1. Introduction
Recently, intelligent terminals have become popular in the hydropower Internet of Things (IoT), which can be used to collect boundary data and automatically analyze the collected data, thereby improving the efficiency of hydropower plants. According to [
1], there is a scope of study for monitoring the performance under conditions in real-time in hydropower, as it is difficult to predict the behavior of the machine using the existing methods. To improve the real-time and reliability of information exchange of hydropower plants, an IoT-aided hydropower system was proposed in [
2] based on message queuing telemetry transport. Furthermore, to enhance energy and spectrum efficiency of the hydropower IoT, the advanced multiple access technology known as non-orthogonal multiple access (NOMA) has been identified as a promising solution for facilitating terminal access to wireless networks due to its advantages, such as low latency, extremely dense coverage, and high fairness [
3]. Especially, in hydropower IoT, NOMA can improve energy efficiency and spectrum utilization by providing lower power consumption and more efficient data transmission solutions for IoT devices to support various IoT applications [
4]. However, developing a secure communication scheme based on NOMA is a major challenge in IoT networks for hydropower plants.
The production of hydropower plants is characterized by corruptibility and sudden changes, which requires quick and close monitoring of hydropower equipment to ensure safe production. In this case, it is urgent to design the communication system to transmit the monitored data safely, reliably, and regularly to the control center. To ensure absolute security, traditional hydropower plants are not connected to a network or the Internet, and thus bring greater inconvenience and low productive efficiency. However, the amount of sensitive data is very small and can be easily cracked by using cryptographic methods with obtained cipher texts. To improve productive efficiency, covert communication is used for hydropower plants to collect parameters and hand out instructions. In this case, covert communication has attracted much attention as a key technology for network security. Traditionally, covert communication systems (CCS) are designed by using network protocols, such as transmission control protocols (TCP), Internet protocol (IP), and media access control (MAC) protocols [
5]. However, these communication systems cannot be used for wireless sensors in IoT systems. In this scenario, wireless covert communication is adopted as an effective method for secure communication of intelligent terminals. However, wireless CCSs cannot achieve a high covert rate in complex environments due to the barriers between the transmitter and receiver.
In a hydropower plant, there are volumes of power generation equipment, hydraulic mechanical equipment, electrical equipment and systems, flood gates, and hydraulic buildings, which form a complex communication environment. Moreover, the IoT network for a hydropower plant usually covers a larger range than traditional IoT networks. Owing to the barriers and the large range coverage, traditional wireless covert communication cannot be deployed in hydropower plants. In this case, the UAV-aided covert communication is used as the base station to receive the collected data from sensors and the handout instructions to the devices. To solve the problem, existing works have focused on secure communication with Unmanned Aerial Vehicle (UAV) communication networks, launching an UAV to avoid being blocked by barriers [
6]. Furthermore, the transmission behavior of an UAV cannot be determined, and thus, the UAV-assisted covert communication cannot be easily detected by malicious users [
4]. Accordingly, the authors of [
7] propose a covert wireless communication method to transmit covert information from Alice to Bob under the monitor of Willie. Moreover, an UAV-assisted millimeter wave wireless system is proposed in [
8], where the flight altitude, beam number and transmit power of the UAV are jointly optimized. Similarly, the transmit power and the position of the monitored UAV are jointly optimized in [
9] to maximize the covert rate for legitimate receivers on the ground. To ensure covertness, the transmit power and trajectory of the UAV are jointly optimized in [
10]. In addition, stationary UAV-aided CCSs are designed in [
8,
9], where the UAVs hover at a fixed position. However, in these works, the length transmission message block (LTMB) is assumed to be infinite, which is impractical.
In practice, the LTMB transmitted via a channel limits transmission efficiency, which thus requires the transmitted messages with short block lengths to be short for practical CCSs [
11]. In this sense, the LTMB affects the performance of a CCS, i.e., the detection performance of Willie, covert rate [
12]. For example, according to [
12,
13], finite LTMB imposes a significant impact on the data rate of the channel from Alice to Bob. Therefore, not only the covertness, but also a specified finite LTMB play important roles in the optimization of the CCS to maximize the covert rate [
14]. Since the collected parameters and instruments are small blocks with a few bits for a hydropower plant, we adopt the finite LTMB for the covert channels. To improve the performance of the system, we optimize not only the transmit power of the base station, but also the length of the block length. However, how to optimize the performance of a CCS with a finite LTMB remains a challenge.
