When UAVs meet ISAC: real-time trajectory design for secure communications
When UAVs meet ISAC: real-time trajectory design for secure communications
The real-time unmanned aerial vehicle (UAV) trajectory design of secure integrated sensing and communication (ISAC) is optimized. In particular, the UAV serves both as a downlink transmitter and a radar receiver. The legitimate user (Bob) roams on ground through a series of unknown locations, while the eavesdropper moves following a fixed known trajectory. To maximize the real-time secrecy rate, we propose an extended Kalman filtering (EKF)-based method for tracking and predicting Bob’s location at the UAV based on the delay measurements extracted from the sensing echoes. We then formulate a non-convex real-time trajectory design problem and develop an efficient iterative algorithm for finding a near optimal solution. Our numerical results demonstrate that the proposed algorithm is capable of accurately tracking Bob and strikes a compelling legitimate vs. leakage rate trade-off.
Wu, Jun
e73d2b38-2873-4c10-b53d-67132e414bab
Yuan, Weijie
f1d6dc8e-6e97-4c5b-bfc7-78f48efb93b7
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Wu, Jun
e73d2b38-2873-4c10-b53d-67132e414bab
Yuan, Weijie
f1d6dc8e-6e97-4c5b-bfc7-78f48efb93b7
Hanzo, Lajos
66e7266f-3066-4fc0-8391-e000acce71a1
Wu, Jun, Yuan, Weijie and Hanzo, Lajos
(2023)
When UAVs meet ISAC: real-time trajectory design for secure communications.
IEEE Transactions on Vehicular Technology.
(In Press)
Abstract
The real-time unmanned aerial vehicle (UAV) trajectory design of secure integrated sensing and communication (ISAC) is optimized. In particular, the UAV serves both as a downlink transmitter and a radar receiver. The legitimate user (Bob) roams on ground through a series of unknown locations, while the eavesdropper moves following a fixed known trajectory. To maximize the real-time secrecy rate, we propose an extended Kalman filtering (EKF)-based method for tracking and predicting Bob’s location at the UAV based on the delay measurements extracted from the sensing echoes. We then formulate a non-convex real-time trajectory design problem and develop an efficient iterative algorithm for finding a near optimal solution. Our numerical results demonstrate that the proposed algorithm is capable of accurately tracking Bob and strikes a compelling legitimate vs. leakage rate trade-off.
Text
VT-2023-01425
- Accepted Manuscript
More information
Accepted/In Press date: 22 June 2023
Identifiers
Local EPrints ID: 478787
URI: http://eprints.soton.ac.uk/id/eprint/478787
ISSN: 0018-9545
PURE UUID: d1642f19-7073-4e44-9efb-5fa7eecf214e
Catalogue record
Date deposited: 10 Jul 2023 16:45
Last modified: 18 Mar 2024 02:36
Export record
Contributors
Author:
Jun Wu
Author:
Weijie Yuan
Author:
Lajos Hanzo
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics