Secure UAV-enabled OFDMA Communications

被引:2
|
作者
Sun, Jie [1 ]
Sheng, Zhichao [1 ]
Nasir, Ali A. [2 ,3 ]
Wei, Hao [4 ,5 ]
Fang, Yong [1 ]
Muqaibel, Ali H. [2 ,3 ]
机构
[1] Shanghai Univ, Key Lab Specialty Fiber Opt & Opt Access Network, Shanghai Inst Adv Commun & Data Sci, Shanghai 200444, Peoples R China
[2] King Fand Univ Petr & Minerals KFUPM, Dept Elect Engn, Dhahran 31261, Saudi Arabia
[3] King Fand Univ Petr & Minerals KFUPM, Ctr Commun Syst & Sensing, Dhahran 31261, Saudi Arabia
[4] ZTE Coperat, Shenzhen 518055, Peoples R China
[5] State Key Lab Mobile Network & Mobile Multimedia, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
UAV; physical layer security; OFDMA; non-convex optimization; resource allocation; RESOURCE-ALLOCATION; TRAJECTORY DESIGN;
D O I
10.1109/VTC2021-FALL52928.2021.9625221
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, an unmanned aerial vehicle (UAV) enabled secure downlink communication is considered, where a single-antenna UAV serves multiple ground users facilitated by orthogonal frequency-division multiple access (OFDMA), in the presence of an eavesdropper (EV) with imperfect channel state information. To enhance the secrecy rate (SR), we employ a power splitting approach, where part of the transmit power is used for communication while the rest is used for jamming. We maximize the average secrecy rate (ASR) by jointly optimizing the bandwidth, trajectory, power allocation, and power splitting ratio. To tackle this non-convex and computationally intractable optimization problem, we propose a novel algorithm by employing successive convex approximation, block coordinate descend and S-procedure. Numerical results show that our proposed joint optimization algorithm outperforms the benchmark schemes.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] UAV-Enabled Secure Multiuser Backscatter Communications With Planar Array
    Bai, Lin
    Chen, Qun
    Bai, Tong
    Wang, Jingchao
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (10) : 2946 - 2961
  • [2] Power Allocation in UAV-Enabled Relaying Systems for Secure Communications
    Sun, Guen
    Li, Na
    Tao, Xiaofeng
    Wu, Huici
    IEEE ACCESS, 2019, 7 : 119009 - 119017
  • [3] Secure Communications for UAV-Enabled Mobile Edge Computing Systems
    Zhou, Yi
    Pan, Cunhua
    Yeoh, Phee Lep
    Wang, Kezhi
    Elkashlan, Maged
    Vucetic, Branka
    Li, Yonghui
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 376 - 388
  • [4] UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization
    Zhou, Xiaobo
    Wu, Qingqing
    Yan, Shihao
    Shu, Feng
    Li, Jun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (04) : 4069 - 4073
  • [5] Trajectory Design for UAV-Enabled Maritime Secure Communications: A Reinforcement Learning Approach
    Liu, Jintao
    Zeng, Feng
    Wang, Wei
    Sheng, Zhichao
    Wei, Xinchen
    Cumanan, Kanapathippillai
    CHINA COMMUNICATIONS, 2022, 19 (09) : 26 - 36
  • [6] UAV-Enabled Secure Communications by Multi-Agent Deep Reinforcement Learning
    Zhang, Yu
    Mou, Zhiyu
    Gao, Feifei
    Jiang, Jing
    Ding, Ruijin
    Han, Zhu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (10) : 11599 - 11611
  • [7] UAV-Enabled Jamming Noise for Achieving Secure Communications in Cognitive Radio Networks
    Nguyen, Phu X.
    Nguyen, Hieu V.
    Van-Dinh Nguyen
    Shin, Oh-Soon
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [8] Three-Dimensional Trajectory Optimization for Secure UAV-Enabled Cognitive Communications
    Yuhan Jiang
    Jia Zhu
    China Communications, 2021, 18 (12) : 285 - 296
  • [9] Three-Dimensional Trajectory Optimization for Secure UAV-Enabled Cognitive Communications
    Jiang, Yuhan
    Zhu, Jia
    CHINA COMMUNICATIONS, 2021, 18 (12) : 285 - 296
  • [10] Trajectory Design for UAV-Enabled Maritime Secure Communications: A Reinforcement Learning Approach
    Jintao Liu
    Feng Zeng
    Wei Wang
    Zhichao Sheng
    Xinchen Wei
    Kanapathippillai Cumanan
    China Communications, 2022, 19 (09) : 26 - 36