Recently, UAV-assisted covert communication with NOMA has been widely investigated. As a typical work, the authors of [
15] proposed an optimized scheme of the covert communication of downlink NOMA systems by studying the behavior of the outage probability of NOMA users and the expected minimum detection error probability under the uncertain channel knowledge. Inspired by this idea, the optimization algorithm has been designed for the intelligent reflecting surface (IRS)-assisted NOMA systems to maximize the covert rates by jointly optimizing the transmit power and the IRS reflect beamforming [
16]. Similarly, the covert communication scheme was developed for NOMA systems under uncertain channel distribution information to maximize the expected covert rate [
17]. In addition, an iterative algorithm was proposed in [
18] for UAV-assisted NOMA communication to jointly optimize time slots, transmit power, and trajectories, which ultimately improves the covert rate of UAV-assisted data transmission. The authors of [
19] optimized a multiple inputs multiple outputs (MIMO)-NOMA system by minimizing the delay in UAV-assisted caching networks.
In this paper, we propose an UAV-assisted CCS, in which the UAV provides a covert wireless communication service to terminals accessing hydropower IoT networks via NOMA. The UAV acts as a transmitter of covert messages and thus communicates with terminal devices with line of sight (LoS) without being blocked by the barrier in complex hydropower plants. Furthermore, transmit power and the flying altitude of the UAV are optimized to maximize the covert rate under the constraint of covertness and the length of the transmission block. In particular, the contributions of this paper are listed as follows.
To protect privacy in the hydropower IoT, we propose an UAV-assisted covert communication scheme for the hydropower IoT, where the UAV can communicate with terminals via covert communication channels. Furthermore, the edge terminals the hydropower IoT by using NOMA to reduce energy and spectrum consumption. Moreover, the proposed UAV-assisted covert communication scheme can also be applied to those IoT systems with complex communication environments and large cover ranges.
We propose a UAV-aided CCS by using NOMA, where the UAV devices act as a transmitter to transmit covert messages under the monitor of malicious users, one accessed terminal with NOMA receives covert messages, and the other accessed terminal jams the communication of the eavesdropper.
To maximize the covert rate, we formulate the optimization problem to optimize the transmit power and the altitude of the UAV under a finite transmission block and the covertness.
To solve the formulated nonconvex optimization problem, we first convert the signal programming (SP) into a geometric planning (GP) problem and then adopt a symbolic geometric planning approximation (SGPA) algorithm to solve the optimization problem. Furthermore, the convergence is proved by verifying the given conditions.
The remainder of the paper is organized as follows. In
Section 2, we present the UAV-assisted CCS with NOMA and introduce covertness as the measurement metric of the CCS. In
Section 3, the optimization problem of the CCS is formulated by optimizing the finite block length under the covertness constraint. Then, the joint optimization problem is transformed into a SP problem. The solution algorithm with the approximation of SGPA is developed, and the convergence of the algorithm is analyzed.
Section 4 presents the numerical results, and the conclusion is given in
Section 5.
2. System Model
Figure 1 demonstrates the UAV-assisted CCS deployed in a hydropower IoT, where the UAV serves as the transmitter of covert messages, providing covert communication services to terminal devices. According to [
20,
21], NOMA can be used for multi-connectivity, high-speed, and high-reliability scenarios in 5G communication networks to improve performance and efficiency, which can support two devices synchronously accessing the IoT in a hydropower plant. Therefore, in the UAV-assisted CCS with NOMA, two cooperative users, denoted as U1 and U2, receive the covert messages transmitted from the UAV. In addition, there is a monitor denoted as Willie, who keeps monitoring the communication between the UAV and legitimate users to detect covert communications.
