Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Covert communication performance evaluation in UAV-assisted rate-splitting multiple access systems

Abstract

In this paper, we investigate using rate-splitting multiple access (RSMA) to facilitate covert communication in a multi-user unmanned aerial vehicle (UAV) downlink communication network that is being monitored by a warden (Willie). We establish a comprehensive analytical framework and derive closed-form expressions for key performance metrics under Nakagami-m fading channels. Specifically, we analyze the detection error probability (DEP) at Willie to quantify system covertness, in addition to outage probability (OP) and ergodic rate (ER) experienced by legitimate users, along with asymptotic analysis in the high signal-to-noise ratio (SNR) region. Furthermore, we propose an efficient alternating optimization algorithm to determine the optimal static position of the UAV that maximizes system covertness. Numerical simulations support the theoretical results derived, present the impact of various system parameters, and provide a performance comparison with non-orthogonal multiple access (NOMA). Results indicate that RSMA offers significant covertness gains over the NOMA scheme.

1 Introduction

Unmanned Aerial Vehicle (UAV) communications play a vital role in enabling seamless and reliable data exchange between drones and their operators or other connected devices. These communication systems are essential for controlling the UAVs [1], transmitting real-time data, and ensuring safe and efficient operations in various industries [2]. UAV communications refer to the technologies, protocols, and systems that enable UAVs to exchange information with ground stations, other UAVs, and network infrastructure [3,4]. Moreover, UAV will be a promising platform for future wireless networks because it can provide rapid deployment, flexible mobility, and line-of-sight (LoS) control of ground terminals [57]. All these characteristics render UAVs highly desirable for applications with increased coverage or ad hoc infrastructure, e.g., disaster recovery, remote sensing, and Internet of Things (IoT) coverage [8,9]. However, the broadcast nature of UAV-to-ground communications also exposes them to eavesdropping and detection by unauthorized wardens in physical layer security (PLS). This raises serious concerns for applications that demand confidentiality or stealth [10,11].

PLS in communication systems is a set of techniques and principles designed to protect wireless communications by leveraging the inherent characteristics of the physical communication medium, rather than relying solely on traditional cryptographic methods [12]. PLS exploits properties such as channel randomness, noise, and multipath propagation to ensure that confidential information remains secure, even in the presence of eavesdroppers or malicious attacks [1315]. Covert communication represents an advanced form of PLS that aims not only to protect the content of transmissions but also to hide the very existence of communication[16], sometimes, referred to as low-probability-of-detection (LPD) communication, aims to hide the very existence of a transmission from a warden [17,18]. Unlike classical PLS that assumes the warden is oblivious to the transmission time or scheduling, covert schemes must ensure that any statistical test performed by the warden cannot reliably distinguish between the presence and absence of a covert signal [19,20]. Recent works have analyzed fundamental limits of covert throughput over additive white Gaussian noise (AWGN) and fading channels, revealing the so-called “square-root law” which constrains the number of reliably covert bits to scale only on the order of the square root of the blocklength [2123]. Extending these insights to more complex network and channel models, including relay-assisted, large-scale, and reconfigurable intelligent surface (RIS) setups, has attracted significant interest [24,25].

Meanwhile, Rate-Splitting Multiple Access (RSMA) has emerged as a transformative interference management and multiple access framework for 6G networks [26], combining the benefits of both non-orthogonal and orthogonal transmission strategies. In addition, RSMA has gained prominence for its ability to flexibly manage multi-user interference and improve spectral and energy efficiency in downlink systems [2729]. By intelligently splitting user messages and managing interference, RSMA achieves superior spectral efficiency compared to conventional 5G techniques like space-division multiple access (SDMA) and non-orthogonal multiple access (NOMA) [30,31]. Recently, the studies have demonstrated RSMA’s benefits for PLS, where the common stream can serve as artificial noise to confuse eavesdroppers, and for covert communications in terrestrial multi-antenna networks [32,33]. Combining RSMA and covert communication represents an advanced approach to achieving both spectral efficiency and undetectable transmissions in next-generation wireless networks.

Despite these advances, the integration of RSMA with UAV-enabled covert communications remains largely unexplored. The mobile and altitude-dependent channel characteristics of UAV links introduce new degrees of freedom for covertness, but also complicate the warden’s detection strategy [34]. Moreover, while NOMA-based covert UAV schemes have been studied [35], their performance is fundamentally limited by the rigid power domain multiplexing, which may leave covert signals more vulnerable to detection. From a covert communication perspective, NOMA’s fixed decoding order and predetermined power levels constrain the transmitter’s flexibility, making covert signals easier to isolate and detect. RSMA, on the other hand, provides a more agile structure through the decomposition of messages into public (common) and private parts. This stream splitting not only allows finer control over power allocation but also enables covert signals to be embedded dynamically in the private stream, while masking them under the common layer. Such flexibility strengthens the system’s ability to regulate covertness under diverse channel conditions, making RSMA a more robust solution for secure and stealthy UAV communication. By contrast, RSMA offers a richer design space through joint power-splitting and spatial parameters, potentially leading to improved covertness without sacrificing user reliability.

