Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important. This paper considers the power allocation strategy for a UAV swarm-enabled aerial network, to enhance the physical layer security of the downlink transmission, where an eavesdropper moves following the trajectory of the swarm for better eavesdropping. Unlike existing works, we use only the large-scale channel state information (CSI) and maximize the ergodic secrecy rate (ESR) in a wholetrajectory-oriented manner. The overall energy constraint on each UAV is considered. The non-convexity of the formulated problem is solved by using max-min optimization with iteration. Both the transmission power of desired signals and artificial noise (AN) are derived iteratively. Simulation results are presented to validate the effectiveness of our proposed power allocation algorithm and to show the advantage of aerial CoMP by using only the large-scale CSI. ). requirements for communications between multiple UAVs and 5G [11]- [15].One of the serious concerns in UAV swarm-enabled aerial networks is how to guarantee the privacy and secrecy of the system. Due to the broadcast nature and inherent randomness of wireless channels, UAV swarm-enabled communication networks are particularly vulnerable to various security threats, such as information eavesdropping, information leakage, data modification and so on. In addition, to facilitate the secure transmission, the UAV swarm often places itself near the legitimate users, which is beneficial to eavesdropping, especially when the eavesdropper moves close to the legitimate users.
A. Related WorkTo achieve perfect security, the conventional encryption schemes are typically implemented at the upper layer using cryptographic methods. However, this is often achieved at the cost of high computational complexity [16].Unlike the traditional cryptographic methods, physical layer security (PLS), using the information-theoretic and signal processing approaches, has been widely investigated in the UAV-enabled wireless networks [17]-[20]. They enhance the coverage and security of the wireless systems by exploiting physical characteristics of the wireless channel. Specifically, by adaptively adjusting the UAVs' location, they could overcome the propagation constraints in the cellular systems, and provide new possibilities or opportunities for security enhancement. The authors in [17] utilized UAV as a mobile relay, and maximized the secrecy rate of the system with transmit optimization in a four-node. In [18], the authors investigated UAV-enabled secure communication systems where a mobile UAV sent confidential messages to multiple ground users. By considering the imperfect information on the locations of the eavesdroppers, the authors in [19] investigated a UAV-ground communication system with multiple potential eavesdroppers on the ground. The authors in [20] considered UAV-assisted secure c...