Journal
JOURNAL OF COMMUNICATIONS AND NETWORKS
Volume 24, Issue 2, Pages 139-153Publisher
KOREAN INST COMMUNICATIONS SCIENCES (K I C S)
DOI: 10.23919/JCN.2021.000044
Keywords
Index Terms; Physical layer security; resource allocation; ro-; bust trajectory; UAV cognitive relay; UAV jammer
Funding
- National Science Foundation of China (NSFC) [62161024, 62061030, 81960325]
- China Postdoctoral Science Foundation [2021TQ0136]
- State Key Laboratory of Computer Architecture (ICT, CAS) Open Project [CARCHB202019]
- Key Research and Development Project of Jiangxi Province [20202BBE53019]
Ask authors/readers for more resources
This paper investigates the application of unmanned aerial vehicles (UAVs) in addressing physical layer security issues. By optimizing the trajectories and power of UAV relays, along with the use of jamming signals, the security performance of the relay network can be enhanced.
paper considers a novel scenario, where a physical layer security issue is studied in unmanned aerial vehicles (UAVs)-assisted cognitive relay system. A secondary unmanned aerial vehicle (SUAV) relay delivers information from multiple secondary Internet of things (IoT) devices to a secondary user (SU) under the spectrum sharing with primary users (PUs). In the processing of the information transmission of the SUAV relay, a secondary eavesdropper (SE) wiretaps the information transmitted by the UAV relay with imperfect location information. In order to confuse the SE, a friendly SUAV jammer is employed to transmit jamming signals to the SE. To prevent the SE wiretapping information as much as possible, we aim to maximize average worst-case secrecy rate of the secondary relay network by jointly optimizing robust trajectories and power of the SUAV relay and jammer under the power, trajectories, information causality and multiple interference temperature (IT) threshold constraints. Thus, we formulate the original problem which is a challenging non-convex problem. We propose an effective algorithm to solve the original problem and attain locally optimal solution based on the successive convex approximation (SCA) technology and the alternate optimization method. Simulations are offered to demonstrate that our proposed resource allocation scheme can effectively improve the security performance of the SUAV relay network in comparison with other benchmark schemes.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available