1.1 Related work

Covert UAV Communications: Prior works on UAV covert communications have considered scenarios with cooperative jamming [36], trajectory optimization [37], and energy harvesting [38]. These studies typically adopt NOMA or orthogonal multiple access (OMA) and focus on maximizing the covert throughput or minimizing the warden’s detection probability under flight-path constraints. However, they do not exploit the message-splitting flexibility of RSMA.

RSMA in Secure and Covert Systems: In terrestrial networks, RSMA has been applied to enhance secrecy rates against passive eavesdroppers by judiciously allocating power to the common stream as artificial noise [39], and to improve covert performance in multi-user MISO setups by optimizing the power split between common and private messages [40]. These results suggest that RSMA could similarly benefit UAV systems, but the unique air-to-ground fading and path-loss characteristics necessitate a dedicated analysis. In the context of covert multi-user transmission, the work in [41] analyzes covert capacity achieved when overt users are randomly activated, providing theoretical benchmarks that align with our interest in user-oriented covert strategies. Moreover, the Delay-Doppler Domain SSMA framework for satellite networks introduced in [42] presents a novel signal separation approach across multiple branches, which shares conceptual similarities with RSMA’s layered message splitting. These references highlight alternative architectures and underline the growing interest in secure, flexible access schemes, although our system and objectives differ significantly.

1.2 Motivation and contributions

Motivated by the need to bolster covert UAV communications in the presence of a vigilant warden, this paper develops and analyzes an RSMA-based downlink scheme over Nakagami-m fading channels. Our main contributions are as follows:

  • We propose an RSMA-based framework for covert UAV-downlink communication under Nakagami-m fading and formulate a general analytical model that encompasses both the warden’s detection error probability (DEP) and legitimate users’ performance.
  • We derive in closed form the DEP at Willie, the OP of every user, and the ER, and offer high-SNR asymptotic expressions where the system’s diversity order and rate ceilings are considered. We also conduct large-scale Monte Carlo simulations to confirm our theoretical analysis, investigating the impact of the critical system parameters, power allocation, UAV altitude, fading severity, and detection threshold on covertness and reliability.
  • Finally, we contrast RSMA to a baseline NOMA system and demonstrate that, through dynamic power allocation to common and private streams, RSMA yields significantly better minimum DEP (i.e., secrecy) with the same OP and ER performance.

1.3 Organization

The rest of this paper is structured as follows. Sect 2 describes the system, channel model, and RSMA transmission protocol. Sect 3.1 provides the closed-form analysis of Willie’s detection error probability. Sect 3.2 introduces an optimization algorithm for the UAV’s position. Sect 3.3 develops the outage probability of legitimate users, and Sect 3.4 develops ergodic rate expressions and their behavior in the high-SNR regime. Sect 4 confirms all analytical findings by numerical simulations and compares RSMA and NOMA in different setups. Sect 5 concludes the paper and presents some open directions for future research.

2 System model and communication protocol

2.1 System and channel model

In this section, we introduce a model for a covert communication framework grounded in RSMA, illustrated in Fig 1. This framework comprises a UAV, N users including a covert user (User 1) and a set of public users (User 2,..., User N), along with a warden (Willie). Each terminal device incorporated within the system is outfitted with a single antenna. We assume that all channels are characterized by independent Nakagami-m fading, with hi and hW representing the instantaneous channel fading coefficients from the UAV to the ith user (User i) and Willie, respectively. The terms and denote the instantaneous gain in the channel from the transmitting UAV to the receiving ith user and from the UAV to Willie, respectively. An enumeration of the critical symbols is provided in Table 1.

In particular, we represent the coordinates of the ith user as (xi, yi, 0), the coordinates of Willie as (xW, yW, hW), and the coordinates of the UAV as (xU, yU, hU), where hU signifies the altitude of the UAV. Consequently, the Euclidean distances between the ith user and the UAV, as well as between Willie and the UAV, are expressed as and , respectively, with the elevation angle denoted as , in which and are the horizontal distance between the UAV to ith user and the UAV to Willie, respectively. We consider a probabilistic framework that accounts for both line-of-sight (LoS) and non-line-of-sight (NLoS) conditions. In this context, the large-scale fading characteristics of the channels between the UAV and both the ith user and Willie are explicitly modeled. This presumption integrates the probabilities associated with LoS and NLoS connections between the UAV and terrestrial devices to compute the average path loss as delineated in [43]

(1)

Here, δ represents the path-loss exponent, α and β are constants that are contingent upon the environmental context and denotes parameters that are influenced by the surroundings, terrain, and carrier frequency, where , c signifies the velocity of light in atmospheric conditions, fc is the carrier frequency, and denotes the additional path losses associated with both LoS and NLoS transmission modalities.

It is posited that all communication channels can be characterized as Nakagami-m fading channels, with the channel coefficients represented as random variables (RVs) that adhere to the Nakagami-m distribution model [44]. Consequently, the cumulative distribution function (CDF) and probability density function (PDF) of the respective channel power gain can be articulated as follows:

(2a)(2b)

where is the Gamma function, in which stands for the average channel power gain and ma is the fading severity factor. For analytical simplicity, we assume homogeneous fading with . However, we also evaluate heterogeneous scenarios in our simulations, where user fading remains fixed and mW varies independently to reflect realistic channel diversity.

