Large-scale rate-splitting multiple access in uplink UAV networks: effective secrecy throughput maximization under limited feedback channel
Large-scale rate-splitting multiple access in uplink UAV networks: effective secrecy throughput maximization under limited feedback channel
Unmanned aerial vehicles (UAVs) are capable of improving the performance of next generation wireless systems. However, their communication performance is prone to both channel estimation errors and potential eavesdropping. Hence, we investigate the effective network secrecy throughput (ENST) of the uplink UAV network, in which rate-splitting multiple access (RSMA) is employed by each legitimate user for secure transmission under the scenario of massive access. To maximize the ENST, the transmission rate versus power allocation relationship is formulated as a max-min optimization problem, relying on realistic imperfect channel state information (CSI) of both the legitimate users and passive eavesdroppers (Eves). In the model considered, each user transmits a superposition of two messages to a UAV base-stations (UAV-BS), each having different transmit power and the UAV-BS adopts a successive interference cancellation (SIC) technique to decode the received messages. Given the non-convexity of the problem, it is decoupled into a pair of sub-problems. In particular, we derive a closed form expression for the optimal rate-splitting fraction of each user. Then, given the optimal rate-splitting fraction of each user, the \epsilon-constrainted transmit power of each user is calculated by harnessing sequential parametric convex approximation (SPCA) programming. Our simulation results confirm that the scheme conceived significantly improves the ENST compared to both the existing orthogonal and non-orthogonal benchmarks.
Autonomous aerial vehicles, Interference cancellation, NOMA, PLS, Rate-splitting, Resource management, Security, Throughput, Uplink, effective network secrecy throughput, imperfect CSIT, worst-case optimization
9267-9280
Bastami, Hamed
5d100a5b-7ae9-43e6-a25b-8e0c5c331903
Behroozi, Hamid
ce71a8d4-f34f-4007-ae71-cdde7f6da0cb
Moradikia, Majid
1754cc48-3308-4843-9488-23d2041cd0a4
Abdelhadi, Ahmed
430478ff-e8f2-4c95-a0d4-f0482fb7a7f2
Ng, Derrick Wing Kwan
0b489020-9ba1-4ce9-b0f6-8b5c314bd45a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
1 July 2023
Bastami, Hamed
5d100a5b-7ae9-43e6-a25b-8e0c5c331903
Behroozi, Hamid
ce71a8d4-f34f-4007-ae71-cdde7f6da0cb
Moradikia, Majid
1754cc48-3308-4843-9488-23d2041cd0a4
Abdelhadi, Ahmed
430478ff-e8f2-4c95-a0d4-f0482fb7a7f2
Ng, Derrick Wing Kwan
0b489020-9ba1-4ce9-b0f6-8b5c314bd45a
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Bastami, Hamed, Behroozi, Hamid, Moradikia, Majid, Abdelhadi, Ahmed, Ng, Derrick Wing Kwan and Hanzo, Lajos
(2023)
Large-scale rate-splitting multiple access in uplink UAV networks: effective secrecy throughput maximization under limited feedback channel.
IEEE Transactions on Vehicular Technology, 72 (7), .
(doi:10.1109/TVT.2023.3253021).
Abstract
Unmanned aerial vehicles (UAVs) are capable of improving the performance of next generation wireless systems. However, their communication performance is prone to both channel estimation errors and potential eavesdropping. Hence, we investigate the effective network secrecy throughput (ENST) of the uplink UAV network, in which rate-splitting multiple access (RSMA) is employed by each legitimate user for secure transmission under the scenario of massive access. To maximize the ENST, the transmission rate versus power allocation relationship is formulated as a max-min optimization problem, relying on realistic imperfect channel state information (CSI) of both the legitimate users and passive eavesdroppers (Eves). In the model considered, each user transmits a superposition of two messages to a UAV base-stations (UAV-BS), each having different transmit power and the UAV-BS adopts a successive interference cancellation (SIC) technique to decode the received messages. Given the non-convexity of the problem, it is decoupled into a pair of sub-problems. In particular, we derive a closed form expression for the optimal rate-splitting fraction of each user. Then, given the optimal rate-splitting fraction of each user, the \epsilon-constrainted transmit power of each user is calculated by harnessing sequential parametric convex approximation (SPCA) programming. Our simulation results confirm that the scheme conceived significantly improves the ENST compared to both the existing orthogonal and non-orthogonal benchmarks.
Text
lajos-clean
- Accepted Manuscript
More information
Accepted/In Press date: 2 March 2023
e-pub ahead of print date: 6 March 2023
Published date: 1 July 2023
Additional Information:
Funding Information:
The work of Derrick Wing Kwan Ng was supported by the Australian Research Council s Discovery Project under Grants DP210102169 and DP230100603. The work of Lajos Hanzo was supported in part by the Engineering and Physical Sciences Research Council projects under Grants EP/W016605/1 and EP/X01228X/1 and in part by the European Research Council s Advanced Fellow Grant QuantCom under Grant 789028.
Publisher Copyright:
© 1967-2012 IEEE.
Keywords:
Autonomous aerial vehicles, Interference cancellation, NOMA, PLS, Rate-splitting, Resource management, Security, Throughput, Uplink, effective network secrecy throughput, imperfect CSIT, worst-case optimization
Identifiers
Local EPrints ID: 475936
URI: http://eprints.soton.ac.uk/id/eprint/475936
ISSN: 0018-9545
PURE UUID: 328cbffb-81d6-4004-bdd2-91f31a9ef443
Catalogue record
Date deposited: 31 Mar 2023 16:38
Last modified: 18 Mar 2024 02:36
Export record
Altmetrics
Contributors
Author:
Hamed Bastami
Author:
Hamid Behroozi
Author:
Majid Moradikia
Author:
Ahmed Abdelhadi
Author:
Derrick Wing Kwan Ng
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics