Joint Trajectory Design and User Scheduling for Secure Aerial Underlay IoT Systems

被引:9
|
作者
Lei, Hongjiang [1 ,2 ,3 ]
Yang, Haosi [1 ]
Park, Ki-Hong [4 ]
Ansari, Imran Shafique [5 ]
Jiang, Jing [6 ]
Alouini, Mohamed-Slim [4 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Mobile Commun Technol, Chongqing 400065, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Shaanxi, Peoples R China
[4] King Abdullah Univ Sci & Technol, CEMSE Div, Thuwal 23955, Saudi Arabia
[5] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Scotland
[6] Xian Univ Posts & Telecommun, Sch Commun & Informat Engn, Xian 710121, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Cooperative jamming; physical-layer security (PLS); trajectory design; unmanned aerial vehicle (UAV); COMMUNICATION DESIGN; UAV COMMUNICATIONS; COVERT COMMUNICATION; POWER-CONTROL; 3D PLACEMENT; ALLOCATION; SKY;
D O I
10.1109/JIOT.2023.3262697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are Line-of-Sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. In this work, we investigate the security of aerial underlay Internet of Things (IoT) systems by jointly designing trajectory and user scheduling. An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial jammer transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdropping node locations is considered, and the average secrecy rate of the secondary user is maximized by optimizing multiple users' scheduling, the UAVs' trajectory, and transmit power. To solve the nonconvex optimization problem with a mixed multi-integer variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial in improving the secrecy performance of aerial underlay IoT systems.
引用
收藏
页码:13637 / 13648
页数:12
相关论文
共 50 条
  • [2] Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling
    Cai, Yunlong
    Cui, Fangyu
    Shi, Qingjiang
    Zhao, Minjian
    Li, Geoffrey Ye
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) : 1972 - 1985
  • [3] Joint Trajectory and Scheduling Design for UAV Aided Secure Backscatter Communications
    Hu, Jie
    Cai, Xingpeng
    Yang, Kun
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2020, 9 (12) : 2168 - 2172
  • [4] Joint User Scheduling, Power Allocation, and Trajectory Design for Joint Synthetic Aperture Radar and Communication UAV Systems
    Liu, Ziyi
    Fei, Zesong
    Wang, Xinyi
    Liu, Peng
    Xu, Shanfeng
    Zhou, Jianming
    Yuan, Weijie
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (02) : 3006 - 3016
  • [5] Joint Trajectory and User Scheduling Optimization for Dual-UAV Enabled Secure Communications
    Cai, Yunlong
    Cui, Fangyu
    Shi, Qingjiang
    Li, Geoffrey Ye
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] Joint Trajectory Design and Resource Allocation for Secure Air–Ground Integrated IoT Networks
    Zhang, Shangwei
    Shi, Zhenjiang
    Liu, Jiajia
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (23): : 20458 - 20471
  • [7] Secure Communications in Underlay Cognitive Radio Networks: User Scheduling and Performance Analysis
    Yang, Long
    Jiang, Hai
    Vorobyov, Sergiy A.
    Chen, Jian
    Zhang, Hailin
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (06) : 1191 - 1194
  • [8] Joint Beamforming and Trajectory Design for Aerial Intelligent Reflecting Surface-Aided Secure Transmission
    Wang, Yanping
    Qiao, Jingping
    Zhang, Chuanting
    ELECTRONICS, 2022, 11 (18)
  • [9] Joint User Scheduling and Beamforming Design for Multiuser MISO Downlink Systems
    He, Shiwen
    Yuan, Jun
    An, Zhenyu
    Huang, Wei
    Huang, Yongming
    Zhang, Yaoxue
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (05) : 2975 - 2988
  • [10] Joint Dual-UAV Trajectory and RIS Design for ARIS-Assisted Aerial Computing in IoT
    Duo, Bin
    He, Maolin
    Wu, Qingqing
    Zhang, Zexu
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (22) : 19584 - 19594