To provide a smooth transition to the RSMA-based communication model, we now define the transmit signal from the UAV. Under the RSMA protocol, the UAV transmits a superimposed signal containing a common stream shared by all users and multiple private streams for individual users. The transmit signal can be expressed as:

(3)

where PU denotes the total transmission power, sc is the common message, and si is the private message for user Ui. The coefficients ac and ai represent the power allocation ratios and satisfy .

2.2 Communication protocol

The UAV adopts the RSMA protocol, which separates transmitted content into a common part and multiple private parts. The common message sc is encoded to be decodable by all users, while each si carries information targeted at user Ui. The power allocation among these streams is controlled by coefficients ac and ai, introduced in (3). The parameter ap denotes the total power allocated to all private messages, i.e., , and represents the power allocated to private messages for users other than Ui.

The signal acquired at the ith user may be articulated as

(4)

where is additive white Gaussian noise (AWGN) with zero mean and N0 variance.

In accordance with the RSMA protocol, the user initially decodes the common message sc while considering the private message as a source of interference. Following this, the user engages in successive interference cancellation (SIC) to remove sc, subsequently allowing decoding its own private message stream, while considering the private message streams from other users as interference. Therefore, the signal-to-interference ratio (SINR) for decoding sc and si at Ui can be articulated, respectively, as

(5)

and

(6)

where is the transmit SNR. Note that sc and si are expected to be normalized unity power signals, i.e., in which represents the mean operation.

Furthermore, Willie seeks to ascertain whether the UAV is emitting clandestine signals to User 1 based on the power of the signals received. The null hypothesis posits that the UAV is not engaging in transmission towards User 1, whereas the alternative hypothesis asserts that the BS is surreptitiously relaying information to User 1. Consequently, the signal received by Willie under the conditions of and can be expressed as

(7)

Here, represents the AWGN at Willie. According to (7), Willie’s average received power is

(8)

where is already given above (3), the decision rule is expressed as

(9)

where λ is Willie’s power detection threshold, D1 and D0 are the respective decisions in favor of and .

3 Performance analysis

In this segment, we investigate the efficacy of clandestine communication within multi-user communication frameworks supported by UAV. Specifically, we initially formulate a precise mathematical representation for the DEP at Willie, and subsequently examine the probability of user outage alongside the expression for the covert transmission rate resolution.

3.1 Detection error probability

In this subsection, we examine the likelihood that Willie is able to accurately identify the clandestine communication transmitted by the UAV to the covert User 1. More precisely, Willie must discern whether the UAV conveys a covert signal under the hypotheses and , which subsequently yields the binary detection outcomes D0 and D1. We employ the DEP metric to quantify Willie’s detection efficacy, as referenced in [45]. The DEP can be articulated as

(10)

where denotes the probability of a false alarm, which refers to the identification of a covert signal in the absence of any transmitted information, and signifies the probability of a missed detection, indicating the failure to identify a covert signal when information is indeed transmitted. Specifically, a value of 0 signifies that Willie is capable of flawlessly identifying the clandestine signal transmitted from the UAV to User 1, devoid of any errors, whereas a value of 1 indicates that Willie is incapable of detecting the covert signal.

According to Eqs (8) and (10), the likelihood of false alarms (pf) and the probability of missed detections (pm) at Willie can be expressed as

(11)

and

(12)

where .

Plugging (12) and (11) into (10) and performing a series of algebraic manipulations, the closed-form expression for DEP at Willie is represented as

(13)

Remark 1. Let us analyze the case where ac is 0. As can be seen, the UAV no longer transmits common message streams to the users, thus transforming the system from an RSMA covert transmission framework to a NOMA covert transmission framework. Now, given in (11) becomes smaller, while given in (12) remains the same. Consequently, pm remains at the same level, but the value of pf decreases, according to the properties of the exponential function. Furthermore, since is represented as the summation of pf and pm, it can be concluded that the DEP of the NOMA system is inferior to that of the RSMA system. This finding corroborates the conclusion that the implementation of the RSMA system enhances the efficiency of covert communication.

Remark 2. In high SNR conditions, as indicated by Eqs (12) and (11), it is evident that and . Consequently, since , it follows that , which signifies that covert transmission is guaranteed in elevated SNR scenarios.

3.2 UAV trajectory optimization via alternating optimization

While a full trajectory optimization over time is crucial for mobile UAV systems, it presents significant complexity and is considered beyond the scope of this paper. To address the reviewer’s concern in a foundational manner, we first tackle the problem of optimizing the UAV’s static position. This provides crucial insights into how spatial parameters affect system covertness and serves as a foundational step for future studies on dynamic trajectories. Specifically, to enhance the covertness of the UAV-assisted RSMA system, we propose an alternating optimization (AO)-based algorithm. The objective is to determine the optimal 3D position of the UAV that maximizes the average DEP at Willie, while maintaining communication requirements. The proposed method iteratively optimizes each spatial coordinate (xU, yU, hU) while holding the others fixed. This approach offers a favorable trade-off between computational complexity and covert performance.