In this paper, we adopt a multiuser-based NOMA power allocation method that can utilize different channel gains among multiplexed users. First, we use the NOMA technique to send signals from different users. On the receiver side, successive interference cancellation (SIC) is used to detect the desired signal. Second, the power allocation of the user depends on the distance between the user and the UAV, which means the user with a far distance receives more transmit power than the user with a normal distance. Then, based on the above power allocation method, the power of user one and user two is jointly optimized. In addition, we use the finite LTMB for the UAV to transmit covert messages to the terminals, which is assumed to be N. Since NOMA is adopted as the access mode for terminals, N sub-channels are used by the UAV to transmit covert messages. Add to that, we assume that the UAV knows Willie’s position.
Without loss of generality, we assume that U1 is located far from the UAV and close to Willie, called weak NOMA user, and that U2 is close to the UAV and far from Willie, called strong NOMA user. Since the rate of the channel between the UAV and U2 is higher than the rate between UAV and U1, the transmit power of the UAV of the signal to the U2 is lower than that of U1. In this scenario, the UAV transmits the covert messages to strong NOMA users, i.e., U2, and U1 is selected as a jammer to jam Willie to detect the covert communication between the UAV and U2. In hydro-power IoT, U1, U2, and Willie are sensors or devices, equipped with a single antenna.
2.1. Covert Wireless Communication with UAV
In this paper, we adopt the Cartesian coordinate system to describe the position, where the coordinates of U1, U2, and Willie are . In addition, the coordinates of the best position for UAV communication are , and the altitude of UAV is denoted by H, . Let be the channel fading from the UAV to the users, where , and w denote U1, U2, and Willie, respectively.
The air-to-ground channel model between the UAV and the users is provided by 3GPP specifications. Accordingly, the path loss depends on the line-of-sight (LOS) and non-line-of-sight (NLoS) links. For low-altitude UAVs and short-range LoS communication, the UAV-ground channels are mostly been dominated by the LoS link. For example, the authors of [
22] proposed a secure communication scheme for the NOMA-based UAV-MEC system towards a flying eavesdropper. The channels are assumed to be well modeled by the quasi-static block fading LoS links and follow the distance-dependent path loss model. In addition, ref [
23] proposed a UAV-assisted multi-user communication system based on NOMA, which uses the line of sight air-to-ground communication. Therefore, according to [
18,
24], the communication between the UAV and a ground user is modeled as an LoS link, and thus we can obtain the expression
Since
is known to Willie, as additional power is received from the UAV, Willie can determine that covert communications exist. To avoid being detected by Willie, the transmit power of the UAV is random. For the communication between UAV and U1, a random power transmission scheme is adopted, where the transmit power follows a uniform distribution over
. Accordingly, the probability density function of
is given in Equation (
2)
where
is the maximum transmit power of the UAV to U1.
When the UAV transmits signals to U1 and U2, the received signals can be expressed as
and
where
,
is denoted as the signal transmitted by the UAV in the
k-th covert channel.
and
denote the transmit power of the UAV communicating with U1 and U2, respectively.
is the received Gaussian white noise with the variance, denoted by
, being 0. In the proposed CCS with NOMA, the transmission between the UAV and U1 can provide a cover for the covert transmission of U2. Since
, by using the SIC decoder, we can express the received signal-to-interference plus noise ratio (SINR) of U1 as
The received SINR of U2 is
Then, with the obtained channel model, we can analyze the performance of the system with finite LTMB.
2.2. Performance of the System with Finite LTMB
According to [
25], the decoding error probability (DEP) at U2 cannot be negligible when
n is finite. Given a DEP, denoted by
, according to [
25,
26], the data rate from UAV to U2 can be approximated as
where
is the inverse of the
Q function.
Similarly, given the data rate
R, the DEP at U2 is given by
2.3. Detection of Covert Communications by Willie
In this paper, we assumed that Willie knows the transmit power of the UAV, the channel gain of the UAV to Willie, and the noise distribution at Willie. In this case, the signal received by Willie can be expressed as a binary hypothesis test
where
is the hypothesis that the UAV is not communicating with the covert user U2 and the hypothesis that the UAV is communicating with U2.
is Willie’s received Gaussian noise with the variance 0. According to [
9,
27,
28], the optimal decision criterion for Willie’s total detection error probability is
where
denotes the received power of Willie,
is defined as Willie’s detection threshold, and
and
are the binary decisions supporting
and
, respectively.
