a locally optimal point.
Figure 4 shows the covert rate of the proposed UAV-assisted CCS with NOMA by applying the joint optimization method on the flight altitude of the UAV and the transmit power versus the flying altitude of the UAV.
From Figure 4, we can observe that the covert rate first obtains a slow increase as H increases and then decreases rapidly when the altitude of the UAV is larger than 73 m. The reason is that the barrier between the UAV and the receiver can no longer affect covert communication, which leads to a slow increase in the covert rate. Second, we can observe that the detection rate of covert communication of Willie can significantly limit the performance of covert communication. For example, the covert rate can achieve a 10% increase when the detection rate varies from 0.1 to 0.125 and from 0.125 to 0.15. On the other hand, when H is large enough beyond a threshold, the covert decreases quickly. This is due to the fact that as H is larger than the threshold, reliable covert communication between the UAV and the receiver cannot be guaranteed owing to the limitation of the transmit power. In addition, when the UAV is far away from Willie beyond a certain threshold, the detection probability decreases, leading to the constraint formulated in Equation (38) no longer playing a role. In this case, the transmit power decreases, which also decreases the covert rate.
Figure 5 demonstrates the covert rate of the proposed UAV-assisted CCS with NOMA versus different finite LTMB with different noise variances and detection rates for each per channel, denoted as η / N .
From Figure 5, we first observe that as N increases, η / N also increases smoothly, which is caused by the optimization of finite blocks and the transmit power, as described in Section 3. When the η is optimal, and covertness is satisfied, the maximum value of the finite block transmission channel is N. Second, when varying the value of the covertness constraint constant ε , there is a significant change in η / N with a slight increase in ε . Therefore, at the same height, the covert rate increases with ε , which indicates that the maximum achievable rate is sensitive to the covertness requirement. Third, we compare the covert rate versus three different noise variances, where the noise variance is the variance value of the U2. In this simulation, the variance value at Willie is set as σ w 2 = 1 . We observe that the smaller the noise variance of the U2 the larger the covert channel of each channel can be achieved. And this phenomenon increases with the increase in the η / N variance at different σ 2 .
Figure 6 plots the covert rate η when ξ * 1 ε is satisfied against the decoding error probability δ .
In Figure 6, we first observe that η reaches a maximum value when δ increases up to a certain value, which can help us to find the optimal value of δ . After obtaining the optimal value of δ , the covert decreases slowly as the detection rate of Willie keeps increasing. Second, the maximum throughput becomes larger as the finite block length increases with the same decoding error probability, which proves the result shown in Figure 5.
In Figure 7, the performance is compared to the proposed SGPA algorithm with two benchmark schemes. One benchmark is the fixed altitude optimization scheme (FH), where the hover height is set to the lowest altitude (i.e., H = H min ) [36]. The second benchmark is the fixed power optimization scheme (FP), where the UAV is launched at the maximum transmit power (i.e., P u 1 + P u 2 = P max ) [10].
From Figure 7, we can observe that η increases with ε for all three schemes. However, the covert rate η does not increase with ε in the FP when ε is larger than 0.2, tending to be flat. The gradual increase in FP is due to the gradual relaxation of the covertness constraint. For the FP scheme, the covert tends to be a constant, since Willie’s detection no longer affects the covert communication when the ε is large enough and the optimal flying altitude of the UAV reaches H min . By comparison, the proposed SGPA scheme can obtain a higher covert rate than the benchmark schemes, which verifies the outperforming of the joint optimization of the SGPA algorithm. In addition, we observe that the ε is larger, and FH can obtain better performance than FP, due to the relaxation of the covertness constraint.

5. Conclusions

In this paper, we have proposed a UAV-assisted CCS by using NOMA for multiple users in hydropower IoT systems, where the UAV can provide NOMA services to two users at the same time. One user is selected as the receiver of the covert messages, and the other acts as the jammer used to interfere with the detection of the covert communications. Besides the hydropower IoT network, the proposed UAV-assisted communication scheme can be deployed in other complex IoT networks with large coverage areas. To improve the performance of covert communications, the UAV is used as the transmitter of covert messages due to its mobility and the LOS link between the UAV and the served users. To maximize the covert rate, we formulated a jointly optimized problem to optimize the flying altitude of the UAV, the transmit power, and the block length of covert communication channels. It is first demonstrated that the covert rate can be maximized when all available channels are utilized by setting the maximum finite block length as its maximum value. To solve the proposed optimization problem, we first convert the optimization problem to an SP one and then develop an SGPA-based algorithm solved by the problem. Simulation results show that the proposed CCS can achieve a positive covert rate, and the developed algorithm can fast convergence in comparison with traditional optimization algorithms.
This work serves as a first foray into the design of UAV-assisted covert communication with NOMA. Many interesting directions follow this work and deserve further investigation. First, covert wireless communication aided by UAVs can serve multiple users. How to extend the traditional covert wireless communication model to that with more receivers of covert messages and more wardens remains open. Second, since multiple antennas are equipped in the base station, how to select more than one antenna from all antennas to transmit covert messages deserves further investigation.

Author Contributions

Conceptualization, Y.W. and Y.S.; methodology, Z.L.; software, Q.X.; validation, Z.L., Q.X. and Y.Q.; formal analysis, Z.L.; investigation, Y.Q.; resources, G.H.; data curation, Q.X.; writing—original draft preparation, Q.X.; writing—review and editing, Z.L.; visualization, W.P.; supervision, G.H.; project administration, Y.S.; funding acquisition, W.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by State Grid Electric Power Company Science and Technology Project: No. 5700-202140381A-0-0-00.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
5G5th Generation Mobile Communication Network
DEPDetection Error Probability
GPGeometric Program
LoSLine of Sight
MDPMiss Detection Probability
NOMANon-orthogonal Multiple Access
SCASuccessive Convex Approximation
SGPASuccessive Geometric Programming Approximation
SICSuccessive Interference Cancellation
SPSignomial Programming
UAVUnmanned Aerial Vehicle
SNRSignal-to-Interference and Noise Ratio
FAPFalse Alarm Irobability
MAPMissed Alarm Probability
KLKullback- Leibler
CVXConvex
CCSCovert Communication System
SGPSymbolic Geometric Programming
IRSIntelligent Reflecting Surface
LTMBLength of Transmission Message Block

References

  1. Kumar, K.; Saini, R. Data-driven internet of things and cloud computing enabled hydropower plant monitoring system. Sustain. Comput. Inform. Syst. 2022, 36, 100823. [Google Scholar] [CrossRef]
  2. Yang, Z.; Wang, Y.; Xiong, G.; Pan, W. On Design of Hydropower System Aided by Internet of Things Architecture with OPC-UA and MQTT. In Proceedings of the 2022 2nd International Conference on Networking Systems of AI (INSAI), Shanghai, China, 14–15 October 2022; pp. 143–146. [Google Scholar]
  3. Osseiran, A.; Boccardi, F.; Braun, V.; Kusume, K.; Marsch, P.; Maternia, M.; Queseth, O.; Schellmann, M.; Schotten, H.; Taoka, H.; et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project. IEEE Commun. Mag. 2014, 52, 26–35. [Google Scholar] [CrossRef]
  4. Shahzad, K.; Zhou, X.; Yan, S.; Hu, J.; Shu, F.; Li, J. Achieving Covert Wireless Communications Using a Full-Duplex Receiver. IEEE Trans. Wirel. Commun. 2018, 17, 8517–8530. [Google Scholar] [CrossRef]
  5. Qian, Y.; Sun, T.; Li, J.; Fan, C.; Song, H. Design and analysis of the covert channel implemented by behaviors of network users. Secur. Commun. Netw. 2016, 9, 2359–2370. [Google Scholar] [CrossRef]
  6. He, B.; Yan, S.; Zhou, X.; Lau, V.K. On covert communication with noise uncertainty. IEEE Commun. Lett. 2017, 21, 941–944. [Google Scholar] [CrossRef]
  7. Lee, S.; Baxley, R.J.; McMahon, J.B.; Frazier, R.S. Achieving positive rate with undetectable communication over MIMO Rayleigh channels. In Proceedings of the 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM), Coruna, Spain, 22–25 June 2014; pp. 257–260. [Google Scholar]
  8. Zhang, J.; Chen, X.; Li, M.; Zhao, M. Optimized throughput in covert millimeter-wave UAV communications with beam sweeping. IEEE Wirel. Commun. Lett. 2020, 10, 720–724. [Google Scholar] [CrossRef]
  9. Yan, S.; Hanly, S.V.; Collings, I.B. Optimal transmit power and flying location for UAV covert wireless communications. IEEE J. Sel. Areas Commun. 2021, 39, 3321–3333. [Google Scholar] [CrossRef]
  10. Zhou, X.; Yan, S.; Hu, J.; Sun, J.; Li, J.; Shu, F. Joint optimization of a UAV’s trajectory and transmit power for covert communications. IEEE Trans. Signal Process. 2019, 67, 4276–4290. [Google Scholar] [CrossRef]
  11. Makki, B.; Svensson, T.; Zorzi, M. Finite block-length analysis of spectrum sharing networks using rate adaptation. IEEE Trans. Commun. 2015, 63, 2823–2835. [Google Scholar] [CrossRef]
  12. Lee, S.; Baxley, R.J.; Weitnauer, M.A.; Walkenhorst, B. Achieving undetectable communication. IEEE J. Sel. Top. Signal Process. 2015, 9, 1195–1205. [Google Scholar] [CrossRef]
  13. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Channel coding rate in the finite blocklength regime. IEEE Trans. Inf. Theory 2010, 56, 2307–2359. [Google Scholar] [CrossRef]
  14. Wen, F.; Gui, G.; Gacanin, H.; Sari, H. Compressive sampling framework for 2D-DOA and polarization estimation in mmWave polarized massive MIMO systems. IEEE Trans. Wirel. Commun. 2022, 22, 3071–3083. [Google Scholar] [CrossRef]
  15. Zhang, Y.; He, W.; Li, X.; Peng, H.; Rabie, K.; Nauryzbayev, G.; ElHalawany, B.M.; Zhu, M. Covert Communication in Downlink NOMA Systems With Channel Uncertainty. IEEE Sens. J. 2022, 22, 19101–19112. [Google Scholar] [CrossRef]
  16. Lv, L.; Wu, Q.; Li, Z.; Ding, Z.; Al-Dhahir, N.; Chen, J. Covert Communication in Intelligent Reflecting Surface-Assisted NOMA Systems: Design, Analysis, and Optimization. IEEE Trans. Wirel. Commun. 2022, 21, 1735–1750. [Google Scholar] [CrossRef]
  17. Duan, Z.; Yang, X.; Gong, Y.; Wang, D.; Wang, L. Covert Communication in Uplink NOMA Systems Under Channel Distribution Information Uncertainty. IEEE Commun. Lett. 2023, 27, 1282–1286. [Google Scholar] [CrossRef]