Algorithm 1 AO-based UAV trajectory optimization for covert RSMA transmission [46].

1 Initialize the search ranges: , , ; maximum iterations ; set n = 1.

2 Randomly select initial UAV position: xU, yU, hU.

3 Compute initial DEP: .

4 Repeat:

 • For all , compute: .

 • Update: .

 • For all , compute: .

 • Update: .

 • For all , compute: .

 • Update: .

Compute updated DEP: .

If or : Stop.

Else: update UAV position: , , ,

and set

n = n + 1.

End Repeat

Output: Optimal position of UAV: .

The computational complexity of Algorithm 3.1 is , where denotes Big notation, Lx, Ly, and Lz denote the number of grid points along each axis. Compared to exhaustive 3D search, this method significantly reduces runtime while maintaining near-optimal covert performance.

3.3 Outage probability

For the link between the UAV and a user in this RSMA system to operate successfully (non-outage), the user must correctly decode both the common and private messages. This necessity arises because the UAV sends a combined signal containing both message types, and users employ a two-step decoding procedure: decoding the common message first, then using SIC to decode their private message. Broadly speaking, an outage event will happen with a certain probability if the SINR for decoding either the common message () or the private message () is lower than its respective threshold. Consequently, the outage probability with Ui can be articulated as

(14)

Here, and represent the threshold SINRs for the common and private messages, respectively.

With the help of (2a) and after some algebraic simplifications, the outage probability at the ith user is given by

(15)

In order to obtain more useful insights, we perform an asymptotic analysis of OP. We start with the asymptotic of the PDF of the Nakagami-m distribution when as follows [49]

(16)

Submitting (16) into (15), the asymptotic expression for the OP of ith user is derived as

(17)

It is evident that the OP shows an upward trend in correlation with the increase in the SINR threshold and shows a downward trend as PU increases. Consequently, one can mitigate the OP of the system by lowering the threshold SINR and enhancing PU.

Remark 3. From the definition of the diversity order, which is defined as , when goes to infinity, the diversity order achieved by the ith user is mi.

Remark 4. Examine the scenario where ac = 0. In this instance, the system is streamlined to function as a NOMA framework. It can be discerned that within the NOMA configuration, the outage probability is represented as . When juxtaposed with the RSMA system, the outage probability of the NOMA system is at least equivalent to, if not more favorable than, that of the RSMA system. Nonetheless, in the context of this covert communication system, the metric of covertness is regarded as a more advantageous performance criterion than the outage probability. As articulated in Remark 1, the covertness capabilities of the RSMA system surpass those of the NOMA system. Consequently, the utilization of the RSMA system in this scenario emerges as a more advantageous option.

3.4 Ergodic rate analysis

Beyond outage probability and covertness detection metrics, the achievable data rates represent fundamental performance measures for the communication system. In this section, we analyze the ergodic rates for the ith user (Ui) in the considered UAV-assisted RSMA network. Ergodic rates quantify the long-term average data transmission rates achievable over the fading channel conditions. Following the methodology in [50] and utilizing the SINR expressions for the common stream () and private stream () given in (5) and (6), respectively. The ergodic rate for Ui decoding the common information stream sc is defined as the expectation of the instantaneous rate:

(18)

Similarly, the ergodic rate for Ui successfully decoding its private information stream si after applying SIC is given by

(19)

It is essential for the RSMA protocol that all users can decode the common stream. Therefore, the overall common rate Rc that can be reliably transmitted is limited by the user experiencing the minimum rate, i.e., . Furthermore, because covert User 1 and other public users share the transmission rate of the entire common information, we assume that their common transmission rates are and , respectively, and we may calculate . Based on the analysis, the ergodic rate may be expressed as

(20)

Here, is the coefficient of the rate distribution satisfying the inequality . Then, Rc,i is given as

(21)

where is the exponential integral function, and .

Proof: We can rewrite Rc,i as follows

(22)

By the variable changing and with the help of [51], Rc,i can be determined by

(23)

where and . Plugging (2a) into (23), we obtain

(24)

Solving the above using [52, Eq (3.353.5)], and we can obtain (21) after some algebraic simplifications. The proof is completed.

Similarly, using (6), the ergodic capacity of the private message can be expressed as . Solving Rc,i, using steps similar to (22), we obtain

(25)

where and .

Using (25) and (21) into (20), we obtain the ergodic rate for Ui is given by

(26)

High SNR Region: As the transmit SNR becomes large (), the instantaneous SINRs converge towards constants determined by power allocation: and . The corresponding asymptotic ergodic rates at Ui can be approximated as

(27a)(27b)

From (27a) and (27b), the ergodic rate under high SNR can be expressed as

(28)

These asymptotic values provide insights into the maximum achievable rates limited by interference in the high-power regime.

