When UAVs Meet ISAC: Real-Time Trajectory Design for Secure Communications

Jun WU, Weijie YUAN*, Lajos HANZO

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

7 Citations (Scopus)

Abstract

The real-time unmanned aerial vehicle (UAV) trajectory design of secure integrated sensing and communication (ISAC) is optimized. In particular, the UAV serves both as a downlink transmitter and a radar receiver. The legitimate user (Bob) roams on ground through a series of unknown locations, while the eavesdropper moves following a fixed known trajectory. To maximize the real-time secrecy rate, we propose an extended Kalman filtering (EKF)-based method for tracking and predicting Bob's location at the UAV based on the delay measurements extracted from the sensing echoes. We then formulate a non-convex real-time trajectory design problem and develop an efficient iterative algorithm for finding a near optimal solution. Our numerical results demonstrate that the proposed algorithm is capable of accurately tracking Bob and strikes a compelling legitimate vs. leakage rate trade-off.
Original languageEnglish
Pages (from-to)16766-16771
Number of pages6
JournalIEEE Transactions on Vehicular Technology
Volume72
Issue number12
Early online date29 Jun 2023
DOIs
Publication statusPublished - Dec 2023
Externally publishedYes

Bibliographical note

This work was supported in part by the National Natural Science Foundation of China under Grants 62101232 and 62201242, in part by Guangdong Provincial Natural Science Foundation under Grant 2022A1515011257, in part by Shenzhen Science and Technology Program under Grant JCYJ20220530114412029. The work Lajos Hanzo was supported in part by Engineering and Physical Sciences Research Council Projects under Grants EP/W016605/1 and EP/P003990/1 (COALESCE) and in part by European Research Council’s Advanced Fellow Grant QuantCom under Grant 789028.

Keywords

  • EKF
  • ISAC
  • real-time trajectory design
  • UAV

Fingerprint

Dive into the research topics of 'When UAVs Meet ISAC: Real-Time Trajectory Design for Secure Communications'. Together they form a unique fingerprint.

Cite this