Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks

被引:1
|
作者
Ma, Yaodong [1 ,2 ]
Liu, Kai [1 ,2 ]
Liu, Yanming [1 ,2 ]
Zhu, Lipeng [3 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Hangzhou 310051, Peoples R China
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
基金
中国国家自然科学基金;
关键词
Internet of Things; Jamming; Autonomous aerial vehicles; Games; Security; Stochastic processes; Interference; Cooperative jamming; data aggregation; large-scale UAV-IoT network; secrecy; Stackelberg game; stochastic geometry; timeliness; PHYSICAL LAYER SECURITY; COVERT COMMUNICATION; AGE; INFORMATION; TIME; INTERNET;
D O I
10.1109/JIOT.2024.3357123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the inherent characteristics of system extensibility and implementation flexibility, unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in Internet of Things (IoT) networks, where both communication security and timeliness are of high priority. In this article, we study uplink data aggregation in cooperative jamming-aided large-scale UAV-IoT networks under the threat of eavesdroppers. By employing stochastic geometry, we derive performance metrics related to the age of information (AoI) and secrecy outage probability (SOP) in a system-level manner, and formulate the combat between legitimate entities (i.e., IoT devices and cooperative jammers) and eavesdroppers as a two-stage Stackelberg game. To solve the formulated game, the backward induction method is utilized to obtain the Stackelberg equilibrium (SE) iteratively. Specifically, we first obtain the minimum detection error probability for the eavesdropper by optimizing its detection threshold using the successive convex approximation (SCA) technique. Subsequently, the minimization of AoI violation probability and SOP for the legitimate entity is achieved using the proposed tighter alpha branch and bound (T- alpha BB) method by jointly optimizing the transmit powers of the typical IoT device and cooperative jammers as well as the deployment altitude of the typical UAV. Extensive numerical results demonstrate that the proposed solution converges rapidly, with the timeliness and secrecy metrics decreasing by 25.1%, 33.1%, 35.9%, and 37.6% compared to the benchmark scheme in suburban, urban, dense urban, and high-rise urban environments, respectively.
引用
收藏
页码:17341 / 17356
页数:16
相关论文
共 50 条
  • [1] Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks
    Yao, Jianping
    Xu, Jie
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (11) : 7656 - 7671
  • [2] Data Aggregation in Regular Large-Scale IoT Networks: Granularity, Reliability, and Delay Tradeoffs
    Nabil, Yasser
    ElSawy, Hesham
    Al-Dharrab, Suhail
    Mostafa, Hassan
    Attia, Hussein
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (18) : 17767 - 17784
  • [3] Secrecy Transmission Capacity of Large-Scale UAV-Enabled Wireless Networks
    Yao, Jianping
    Xu, Jie
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [4] Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
    Bastami, Hamed
    Behroozi, Hamid
    Moradikia, Majid
    Abdelhadi, Ahmed
    Ng, Derrick Wing Kwan
    Hanzo, Lajos
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 9267 - 9280
  • [5] Performance-aware Malware Epidemic Confinement in Large-Scale IoT Networks
    Hassan, Rakibul
    Rafatirad, Setareh
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [6] Impact of Secrecy on Capacity in Large-Scale Wireless Networks
    Zhang, Jinbei
    Pu, Luoyi
    Wang, Xinbing
    [J]. 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 3051 - 3055
  • [7] Secrecy Capacity Scaling of Large-Scale Cognitive Networks
    Chen, Yitao
    Zhang, Jinbei
    Wang, Xinbing
    Tian, Xiaohua
    Wu, Weijie
    Wu, Fan
    Tan, Chee Wei
    [J]. MOBIHOC'14: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2014, : 125 - 134
  • [8] On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks
    Tao, Liwei
    Yang, Weiwei
    Cai, Yueming
    Chen, Dechuan
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [9] Synthesis of Large-Scale Instant IoT Networks
    Ghosh, Pradipta
    Bunton, Jonathan
    Pylorof, Dimitrios
    Vieira, Marcos A. M.
    Chan, Kevin
    Govindan, Ramesh
    Sukhatme, Gaurav S. S.
    Tabuada, Paulo
    Verma, Gunjan
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (03) : 1810 - 1824
  • [10] Efficient Aerial Data Collection with UAV in Large-Scale Wireless Sensor Networks
    Wang, Chengliang
    Ma, Fei
    Yan, Junhui
    De, Debraj
    Das, Sajal K.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,