  18. Jiang, X.; Chen, X.; Tang, J.; Zhao, N.; Zhang, X.Y.; Niyato, D.; Wong, K.K. Covert communication in UAV-assisted air-ground networks. IEEE Wirel. Commun. 2021, 28, 190–197. [Google Scholar] [CrossRef]
  19. Yin, Y.; Liu, M.; Gui, G.; Gacanin, H.; Sari, H. Minimizing Delay for MIMO-NOMA Resource Allocation in UAV-Assisted Caching Networks. IEEE Trans. Veh. Technol. 2022, 72, 4728–4732. [Google Scholar] [CrossRef]
  20. Makki, B.; Chitti, K.; Behravan, A.; Alouini, M.S. A survey of NOMA: Current status and open research challenges. IEEE Open J. Commun. Soc. 2020, 1, 179–189. [Google Scholar] [CrossRef]
  21. Zhao, H.; Kong, Z.; Huang, H.; Shi, S.; Ni, Y.; Gui, G.; Sari, H.; Adachi, F. Air Reconfigurable Intelligent Surface Enhanced Multi-User NOMA System. IEEE Internet Things J. 2023, 1. [Google Scholar] [CrossRef]
  22. Lu, W.; Ding, Y.; Gao, Y.; Chen, Y.; Zhao, N.; Ding, Z.; Nallanathan, A. Secure NOMA-Based UAV-MEC Network Towards a Flying Eavesdropper. IEEE Trans. Commun. 2022, 70, 3364–3376. [Google Scholar] [CrossRef]
  23. Nasir, A.A.; Tuan, H.D.; Duong, T.Q.; Poor, H.V. UAV-Enabled Communication Using NOMA. IEEE Trans. Commun. 2019, 67, 5126–5138. [Google Scholar] [CrossRef]
  24. Bhowmick, A.; Roy, S.D.; Kundu, S. Throughput Maximization of a UAV Assisted CR Network With NOMA-Based Communication and Energy-Harvesting. IEEE Trans. Veh. Technol. 2022, 71, 362–374. [Google Scholar] [CrossRef]
  25. Jiang, X.; Yang, Z.; Zhao, N.; Chen, Y.; Ding, Z.; Wang, X. Resource Allocation and Trajectory Optimization for UAV-Enabled Multi-User Covert Communications. IEEE Trans. Veh. Technol. 2021, 70, 1989–1994. [Google Scholar] [CrossRef]
  26. Ozcan, G.; Gursoy, M.C. Throughput of Cognitive Radio Systems with Finite Blocklength Codes. IEEE J. Sel. Areas Commun. 2013, 31, 2541–2554. [Google Scholar] [CrossRef]
  27. Zhou, X.; Yan, S.; Ng, D.W.K.; Schober, R. Three-dimensional placement and transmit power design for UAV covert communications. IEEE Trans. Veh. Technol. 2021, 70, 13424–13429. [Google Scholar] [CrossRef]
  28. Zhou, X.; Yan, S.; Shu, F.; Chen, R.; Li, J. UAV-enabled covert wireless data collection. IEEE J. Sel. Areas Commun. 2021, 39, 3348–3362. [Google Scholar] [CrossRef]
  29. Yan, S.; He, B.; Zhou, X.; Cong, Y.; Swindlehurst, A.L. Delay-intolerant covert communications with either fixed or random transmit power. IEEE Trans. Inf. Forensics Secur. 2018, 14, 129–140. [Google Scholar] [CrossRef]
  30. Zhou, X.; McKay, M.R.; Maham, B.; Hjørungnes, A. Rethinking the secrecy outage formulation: A secure transmission design perspective. IEEE Commun. Lett. 2011, 15, 302–304. [Google Scholar] [CrossRef]
  31. Yan, S.; Yang, N.; Geraci, G.; Malaney, R.; Yuan, J. Optimization of code rates in SISOME wiretap channels. IEEE Trans. Wirel. Commun. 2015, 14, 6377–6388. [Google Scholar] [CrossRef]
  32. Su, Y.; Fu, S.; Si, J.; Xiang, C.; Zhang, N.; Li, X. Optimal Hovering Height and Power Allocation for UAV-aided NOMA Covert Communication System. IEEE Wirel. Commun. Lett. 2023, 12, 937–941. [Google Scholar] [CrossRef]
  33. Boyd, S.; Kim, S.; Vandenberghe, L.; Hassibi, A. A Tutorial on Geometric Programming. Optim. Eng. 2007, 8, 67–127. [Google Scholar] [CrossRef]
  34. Al-Obiedollah, H.; Salameh, H.B.; Cumanan, K.; Ding, Z.; Dobre, O.A. Self-Sustainable Multi-IRS-Aided Wireless Powered Hybrid TDMA-NOMA System. IEEE Access 2023, 11, 57428–57436. [Google Scholar] [CrossRef]
  35. Shu, F.; Teng, Y.; Li, J.; Huang, M.; Shi, W.; Li, J.; Wu, Y.; Wang, J. Enhanced secrecy rate maximization for directional modulation networks via IRS. IEEE Trans. Commun. 2021, 69, 8388–8401. [Google Scholar] [CrossRef]
  36. Qian, Y.; Yang, C.; Mei, Z.; Zhou, X.; Shi, L.; Li, J. On Joint Optimization of Trajectory and Phase Shift for IRS-UAV Assisted Covert Communication Systems. IEEE Trans. Veh. Technol. 2023, 1–11. [Google Scholar] [CrossRef]
Figure 1. UAV-assisted covert communication system deployed in a hydropower plant consisting of several zones, denoted as Zone I, Zone II, Zone III, and Zone IV, where Zone I is used for production, Zone II for schedule, Zone III for management, and Zone IV for other aspects.
Figure 1. UAV-assisted covert communication system deployed in a hydropower plant consisting of several zones, denoted as Zone I, Zone II, Zone III, and Zone IV, where Zone I is used for production, Zone II for schedule, Zone III for management, and Zone IV for other aspects.
Drones 07 00610 g001
Figure 2. The trajectories of UAV for different accessing schemes, i.e., FLTMB-NOMA, FLTMB-TDMA, and IFLTMB-NOMA.
Figure 2. The trajectories of UAV for different accessing schemes, i.e., FLTMB-NOMA, FLTMB-TDMA, and IFLTMB-NOMA.
Drones 07 00610 g002
Figure 3. Achieved covert rate of the proposed UAV-assisted CCS with NOMA versus the number of iterations for different detection error rates.
Figure 3. Achieved covert rate of the proposed UAV-assisted CCS with NOMA versus the number of iterations for different detection error rates.
Drones 07 00610 g003
Figure 4. The covert rate of UAV-assisted CCS with NOMA under joint optimization of different UAV flight altitudes with different detection error rates.
Figure 4. The covert rate of UAV-assisted CCS with NOMA under joint optimization of different UAV flight altitudes with different detection error rates.
Drones 07 00610 g004
Figure 5. The covert rate of UAV-assisted CCS with NOMA versus detection rate for different finite block lengths, different noise variances, and per channel.
Figure 5. The covert rate of UAV-assisted CCS with NOMA versus detection rate for different finite block lengths, different noise variances, and per channel.
Drones 07 00610 g005
Figure 6. The covert rate η for different decoding error probabilities δ when ξ * 1 ε .
Figure 6. The covert rate η for different decoding error probabilities δ when ξ * 1 ε .
Drones 07 00610 g006
Figure 7. The comparison between the performance of the SGPA algorithm and two benchmark schemes, i.e., FH and FP.
Figure 7. The comparison between the performance of the SGPA algorithm and two benchmark schemes, i.e., FH and FP.
Drones 07 00610 g007
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterMeaningValue
TNumber of time slots30
LDuration of time slot1 s
HAltitude of UAV50 m
V m a x Maximum speed of UAV20 m/s
d t Duration of the time slot1 s
PTransmission power20 dB
σ 2 Power of noise60 dB
ϵ Covertness measurement 10 5
δ Detection error probability of UAV 10 2
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Le, Z.; Xu, Q.; Wang, Y.; Hao, G.; Pan, W.; Sun, Y.; Qian, Y. On Joint Optimization of UAV-Assisted Covert Communication Systems with NOMA for Hydropower Internet of Things. Drones 2023, 7, 610. https://doi.org/10.3390/drones7100610

AMA Style

Le Z, Xu Q, Wang Y, Hao G, Pan W, Sun Y, Qian Y. On Joint Optimization of UAV-Assisted Covert Communication Systems with NOMA for Hydropower Internet of Things. Drones. 2023; 7(10):610. https://doi.org/10.3390/drones7100610

Chicago/Turabian Style

Le, Zhenchun, Qing Xu, Yining Wang, Guowen Hao, Weifeng Pan, Yanlin Sun, and Yuwen Qian. 2023. "On Joint Optimization of UAV-Assisted Covert Communication Systems with NOMA for Hydropower Internet of Things" Drones 7, no. 10: 610. https://doi.org/10.3390/drones7100610

Article Metrics

Back to TopTop