4.8 Article

Joint Trajectory Design and Resource Allocation for Secure Transmission in Cache-Enabled UAV-Relaying Networks With D2D Communications

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 8, Issue 3, Pages 1557-1571

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3013647

Keywords

Device-to-device communication; Trajectory; Unmanned aerial vehicles; Wireless networks; Communication system security; Transmitters; Device-to-device (D2D) communication; secrecy rate; transmission power; unmanned aerial vehicle (UAV) trajectory; UAV-relaying; user association

Funding

  1. National Natural Science Foundation of China [61701230]
  2. Natural Science Foundation of Jiangsu Province [BK20170805]
  3. Singapore Energy Market Authority Energy Resilience [NRF2017EWT-EP003-041]
  4. Singapore National Research Foundation (NRF) [NRF2015-NRF-ISF001-2277]
  5. Singapore National Satellite of Excellence [DeST-SCI2019-0007]
  6. A*STAR-NTU-SUTD [RGANS1906]
  7. Autonomous Systems and Software Program [M4082187 (4080)]
  8. Nanyang Technological University [M4082187 (4080)]
  9. NTU-WeBank JRI [NWJ-2020-004]

Ask authors/readers for more resources

With the exponential growth of data traffic, the use of caching and device-to-device (D2D) communication has been recognized as an effective approach for mitigating the backhaul bottleneck in unmanned aerial vehicle (UAV)-assisted networks. In this article, we investigate the issue of secure transmission in a cache-enabled UAV-relaying network with D2D communications in the presence of an eavesdropper. Extensive numerical results show that the proposed joint design scheme significantly outperforms other benchmark schemes in terms of the secrecy rate.
With the exponential growth of data traffic, the use of caching and device-to-device (D2D) communication has been recognized as an effective approach for mitigating the backhaul bottleneck in unmanned aerial vehicle (UAV)-assisted networks. In this article, we investigate the issue of secure transmission in a cache-enabled UAV-relaying network with D2D communications in the presence of an eavesdropper. Specifically, both UAVs and D2D users are equipped with cache memory, which can prestore some popular content to collaboratively serve users. Considering the fairness among users, we formulate an optimization problem to maximize the minimum secrecy rate among users, by jointly optimizing the user association and UAV scheduling, transmission power, and UAV trajectory over a finite period. The joint design problem is a nonconvex mixed-integer programming problem. To efficiently solve this problem, we propose an alternating iterative algorithm based on the block alternating descent and successive convex approximation methods. Specifically, the user association and UAV scheduling, UAV trajectory, and transmission power are optimized alternately in each iteration, and the convergence of the algorithm is proven. Extensive numerical results show that the proposed joint design scheme significantly outperforms other benchmark schemes in terms of the secrecy rate.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available