Note that the transmit power between the UAV and the user is considered to be fixed within each time slot. However, the transmit power of the UAV is assumed to change in different time slots for the reason of being undetectable.
Assuming that the channels are infinitely many, i.e.,
, combining Equations (
6) and (
7), we can derive the following expression:
Assuming that the initial probabilities of
and
are equal, Willie’s detection performance is measured by its DEP, which is defined as
where
is the false alarm probability (FAP) and
is the missed detection probability (MDP).
According to Equations (
10) and (
11), we can derive the total detection error probability
, which contains an incomplete gamma function [
29]. In this paper, we use the Kullback–Leibler (KL) scatter as a lower bound
for the minimum detection error rate, expressed as
where
is defined as the covertness constraint and
is the covertness constraint limiting constant. According to Equation (
13), it holds that
In the following sections, Equation (14) is used as the covertness constraint.
4. Numerical Results
In this section, to evaluate the performance of the proposed algorithm, we constructed the simulation system according to a hydropower plant with a complex communication environment, as illustrated in
Figure 1. Specifically, 2000 sensors are used to collect data from hydropower equipment, and 4000 devices are used to receive instructions from the UAV via the covert communication channel in the hydropower plant. We conduct simulations on Matlab2017a and present the numerical results for the Intelligent UAV-assisted CCS with NOMA, which is applied in the hydropower IoT. To evaluate the performance of the proposed system, we implement finite length of transmission message block-Time Division Multiple Access (FLTMB-TDMA) [
34], and infinite length of transmission block as the benchmarks [
35]. Furthermore, Algorithm 1 is designed based on Successive Convex Approximation (SCA) and Dinkelbach to solve the formulated optimization problem. The parameters are listed in
Table 1.
Figure 2 shows the UAV trajectories of the proposed scheme, infinite length of transmission message block NOMA (IFLTMB-NOMA), and finite length of transmission message block NOMA (FLTMB-TDMA) with periods
s.
From
Figure 2, we can observe that when the flight period is small, the trajectories of the UAV adopting three schemes are much closer. There is also a small difference among the three schemes, the IFLTMB-NOMA scheme is more sensitive to the eavesdropper than the FLTMB-TDMA scheme when the UAV flies close to U1. When FLTMB-TDMA is adopted, the UAV flies closer to the user in the presence of Willie. In the TDMA scheme, due to the limited flight time, the time slots are first allocated to the closest user of the UAV to achieve a better channel quality and thus improve the data rate. In this way, the trajectory of the UAV with the TDMA scheme is closer to Willie than that of the NOMA scheme. We also observe that the UAV using the NOMA scheme is farther from Willie, which ensures the covertness of the covert communication.
Figure 3 plots the covert rate of the proposed UAV aided with NOMA versus iterative numbers. In general, the global optimum solution can usually be obtained.
We observe that the proposed SGPA algorithm can converge quickly with different parameter settings. When the number of SGPA iterations reaches around three, the covert rate of the proposed CCS remains almost constant with the increase in iteration numbers. In addition, according to [
33], the proposed algorithm converges polynomial approximation at a locally optimal point.
Figure 4 shows the covert rate of the proposed UAV-assisted CCS with NOMA by applying the joint optimization method on the flight altitude of the UAV and the transmit power versus the flying altitude of the UAV.
From
Figure 4, we can observe that the covert rate first obtains a slow increase as
H increases and then decreases rapidly when the altitude of the UAV is larger than 73 m. The reason is that the barrier between the UAV and the receiver can no longer affect covert communication, which leads to a slow increase in the covert rate. Second, we can observe that the detection rate of covert communication of Willie can significantly limit the performance of covert communication. For example, the covert rate can achieve a 10% increase when the detection rate varies from 0.1 to 0.125 and from 0.125 to 0.15. On the other hand, when
H is large enough beyond a threshold, the covert decreases quickly. This is due to the fact that as
H is larger than the threshold, reliable covert communication between the UAV and the receiver cannot be guaranteed owing to the limitation of the transmit power. In addition, when the UAV is far away from Willie beyond a certain threshold, the detection probability decreases, leading to the constraint formulated in Equation (
38) no longer playing a role. In this case, the transmit power decreases, which also decreases the covert rate.
