Secure data rate maximization for full-duplex UAV-enabled base station

Chunlong He , Xinjie Li , Yin Huang , Jianzhen Lin , Gongbin Qian , Xingquan Li

›› 2024, Vol. 10 ›› Issue (5) : 1387 -1393.

PDF
›› 2024, Vol. 10 ›› Issue (5) :1387 -1393. DOI: 10.1016/j.dcan.2022.11.012
Research article
research-article

Secure data rate maximization for full-duplex UAV-enabled base station

Author information +
History +
PDF

Abstract

Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel connection with ground devices. However, due to the openness of UAV-to-Ground channels, the communication between ground users’ devices and UAV is easily eavesdropped. In this paper, we aim to improve the security of communication system by using full-duplex UAV as a mobile air base station. The UAV sends interference signals to eavesdroppers and receives signals from ground devices. We jointly optimize the scheduling between the UAV and ground devices, the transmission power of the UAV and ground devices, as well as the trajectory of the UAV to maximize the minimum average security communication data rate. This optimization problem is mixed with integers and non-convex expressions. Therefore, this problem is not a standard convex optimization problem, which can not be solved with standard methods. With this in mind, we propose an effective algorithm which solves this problem iteratively by applying Successive Convex Approximation (SCA), variable relaxation and substitution. Finally, numerical results demonstrate the effectiveness of the proposed algorithm.

Keywords

UAV relay / Physical layer security / Full-duplex UAV / Power optimization / Trajectory optimization

Cite this article

Download citation ▾
Chunlong He, Xinjie Li, Yin Huang, Jianzhen Lin, Gongbin Qian, Xingquan Li. Secure data rate maximization for full-duplex UAV-enabled base station. , 2024, 10(5): 1387-1393 DOI:10.1016/j.dcan.2022.11.012

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Y. Zeng, R. Zhang, T.J. Lim, Wireless communications with unmanned aerial vehicles: opportunities and challenges, IEEE Commun. Mag. 54 (5) (2016) 36-42.

[2]

B. Li, Z. Fei, Y. Zhang, UAV communications for 5g and beyond: recent advances and future trends, IEEE Internet Things J. 6 (2) (2019) 2241-2263.

[3]

X. Liu, Y. Liu, Y. Chen, L. Hanzo, Trajectory design and power control for multi-UAV assisted wireless networks: a machine learning approach, IEEE Trans. Veh. Technol. 68 (8) (2019) 7957-7969.

[4]

H. Wang, G. Ren, J. Chen, G. Ding, Y. Yang, Unmanned aerial vehicle-aided communications: joint transmit power and trajectory optimization, IEEE Wireless Commun. Lett. 7 (4) (2018) 522-525.

[5]

Q. Hu, Y. Cai, G. Yu, Z. Qin, M. Zhao, G.Y. Li, Joint offloading and trajectory design for UAV-enabled mobile edge computing systems, IEEE Internet Things J. 6 (2)(2019) 1879-1892.

[6]

Q. Wu, Y. Zeng, R. Zhang, Joint trajectory and communication design for multi-UAV enabled wireless networks, IEEE Trans. Wireless Commun. 17 (3) (2018) 2109-2121.

[7]

J. Xu, Y. Zeng, R. Zhang, UAV-enabled multiuser wireless power transfer: trajectory design and energy optimization, 23rd Asia-Pacif. Conf. Commun. (APCC), Perth, Aust. (Dec. 2017) 1-6.

[8]

Q. Wu, Y. Zeng, R. Zhang, Joint trajectory and communication design for UAV-enabled multiple access, GLOBECOM 2017-2017 IEEE Global Commun. Conf. Singapore (Apr. 2017) 1-6.

[9]

S. Ahmed, M.Z. Chowdhury, Y.M. Jang, Energy-efficient UAV relaying communications to serve ground nodes, IEEE Commun. Lett. 24 (4) (2020) 849-852.

[10]

Q. Chen, Joint position and resource optimization for multi-UAV-aided relaying systems, IEEE Access 8 (2020) 10403-10415.

[11]

Y. Zeng, R. Zhang, T.J. Lim, Throughput maximization for UAV-enabled mobile relaying systems, IEEE Trans. Commun. 64 (12) (2016) 4983-4996.

[12]

S. Zhang, H. Zhang, Q. He, K. Bian, L. Song, Joint trajectory and power optimization for UAV relay networks, IEEE Commun. Lett. 22 (1) (2018) 161-164.

[13]

F. Cheng, G. Gui, N. Zhao, Y. Chen, J. Tang, H. Sari, UAV-relaying-assisted secure transmission with caching, IEEE Trans. Commun. 67 (5) (2019) 3140-3153.

[14]

A.A. Khuwaja, Y. Chen, N. Zhao, M. Alouini, P. Dobbins, A survey of channel modeling for UAV communications, IEEE Commun. Surv. Tutor. 20 (4) (2018) 2804-2821.

[15]

X. Pang, M. Sheng, N. Zhao, J. Tang, D. Niyato, K.-K. Wong, When UAV meets IRS: expanding air-ground networks via passive reflection, IEEE Wireless Commun. 28 (5) (2021) 164-170.

[16]

Q. Wang, Z. Chen, W. Mei, J. Fang, Improving physical layer security using UAV-enabled mobile relaying, IEEE Wireless Commun. Lett. 6 (3) (2017) 310-313.

[17]

J. Miao, Z. Zheng, Cooperative jamming for secure UAV-enabled mobile relay system, IEEE Access 8 (2020) 48943-48957.

[18]

Z. Li, M. Chen, C. Pan, N. Huang, Z. Yang, A. Nallanathan, Joint trajectory and communication design for secure UAV networks, IEEE Commun. Lett. 23 (4) (2019) 636-639.

[19]

G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV communications via joint trajectory and power control, IEEE Trans. Wireless Commun. 18 (2) (2019) 1376-1389.

[20]

B. Duo, Q. Wu, X. Yuan, R. Zhang, Energy efficiency maximization for full-duplex UAV secrecy communication, IEEE Trans. Veh. Technol. 69 (4) (2020) 4590-4595.

[21]

C. Zhong, J. Yao, J. Xu, Secure UAV communication with cooperative jamming and trajectory control, IEEE Commun. Lett. 23 (2) (2019) 286-289.

[22]

Y. Cai, F. Cui, Q. Shi, M. Zhao, G.Y. Li, Dual-UAV-enabled secure communications: joint trajectory design and user scheduling, IEEE J. Sel. Area. Commun. 36 (9) (2018) 1972-1985.

[23]

H. Lee, S. Eom, J. Park, I. Lee, UAV-aided secure communications with cooperative jamming, IEEE Trans. Veh. Technol. 67 (10) (2018) 9385-9392.

[24]

Y. Li, R. Zhang, J. Zhang, S. Gao, L. Yang, Cooperative jamming for secure UAV communications with partial eavesdropper information, IEEE Access 7 (2019) 94593-94603.

[25]

Y. Li, R. Zhang, J. Zhang, L. Yang, Cooperative jamming via spectrum sharing for secure UAV communications, IEEE Wireless Commun. Lett. 9 (3) (2020) 326-330.

[26]

Y. Zhou, C. Pan, P.L. Yeoh, K. Wang, M. Elkashlan, B. Vucetic, Y. Li, Secure communications for UAV-enabled mobile edge computing systems, IEEE Trans. Commun. 68 (1) (2020) 376-388.

[27]

S. Dill, E. Schreiber, M. Engel, A. Heinzel, M. Peichl, A drone carried multichannel synthetic aperture radar for advanced buried object detection, 2019 IEEE Radar Conf. (RadarConf), Boston, USA (Apr. 2019) 1-6, https://doi.org/10.1109/RADAR.2019.8835814.

[28]

A. Mukherjee, A.L. Swindlehurst, Detecting passive eavesdroppers in the mimo wiretap channel, 2012 IEEE Int Conf Acoustic Speech Signal Proc. (ICASSP) (2012) 2809-2812, https://doi.org/10.1109/ICASSP.2012.6288501.

AI Summary AI Mindmap
PDF

88

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/