Joint Trajectory Design and User Scheduling for Secure Aerial Underlay IoT Systems

被引:9
|
作者
Lei, Hongjiang [1 ,2 ,3 ]
Yang, Haosi [1 ]
Park, Ki-Hong [4 ]
Ansari, Imran Shafique [5 ]
Jiang, Jing [6 ]
Alouini, Mohamed-Slim [4 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Chongqing Key Lab Mobile Commun Technol, Chongqing 400065, Peoples R China
[3] Xian Univ Posts & Telecommun, Shaanxi Key Lab Informat Commun Network & Secur, Xian 710121, Shaanxi, Peoples R China
[4] King Abdullah Univ Sci & Technol, CEMSE Div, Thuwal 23955, Saudi Arabia
[5] Univ Glasgow, James Watt Sch Engn, Glasgow G12 8QQ, Scotland
[6] Xian Univ Posts & Telecommun, Sch Commun & Informat Engn, Xian 710121, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Cooperative jamming; physical-layer security (PLS); trajectory design; unmanned aerial vehicle (UAV); COMMUNICATION DESIGN; UAV COMMUNICATIONS; COVERT COMMUNICATION; POWER-CONTROL; 3D PLACEMENT; ALLOCATION; SKY;
D O I
10.1109/JIOT.2023.3262697
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are Line-of-Sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. In this work, we investigate the security of aerial underlay Internet of Things (IoT) systems by jointly designing trajectory and user scheduling. An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial jammer transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdropping node locations is considered, and the average secrecy rate of the secondary user is maximized by optimizing multiple users' scheduling, the UAVs' trajectory, and transmit power. To solve the nonconvex optimization problem with a mixed multi-integer variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial in improving the secrecy performance of aerial underlay IoT systems.
引用
收藏
页码:13637 / 13648
页数:12
相关论文
共 50 条
  • [21] Joint trajectory design and power allocation for unmanned aerial vehicles aided secure transmission in the presence of no-fly zone
    Yin, Guoxiao
    Zhou, Xiaotian
    Ma, Piming
    Fang, Fang
    Zhao, Peng
    IET COMMUNICATIONS, 2022, 16 (02) : 172 - 186
  • [22] Joint Trajectory and Resource Allocation Design for Energy-Efficient Secure UAV Communication Systems
    Cai, Yuanxin
    Wei, Zhiqiang
    Li, Ruide
    Ng, Derrick Wing Kwan
    Yuan, Jinhong
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (07) : 4536 - 4553
  • [23] Aerial Cooperative Jamming for Cellular-Enabled UAV Secure Communication Network: Joint Trajectory and Power Control Design
    Sun, Hanming
    Duo, Bin
    Wang, Zhengqiang
    Lin, Xiaochen
    Gao, Changchun
    SENSORS, 2019, 19 (20)
  • [24] OPPORTUNISTIC SCHEDULING IN UNDERLAY COGNITIVE RADIO BASED SYSTEMS: USER SELECTION PROBABILITY ANALYSIS
    Varshney, Neeraj
    Sharma, Prabhat K.
    Alouini, Mohamed Slim
    2018 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2018), 2018, : 191 - 195
  • [25] Trajectory and Power Design for Aerial Multi-User Covert Communications
    Lei, Hongjiang
    Jiang, Jiacheng
    Ansari, Imran Shafique
    Pan, Gaofeng
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2024, 60 (04) : 4574 - 4589
  • [26] Joint optimization of secure communication and trajectory planning in unmanned aerial vehicle air⁃to⁃ground
    He Y.
    Fan J.-S.
    Wang W.
    Sun G.
    Liu Y.-H.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2023, 53 (03): : 913 - 922
  • [27] Joint User Scheduling and UAV Trajectory Design on Completion Time Minimization for UAV-Aided Data Collection
    Yuan, Xiaopeng
    Hu, Yulin
    Zhang, Jian
    Schmeink, Anke
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (06) : 3884 - 3898
  • [28] Experiential User-Centered Security in a Classroom: Secure Design for IoT
    Sharevski, Filipo
    Treebridge, Paige
    Westbrook, Jessica
    IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (11) : 48 - 53
  • [29] Joint Optimization of UAV Trajectory and User Scheduling in Intelligent Reflecting Surface-Aided Systems with Interfering Nodes
    Lin, Jianqiang
    Al-Habob, Ahmed A.
    Jing, Yindi
    Dobre, Octavia A.
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [30] A Design Exploration Framework for Secure IoT-Systems
    Gressl, Lukas
    Rech, Alexander
    Steger, Christian
    Sinnhofer, Andreas
    Weissnegger, Ralph
    2020 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2020), 2020,