Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 9, Issue 17, Pages 16284-16296Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3151105
Keywords
Autonomous aerial vehicles; Internet of Things; Trajectory; Optimization; Security; Law; Reliability; Internet of Things (IoT); physical-layer security; relaying; trajectory optimization; unmanned aerial vehicle (UAV)
Categories
Funding
- National Natural Science Foundation of China [61971081, 61971083, 51939001]
- National Key Research and Development Program of China [2019YFE0111600]
- Foundation of Science and Technology on Communication Networks Laboratory [6142104200309]
- Liaoning Revitalization Talents Program [XLYC2002078]
- General Project of Natural Science Foundation of Liaoning Province [2019-MS-026]
- Dalian Science and Technology Innovation Fund [2019J11CY015]
- Fundamental Research Funds for the Central Universities [3132021227, 3132019348]
Ask authors/readers for more resources
This article studies the physical-layer security of UAV relaying communication system in multiterminal IoT scenarios. By proposing a high-efficiency algorithm for joint optimization of UAV trajectory and resource allocation, it aims to improve the information secrecy of IoT terminals and enhance communication fairness.
As unmanned aerial vehicle (UAV) communication has been widely used in all walks of life, its secrecy issue has also received more and more attention. This article studies the physical-layer security of UAV relaying communication system in multiterminal Internet of Things (IoT) scenarios. Specifically, while receiving the information from the ground base station, the UAV safely forwards the information to one of a group of IoT terminals in the presence of an eavesdropper. Under the constraints of information causality and UAV mobility, our goal is to maximize the minimum average secrecy rate among all IoT terminals. Based on the nonconvex problem, this article proposes a high-efficiency algorithm for joint optimization of UAV trajectory and resource allocation. The simulation results show that the proposed algorithm not only effectively improves information secrecy of IoT terminals, but also enhances the fairness of communication between the IoT terminals.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available