4 Numerical results

In this segment, we substantiate the findings through Monte Carlo simulations to verify the accuracy of the mathematical expressions. The system parameters are delineated in Table 2. Our simulations are predicated on link-level modeling. In particular, we generate 106 stochastic channels to emulate authentic communication settings. Without loss of generality, we assume N = 2, and . The fading parameter m is varied as to capture different wireless propagation conditions. Specifically, m = 1 corresponds to Rayleigh-like severe fading, while m = 4 reflects near-LoS scenarios with minimal multipath. This range is selected to emulate realistic UAV communication environments, from harsh urban deployments to more favorable open-air conditions.

Fig 2 shows the DEP at Willie versus the detection threshold λ under a fixed UAV transmit power of PU = 20 dBm, comparing Nakagami-m fading conditions for m = 1 and m = 3, it is evident that both extremely low and high threshold values degrade detection performance low thresholds lead to frequent false alarms. In contrast, high thresholds cause many missed detections, pushing DEP toward 1. Yet, the optimal threshold yields a notably higher minimum DEP for m = 3 than for m = 1, indicating that while milder fading is typically advantageous in conventional communications, it enhances covertness by making it more difficult for Willie to discern the covert signal from noise reliably. Additionally, the DEP observed in NOMA systems is smaller than that in RSMA for small λ values, thus corroborating the findings noted in Remark 1.

thumbnail
Fig 2. DEP versus threshold λ for different values of m, with PU = 20 dBm.

https://doi.org/10.1371/journal.pone.0331013.g002

Fig 3 illustrates the impact of heterogeneous fading on the DEP when the legitimate users experience a fixed fading condition with mi = 2, while the warden’s fading severity parameter mW varies from 1 to 3. As expected, a smaller value of mW (i.e., a more severe fading for Willie) leads to a higher DEP, indicating better covertness. In contrast, as mW increases, the warden’s ability to detect covert transmissions improves, resulting in lower DEP. Nonetheless, across all considered values of mW, the RSMA-based covert communication maintains a considerable level of DEP, confirming the robustness of our proposed scheme against channel asymmetry.

thumbnail
Fig 3. DEP versus threshold λ for different values of mw, with mi = 2 and PU = 20 dBm.

https://doi.org/10.1371/journal.pone.0331013.g003

Fig 4 presents the DEP at Willie versus the power allocation coefficient ac for different fading severities (m = 1, 2, and 3) under a fixed UAV transmit power of 20 dBm, and it is clear that variations in ac significantly affect the allocation of power between common and private message streams with lower values of ac generally favoring covert communications by reducing the power allocated to the common stream, thereby lowering Willie’s detection capability, while higher values increase the likelihood of detection, and the trends for different m values illustrate that as the fading becomes less severe (higher m), the minimum achievable DEP is higher—suggesting that channels with less severe fading, despite being preferable in conventional communications, actually enhance covert transmission by making it more challenging for Willie to reliably differentiate covert signals from noise—and, compared to NOMA systems where the DEP is smaller at low ac, these results further substantiate the covertness advantages of RSMA as highlighted in Remark 1.

thumbnail
Fig 4. DEP versus power coefficient (ac), with and PU = 20 dBm.

https://doi.org/10.1371/journal.pone.0331013.g004

Fig 5 depicts the DEP at Willie as a function of the UAV altitude (hU) and Willie’s horizontal distance (xW) for various detection thresholds λ under a moderate fading condition (m = 2) and a UAV transmit power of PU = 18 dBm, clearly illustrating that changes in hU and xW significantly influence Willie’s detection performance, while the comparison between RSMA and NOMA systems indicates that, although NOMA tends to achieve lower DEP at lower threshold settings, RSMA offers enhanced covertness by intelligently allocating power between the common and private message streams, thereby making it fundamentally more difficult for Willie to discern the covert transmission regardless of the variations in UAV altitude and Willie’s location. Moreover, the figure visually confirms the existence of a distinct optimal UAV position that maximizes DEP. This optimal value can be effectively determined by the proposed AO-based algorithm (as detailed in Algorithm 3.1), which provides a computationally efficient alternative to an exhaustive 3D search.

thumbnail
Fig 5. DEP versus hU and xW for different values of λ, with m = 2 and PU = 18 dBm.

https://doi.org/10.1371/journal.pone.0331013.g005

Fig 6 shows the OP versus the UAV transmit power (PU) for different values of the fading severity parameter m, with system parameters set as ac = 0.1, x1 = 15 m, x2 = 25 m, and SINR thresholds fixed at –20 dBm, clearly revealing that as PU increases, the OP decreases and asymptotically approaches levels determined by the diversity order (equal to m), so that milder fading (higher m) yields a steeper decline in OP, and when comparing RSMA with NOMA systems, although NOMA may exhibit slightly lower OP in certain regions, RSMA’s strategic power allocation between common and private message streams not only enhances covert communication by making detection more difficult but also demonstrates robust asymptotic performance in high SNR scenarios, thereby affirming its overall advantage despite a potential trade-off with OP. This is in line with the conclusion stated in Remark 4.

thumbnail
Fig 6. OP versus PU for different values of m with ac = 0.1, x1 = 15 m, x2 = 25 m, = -20 dBm.

