4.6 Article

Secure UAV Relay Communication via Power Allocation and Trajectory Planning

Journal

IEEE SYSTEMS JOURNAL
Volume 16, Issue 4, Pages 6243-6252

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSYST.2021.3134305

Keywords

Trajectory; Relays; Autonomous aerial vehicles; Wireless communication; Gold; Trajectory planning; Resource management; Mobile relay; physical layer security (PLS); power allocation; trajectory planning; unmanned aerial vehicle (UAV) communication

Ask authors/readers for more resources

This article focuses on the system of using unmanned aerial vehicles to relay confidential messages between unconnected ground nodes. A joint optimization algorithm is proposed to maximize secure throughput, and simulation results show significant performance gains.
Benefiting from high mobility and maneuverability, unmanned aerial vehicle (UAV) can be flexibly deployed in various wireless networks to improve coverage and connectivity. In this article, the system with a UAV, which relays confidential messages between a couple of unconnected ground nodes with the presence of an eavesdropper is considered. In order to maximize the overall end-to-end secure throughput in a given time period, the joint power allocation and trajectory planning are investigated. The formulated optimization problem is nonconvex, which is difficult to obtain the optimal solution with acceptable complexity. Therefore, we propose an iterative algorithm to achieve a suboptimal solution approximately. In the proposed approach, the joint optimization problem is firstly divided into two subproblems, i.e., the power allocation subproblem and the trajectory planning subproblem. The power is optimized by using the method of successive convex approximation with fixed trajectory, and the trajectory was optimized by successive convex approximation with fixed transmit power. Finally, the power and trajectory are optimized alternately. Since the two subproblems are approximated as convex problems, they can be solved efficiently with acceptable complexity. The simulation results show that remarkable gain in terms of secure throughput can be achieved by the proposed joint optimization algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available