Figure 5 demonstrates the covert rate of the proposed UAV-assisted CCS with NOMA versus different finite LTMB with different noise variances and detection rates for each per channel, denoted as
.
From
Figure 5, we first observe that as N increases,
also increases smoothly, which is caused by the optimization of finite blocks and the transmit power, as described in
Section 3. When the
is optimal, and covertness is satisfied, the maximum value of the finite block transmission channel is
N. Second, when varying the value of the covertness constraint constant
, there is a significant change in
with a slight increase in
. Therefore, at the same height, the covert rate increases with
, which indicates that the maximum achievable rate is sensitive to the covertness requirement. Third, we compare the covert rate versus three different noise variances, where the noise variance is the variance value of the U2. In this simulation, the variance value at Willie is set as
. We observe that the smaller the noise variance of the U2 the larger the covert channel of each channel can be achieved. And this phenomenon increases with the increase in the
variance at different
.
Figure 6 plots the covert rate
when
is satisfied against the decoding error probability
.
In
Figure 6, we first observe that
reaches a maximum value when
increases up to a certain value, which can help us to find the optimal value of
. After obtaining the optimal value of
, the covert decreases slowly as the detection rate of Willie keeps increasing. Second, the maximum throughput becomes larger as the finite block length increases with the same decoding error probability, which proves the result shown in
Figure 5.
In
Figure 7, the performance is compared to the proposed SGPA algorithm with two benchmark schemes. One benchmark is the fixed altitude optimization scheme (FH), where the hover height is set to the lowest altitude (i.e.,
) [
36]. The second benchmark is the fixed power optimization scheme (FP), where the UAV is launched at the maximum transmit power (i.e.,
) [
10].
From
Figure 7, we can observe that
increases with
for all three schemes. However, the covert rate
does not increase with
in the FP when
is larger than 0.2, tending to be flat. The gradual increase in FP is due to the gradual relaxation of the covertness constraint. For the FP scheme, the covert tends to be a constant, since Willie’s detection no longer affects the covert communication when the
is large enough and the optimal flying altitude of the UAV reaches
. By comparison, the proposed SGPA scheme can obtain a higher covert rate than the benchmark schemes, which verifies the outperforming of the joint optimization of the SGPA algorithm. In addition, we observe that the
is larger, and FH can obtain better performance than FP, due to the relaxation of the covertness constraint.
5. Conclusions
In this paper, we have proposed a UAV-assisted CCS by using NOMA for multiple users in hydropower IoT systems, where the UAV can provide NOMA services to two users at the same time. One user is selected as the receiver of the covert messages, and the other acts as the jammer used to interfere with the detection of the covert communications. Besides the hydropower IoT network, the proposed UAV-assisted communication scheme can be deployed in other complex IoT networks with large coverage areas. To improve the performance of covert communications, the UAV is used as the transmitter of covert messages due to its mobility and the LOS link between the UAV and the served users. To maximize the covert rate, we formulated a jointly optimized problem to optimize the flying altitude of the UAV, the transmit power, and the block length of covert communication channels. It is first demonstrated that the covert rate can be maximized when all available channels are utilized by setting the maximum finite block length as its maximum value. To solve the proposed optimization problem, we first convert the optimization problem to an SP one and then develop an SGPA-based algorithm solved by the problem. Simulation results show that the proposed CCS can achieve a positive covert rate, and the developed algorithm can fast convergence in comparison with traditional optimization algorithms.
This work serves as a first foray into the design of UAV-assisted covert communication with NOMA. Many interesting directions follow this work and deserve further investigation. First, covert wireless communication aided by UAVs can serve multiple users. How to extend the traditional covert wireless communication model to that with more receivers of covert messages and more wardens remains open. Second, since multiple antennas are equipped in the base station, how to select more than one antenna from all antennas to transmit covert messages deserves further investigation.