https://doi.org/10.1371/journal.pone.0331013.g006

Fig 7 depicts the OP versus the UAV altitude (hU) for different fading parameters (m) with system settings of ac = 0.1, x1 = 15 m, x2 = 25 m, and SINR thresholds at PU = −20 dBm, clearly demonstrating that as hU increases the OP decreases, approaching an asymptotic behavior determined by the diversity order equal to m so that channels with milder fading exhibit a more pronounced reduction in OP and while NOMA may occasionally offer slightly lower OP values, the RSMA scheme, through its intelligent power allocation between common and private messages, ensures enhanced covert communication performance, thereby presenting a more favorable trade-off between outage performance and covertness.

thumbnail
Fig 7. OP versus hU for different values of m with ac = 0.1, x1 = 15 m, x2 = 25 m, = -20 dBm.

https://doi.org/10.1371/journal.pone.0331013.g007

Fig 8 presents the ergodic rate versus the UAV transmit power (PU) for various power allocation coefficients ac with x1 = 15 m, x2 = 25 m, , and m = 2, clearly demonstrating that as PU increases the ergodic rate improves, with the variation in ac affecting the balance between common and private message rates; notably, while conventional NOMA systems might achieve slightly lower ergodic rates under similar conditions, the RSMA framework by virtue of its flexible power allocation enhances covert communication performance and offers superior resilience in high SNR regimes, thereby solidifying its advantage in achieving better overall throughput and covertness.

thumbnail
Fig 8. Ergodic rate versus PU for different values of ac with x1 = 15 m, x2 = 25 m, and m = 2.

https://doi.org/10.1371/journal.pone.0331013.g008

Fig 9 illustrates the ergodic rate as a function of UAV altitude (hU) for different values of PU with x1 = 15 m, x2 = 25 m, ac = 0.5, , and m = 4, clearly demonstrating that an increase in UAV altitude leads to improved ergodic rates due to better channel conditions, while higher transmit power further boosts the overall performance; notably, the flexible power allocation in RSMA enables a more effective balance between common and private message rates compared to NOMA systems, thereby enhancing both throughput and covert communication efficacy, particularly in high SNR regimes where the RSMA scheme consistently outperforms NOMA by yielding higher ergodic rates and a more robust system behavior.

thumbnail
Fig 9. Ergodic rate versus hU for different values of PU with x1 = 15 m, x2 = 25 m, ac = 0.5, and m = 4.

https://doi.org/10.1371/journal.pone.0331013.g009

5 Conclusion

In this paper, we investigated the performance of covert communication in a multi-user UAV-aided network with RSMA. We considered the downlink scenario when the transmission to legitimate users, including a given covert user, is performed over Nakagami-m fading channels while Willie is suspected to be detected. We derive closed-form expressions for DEP, OP, and ER, where the DEP is utilized to quantify the warden’s ability to detect the presence or absence of communication activity between the UAV and the covert user. Asymptotic analysis further illuminated outage behavior in the high SNR regime. Numerical simulations validated our analytical model and exhibited the effect of significant system parameters, e.g., power allocation, altitude of UAV, and fading severity. Of specific interest, it was demonstrated that RSMA can offer significant covertness gains over a NOMA baseline, with greater minimum DEP, though perhaps at the expense of a trade-off with user outage probability. Our findings identify the potential of RSMA as an effective tool for secure UAV communications. Potential future work could extend the static UAV position optimization presented in this paper to a full dynamic trajectory design, further enhancing covertness in mobile scenarios. Additionally, analysis with multi-antenna configurations is another promising direction.

