Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks

被引:1
|
作者
Ma, Yaodong [1 ,2 ]
Liu, Kai [1 ,2 ]
Liu, Yanming [1 ,2 ]
Zhu, Lipeng [3 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Hangzhou Innovat Inst, Hangzhou 310051, Peoples R China
[3] Natl Univ Singapore, Dept Elect & Comp Engn, Singapore 117583, Singapore
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 10期
基金
中国国家自然科学基金;
关键词
Internet of Things; Jamming; Autonomous aerial vehicles; Games; Security; Stochastic processes; Interference; Cooperative jamming; data aggregation; large-scale UAV-IoT network; secrecy; Stackelberg game; stochastic geometry; timeliness; PHYSICAL LAYER SECURITY; COVERT COMMUNICATION; AGE; INFORMATION; TIME; INTERNET;
D O I
10.1109/JIOT.2024.3357123
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the inherent characteristics of system extensibility and implementation flexibility, unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in Internet of Things (IoT) networks, where both communication security and timeliness are of high priority. In this article, we study uplink data aggregation in cooperative jamming-aided large-scale UAV-IoT networks under the threat of eavesdroppers. By employing stochastic geometry, we derive performance metrics related to the age of information (AoI) and secrecy outage probability (SOP) in a system-level manner, and formulate the combat between legitimate entities (i.e., IoT devices and cooperative jammers) and eavesdroppers as a two-stage Stackelberg game. To solve the formulated game, the backward induction method is utilized to obtain the Stackelberg equilibrium (SE) iteratively. Specifically, we first obtain the minimum detection error probability for the eavesdropper by optimizing its detection threshold using the successive convex approximation (SCA) technique. Subsequently, the minimization of AoI violation probability and SOP for the legitimate entity is achieved using the proposed tighter alpha branch and bound (T- alpha BB) method by jointly optimizing the transmit powers of the typical IoT device and cooperative jammers as well as the deployment altitude of the typical UAV. Extensive numerical results demonstrate that the proposed solution converges rapidly, with the timeliness and secrecy metrics decreasing by 25.1%, 33.1%, 35.9%, and 37.6% compared to the benchmark scheme in suburban, urban, dense urban, and high-rise urban environments, respectively.
引用
收藏
页码:17341 / 17356
页数:16
相关论文
共 50 条
  • [21] An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks
    Saravanan, Selvam
    Balasubramanian, Uma Maheswari
    BIG DATA MINING AND ANALYTICS, 2024, 7 (02): : 500 - 511
  • [22] Robust aggregation protocols for large-scale overlay networks
    Montresor, A
    Jelasity, M
    Babaoglu, O
    2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 19 - 28
  • [23] Daedalus: Statistical aggregation for large-scale dynamic networks
    Kalyvianaki, Evangelia
    Lu, Yu-En
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3268 - 3269
  • [24] Aggregation of Large-Scale Electrical Energy Transmission Networks
    Klein, Dennis
    Spieker, Christopher
    Rueberg, Sven
    Liehenau, Volker
    Rehtanz, Christian
    2016 IEEE INTERNATIONAL ENERGY CONFERENCE (ENERGYCON), 2016,
  • [25] Managing Large-Scale Transient Data in IoT Systems
    Narendra, Nanjangud C.
    Nayak, Sambit
    Shukla, Anshu
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 565 - 568
  • [26] Meta Distribution of SIR in Large-Scale Uplink and Downlink NOMA Networks
    Salehi, Mohammad
    Tabassum, Hina
    Hossain, Ekram
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (04) : 3009 - 3025
  • [27] Exploiting NOMA for UAV Communications in Large-Scale Cellular Networks
    Hou, Tianwei
    Liu, Yuanwei
    Song, Zhengyu
    Sun, Xin
    Chen, Yue
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (10) : 6897 - 6911
  • [28] Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks
    Li, Xing
    Chen, Dexin
    Li, Chunyan
    Wang, Liangmin
    SENSORS, 2015, 15 (07): : 15952 - 15973
  • [29] On the Construction of Data Aggregation Tree With Maximizing Lifetime in Large-Scale Wireless Sensor Networks
    Wan, Shaohua
    Zhang, Yudong
    Chen, Jia
    IEEE SENSORS JOURNAL, 2016, 16 (20) : 7433 - 7440
  • [30] Normalized Entropy Aggregation for Inhomogeneous Large-Scale Data
    Costa, Maria Conceicao
    Macedo, Pedro
    THEORY AND APPLICATIONS OF TIME SERIES ANALYSIS, 2019, : 19 - 29