Robust 3D-Trajectory and Time Switching Optimization for Dual-UAV-Enabled Secure Communications

被引:57
|
作者
Wang, Wei [1 ,2 ,3 ]
Li, Xinrui [1 ]
Wang, Rui [4 ,5 ]
Cumanan, Kanapathippillai [6 ]
Feng, Wei [7 ]
Ding, Zhiguo [8 ]
Dobre, Octavia A. [9 ]
机构
[1] Nantong Univ, Sch Informat Sci & Technol, Nantong 226019, Peoples R China
[2] Peng Cheng Lab, Res Ctr Networks & Commun, Shenzhen 518055, Peoples R China
[3] Nantong Res Inst Adv Commun Technol, Nantong 226019, Peoples R China
[4] Tongji Univ, Coll Elect & Informat Engn, Shanghai 201804, Peoples R China
[5] Tongji Univ, Shanghai Inst Intelligent Sci & Technol, Shanghai 201804, Peoples R China
[6] Univ York, Dept Elect Engn, York YO10 5DD, N Yorkshire, England
[7] Tsinghua Univ, Dept Elect Engn, Beijing Natl Res Ctr Informat Sci & Technol, Beijing 100084, Peoples R China
[8] Univ Manchester, Sch Elect & Elect Engn, Manchester M13 9PL, Lancs, England
[9] Mem Univ, Fac Engn & Appl Sci, St John, NF A1B 3X5, Canada
基金
加拿大自然科学与工程研究理事会; 中国国家自然科学基金;
关键词
Trajectory; Three-dimensional displays; Communication systems; Jamming; Optimization; Wireless communication; Physical layer security; Unmanned aerial vehicles (UAV) communications; robust 3D-trajectory design; physical layer security; cooperative jamming; maritime communications; TRAJECTORY DESIGN; RESOURCE-ALLOCATION; ENERGY-EFFICIENT; POWER ALLOCATION; SECRECY;
D O I
10.1109/JSAC.2021.3088628
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure communication system, in which, a UAV moves around to send confidential messages to a mobile user while another cooperative UAV transmits artificial noise signals to confuse malicious eavesdroppers. Both UAVs have energy constraints and the location information of eavesdroppers is imperfect. We consider a worst-case secrecy rate maximization problem of the mobile user over all time slots. This optimization problem is solved by jointly designing the three-dimensional (3D) trajectory of UAVs and the time allocation (recharging and service or jamming) under practical constraints including maximum UAV speed, UAV collision avoidance, UAV positioning error, and UAV energy harvesting. Specifically, we adopt a more practical UAV-ground channel model with both large-scale and small-scale fading components. Due to the non-convex feasible region constructed by the complicated constraints, directly finding the optimal solution of the original problem is intractable. To address this issue, we decouple the original optimization problem into three subproblems and develop an iterative algorithm to find its suboptimal solution by using the block coordinate descent technique. To solve each subproblem, certain advanced optimization tools, such as integer relaxation, S-procedure, and successive convex approximation techniques, are utilized. Numerical simulation results are provided to corroborate the theoretical derivations and to evaluate the performance of the proposed algorithm. Additionally, the numerical results assist to draw new insights on the 3D UAV trajectory by comparing the performance with conventional two-dimensional (2D) schemes.
引用
收藏
页码:3334 / 3347
页数:14
相关论文
共 50 条
  • [1] Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling
    Cai, Yunlong
    Cui, Fangyu
    Shi, Qingjiang
    Zhao, Minjian
    Li, Geoffrey Ye
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) : 1972 - 1985
  • [2] Robust 3D Trajectory Optimization for Secure UAV-Ground Communications
    Wang, Wenyue
    Zhang, Shangwei
    Liu, Jiajia
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Joint Trajectory and User Scheduling Optimization for Dual-UAV Enabled Secure Communications
    Cai, Yunlong
    Cui, Fangyu
    Shi, Qingjiang
    Li, Geoffrey Ye
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [4] Joint robust 3D trajectory and communication design for dual-UAV enabled secure communications in probabilistic LoS channel
    Duo, Bin
    Li, Yilian
    Hu, Hao
    Luo, Junsong
    Hu, Yanmei
    Wang, Zibin
    [J]. AD HOC NETWORKS, 2021, 121
  • [5] UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization
    Zhou, Xiaobo
    Wu, Qingqing
    Yan, Shihao
    Shu, Feng
    Li, Jun
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 4069 - 4073
  • [6] Three-Dimensional Trajectory Optimization for Secure UAV-Enabled Cognitive Communications
    Yuhan Jiang
    Jia Zhu
    [J]. China Communications, 2021, 18 (12) : 285 - 296
  • [7] Three-Dimensional Trajectory Optimization for Secure UAV-Enabled Cognitive Communications
    Jiang, Yuhan
    Zhu, Jia
    [J]. CHINA COMMUNICATIONS, 2021, 18 (12) : 285 - 296
  • [8] Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications
    Xu, Weiwei
    Zhang, Heng
    Cao, Xianghui
    Deng, Ruilong
    Yuan, Dongqing
    Zhang, Jian
    Li, Hongran
    Ke, Jiacheng
    Xu, Haisong
    [J]. 2020 ACM/IEEE FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2020, : 260 - 261
  • [9] Robust Trajectory and Transmit Power Design for Secure UAV Communications
    Cui, Miao
    Zhang, Guangchi
    Wu, Qingqing
    Ng, Derrick Wing Kwan
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) : 9042 - 9046
  • [10] Robust Trajectory and Transmit Power Optimization for Secure UAV-Enabled Cognitive Radio Networks
    Zhou, Yifan
    Zhou, Fuhui
    Zhou, Huilin
    Ng, Derrick Wing Kwan
    Hu, Rose Qingyang
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (07) : 4022 - 4034