References

  1. 1. Voon SS, Kho LC, Ngu SS, Joseph A, Kipli K. Autonomous positioning of unmanned aerial vehicle (UAV) for power lines insulator detection. Adv Electr Electr Eng. 2024;22(3):250–9.
  2. 2. Sharma A, Vanjani P, Paliwal N, Basnayaka CMW, Jayakody DNK, Wang H-C, et al. Communication and networking technologies for UAVs: A survey. J Netw Comput Appl. 2020;168:102739.
  3. 3. Phung BT, Nguyen BC, Tran DT, Nguyen LV, Ha HV, Minh BV, et al. Analyzing error probability in aerial full-duplex relay systems: Exact formulations and optimization techniques. Digital Signal Process. 2025;156:104779.
  4. 4. Phung BT, Nguyen BC, Van Vinh N, Minh BV, Nhan NHK. Optimizing spatial modulation MIMO IoT systems with full-duplex/half-duplex UAVs and enhanced transmit antenna selection. Perform Evaluat. 2025;168:102481.
  5. 5. Khan MA, Kumar N, Mohsan SAH, Khan WU, Nasralla MM, Alsharif MH, et al. Swarm of UAVs for Network Management in 6G: A Technical Review. IEEE Trans Netw Serv Manage. 2023;20(1):741–61.
  6. 6. Mishra D, Vegni AM, Loscri V, Natalizio E. Drone networking in the 6G Era: A technology overview. IEEE Comm Stand Mag. 2021;5(4):88–95.
  7. 7. Meng K, Wu Q, Xu J, Chen W, Feng Z, Schober R, et al. UAV-enabled integrated sensing and communication: Opportunities and challenges. IEEE Wireless Commun. 2023.
  8. 8. Hayajneh AM, Zaidi SAR, McLernon DC, Di Renzo M, Ghogho M. Performance analysis of UAV enabled disaster recovery networks: A stochastic geometric framework based on cluster processes. IEEE Access. 2018;6:26215–30.
  9. 9. Cheng N, Wu S, Wang X, Yin Z, Li C, Chen W, et al. AI for UAV-assisted IoT applications: A comprehensive review. IEEE Internet Things J. 2023;10(16):14438–61.
  10. 10. Mekdad Y, Aris A, Babun L, El Fergougui A, Conti M, Lazzeretti R, et al. A survey on security and privacy issues of UAVs. Comput Netw. 2023;224:109626.
  11. 11. Nguyen TN, Tu L-T, Fazio P, Van Chien T, V. Le C, Binh HTT, et al. On the dilemma of reliability or security in unmanned aerial vehicle communications assisted by energy harvesting relaying. IEEE J Select Areas Commun. 2024;42(1):52–67.
  12. 12. Kavaiya S, Mewada H, Patel S, Chauhan D, Almalki FA, Mujlid HM. Physical layer security of 6G vehicular networks with UAV systems: First order secrecy metrics, optimization, and bounds. CMC. 2024;80(3):3685–711.
  13. 13. Grenar D, Frolka J, Slavicek K, Dostal O, Kyselak M. Network physical layer attack in the very high capacity networks. AEEE. 2023;21(1).
  14. 14. Minh BV, Tran M, Phan VD, Hieu N. D2D communication network with the assistance of power beacon under the impact of co-channel interferences and eavesdropper: Performance analysis. AEEE. 2023;21(4).
  15. 15. Minh BV, Nhan NHK, Pham T-HT, Tran M, Kim S-W. Physical layer security in wireless sensors networks with friendly jammer: Secrecy outage probability analysis. AEEE. 2024;22(4).
  16. 16. Jiang Y, Wang L, Chen H-H, Shen X. Physical layer covert communication in B5G WIRELESS NETWorks—Its research, applications, and challenges. Proc IEEE. 2024;112(1):47–82.
  17. 17. Wang HM, Zhang Y, Zhang X, Li Z. Secrecy and covert communications against UAV surveillance via multi-hop networks. IEEE Trans Commun. 2019;68(1):389–401.
  18. 18. Jiang X, Chen X, Tang J, Zhao N, Zhang XY, Niyato D, et al. Covert communication in UAV-assisted air-ground networks. IEEE Wirel Commun. 2021;28(4):190–7.
  19. 19. Forouzesh M, Azmi P, Kuhestani A, Yeoh PL. Covert communication and secure transmission over untrusted relaying networks in the presence of multiple wardens. IEEE Trans Commun. 2020;68(6):3737–49.
  20. 20. Arghavani A, Dey S, Ahlen A. Covert outage minimization in the presence of multiple wardens. IEEE Trans Signal Process. 2023;71:686–700.
  21. 21. Yan S, He B, Cong Y, Zhou X. Covert communication with finite blocklength in AWGN channels. In: 2017 IEEE international conference on communications (ICC); 2017. https://doi.org/10.1109/icc.2017.7996337
  22. 22. Tang H, Wang J, Zheng YR. Covert communications with extremely low power under finite block length over slow fading. In: IEEE INFOCOM 2018 —IEEE conference on computer communications workshops (INFOCOM WKSHPS); 2018. p. 657–61. https://doi.org/10.1109/infcomw.2018.8406961
  23. 23. Xia B, Xu Z, Wang M, Chen C, Yao Y, Wang J. Covert communications with a full-duplex receiver in the finite blocklength regime: Analysis and optimization. IEEE Trans Wireless Commun. 2024;23(10):15409–20.
  24. 24. Du H, Kang J, Niyato D, Zhang J, Kim DI. Reconfigurable intelligent surface-aided joint radar and covert communications: Fundamentals, optimization, and challenges. IEEE Veh Technol Mag. 2022;17(3):54–64.
  25. 25. Wu Y, Wang S, Luo J, Chen W. Passive covert communications based on reconfigurable intelligent surface. IEEE Wireless Commun Lett. 2022;11(11):2445–9.
  26. 26. Vu T-H, Tu NH, Bao VNQ. Study on reconfigurable repeater-based RSMA systems. IEEE Wireless Commun Lett. 2023.
  27. 27. Jaafar W, Naser S, Muhaidat S, Sofotasios PC, Yanikomeroglu H. On the downlink performance of RSMA-based UAV communications. IEEE Trans Veh Technol. 2020;69(12):16258–63.
  28. 28. Mao Y, Dizdar O, Clerckx B, Schober R, Popovski P, Poor HV. Rate-splitting multiple access: Fundamentals, survey, and future research trends. IEEE Commun Surv Tutorials. 2022;24(4):2073–126.
  29. 29. Vu TH, Da Costa DB, Kim S, Pham QV. Outage, capacity, and error performance of downlink RSMA-based systems: Analysis and resource optimization. IEEE Trans Commun. 2025.
  30. 30. Naser S, Sofotasios PC, Bariah L, Jaafar W, Muhaidat S, Al-Qutayri M, et al. Rate-splitting multiple access: Unifying NOMA and SDMA in MISO VLC channels. IEEE Open J Veh Technol. 2020;1:393–413.
  31. 31. Jaafar W, Naser S, Muhaidat S, Sofotasios PC, Yanikomeroglu H. Multiple access in aerial networks: From orthogonal and non-orthogonal to rate-splitting. IEEE Open J Veh Technol. 2020;1:372–92.
  32. 32. Zhao B, Qiu T, Ren G, Jin Z, Liu Z. RSMA-Enhanced Physical Layer Security for ISAC Systems. IEEE Wireless Communications Letters. 2025.
  33. 33. Jia H, Wang Y, Wu W, Yuan J. Robust transmission design for covert satellite communication systems with dual-csi uncertainty. IEEE Internet Things J. 2025.
  34. 34. Liu P, Li Z, Si J, Al-Dhahir N, Gao Y. Joint information-theoretic secrecy and covertness for UAV-assisted wireless transmission with finite blocklength. IEEE Trans Veh Technol. 2023;72(8):10187–99.
  35. 35. Deng D, Dang S, Li X, Ng DW, Nallanathan A. Joint optimization for covert communications in UAV-assisted NOMA networks. IEEE Trans Veh Technol. 2023;73(1):1012–26.
  36. 36. Lee H, Eom S, Park J, Lee I. UAV-aided secure communications with cooperative jamming. IEEE Trans Veh Technol. 2018;67(10):9385–92.
  37. 37. Zhang G, Wu Q, Cui M, Zhang R. Securing UAV communications via trajectory optimization. In: GLOBECOM 2017 -2017 IEEE global communications conference; 2017. p. 1–6.
  38. 38. Thapliyal S, Pandey R, Charan C. Energy harvesting enabled-UAV relay assisted NOMA network under finite blocklength. IEEE Internet Things J. 2024.
  39. 39. Xia H, Han S, Li C. Max-min fair optimization in RSMA-assisted secure communications with artificial noise. IEEE Commun Lett. 2023;27(12):3181–4.
  40. 40. Camana MR, Tuan PV, Garcia CE, Koo I. Joint power allocation and power splitting for MISO SWIPT RSMA systems with energy-constrained users. Wireless Netw. 2019;26(3):2241–54.
  41. 41. Kang B, Ye N, An J. Achieving positive rate of covert communications covered by randomly activated overt users. IEEE TransInformForensic Secur. 2025;20:2480–95.
  42. 42. Wang P, et al. Delay-doppler domain spectral shaping multiple access (SSMA) for satellite communications: A unified multi-branch framework. IEEE Trans Wireless Commun. 2025.
  43. 43. Nguyen-Anh Q-H, Nguyen A-N, Ha D-H, Ha D-B. Enhancing mobile edge computing networks with backscatter and UAV technology. In: 2024 International conference on control, robotics and informatics (ICCRI); 2024. p. 97–102. https://doi.org/10.1109/iccri64298.2024.00024
  44. 44. Do DT, Le CB, Vahid A, Mumtaz S. Antenna selection and device grouping for spectrum-efficient UAV-assisted IoT systems. IEEE Internet Things J. 2022;10(9):8014–30.
  45. 45. Kang X, Lei H, Yang L, Pan G, Tsiftsis TA, Liu H. Active-RIS-aided covert communications in NOMA systems with cooperative jamming. IEEE Trans Veh Technol. 2023;73(5):7436–40.
  46. 46. Nguyen VS, Le-Thi A, Thuan VD, Le C-B, Nguyen TH, Nguyen S-Q. Analysis of ergodic sum rate in RSMA with perfect and imperfect SIC: A multiple-antenna selection approach for optimizing UAV positioning. Phys Commun. 2025;72:102741.
  47. 47. Hu Q, Cai Y, Yu G, Qin Z, Zhao M, Li GY. Joint offloading and trajectory design for UAV-enabled mobile edge computing systems. IEEE Internet Things J. 2018;6(2):1879–92.
  48. 48. Zhang Z, Yang L, Lei H, Li X, Niyato D. Covert communication in RSMA-assisted ambient backscatter communication systems. IEEE Trans Wireless Commun. 2025.
  49. 49. Le AT, Nguyen TN, Tu LT, Tran TP, Duy TT, Voznak M, et al. IEEE Wireless Commun Lett. 2023;13(3):791–5.
  50. 50. Yang L, Zhang W, Bithas PS, Liu H, Hasna MO, Tsiftsis TA, et al. Covert transmission and secrecy analysis of RS-RIS-NOMA-aided 6G wireless communication systems. IEEE Trans Veh Technol. 2023;72(8):10659–70.
  51. 51. Nguyen T, Le C, Do D. Performance analysis of multi-user NOMA over shadowed fading. Electron Lett. 2020;56(15):771–3.
  52. 52. Gradshteyn IS, Ryzhik IM. Table of integrals, series, and products. Academic Press; 2014 May 10.