4.8 Article

Joint Trajectory Design and Resource Allocation for Secure Transmission in Cache-Enabled UAV-Relaying Networks With D2D Communications

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 8, 期 3, 页码 1557-1571

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.3013647

关键词

Device-to-device communication; Trajectory; Unmanned aerial vehicles; Wireless networks; Communication system security; Transmitters; Device-to-device (D2D) communication; secrecy rate; transmission power; unmanned aerial vehicle (UAV) trajectory; UAV-relaying; user association

资金

  1. National Natural Science Foundation of China [61701230]
  2. Natural Science Foundation of Jiangsu Province [BK20170805]
  3. Singapore Energy Market Authority Energy Resilience [NRF2017EWT-EP003-041]
  4. Singapore National Research Foundation (NRF) [NRF2015-NRF-ISF001-2277]
  5. Singapore National Satellite of Excellence [DeST-SCI2019-0007]
  6. A*STAR-NTU-SUTD [RGANS1906]
  7. Autonomous Systems and Software Program [M4082187 (4080)]
  8. Nanyang Technological University [M4082187 (4080)]
  9. NTU-WeBank JRI [NWJ-2020-004]

向作者/读者索取更多资源

With the exponential growth of data traffic, the use of caching and device-to-device (D2D) communication has been recognized as an effective approach for mitigating the backhaul bottleneck in unmanned aerial vehicle (UAV)-assisted networks. In this article, we investigate the issue of secure transmission in a cache-enabled UAV-relaying network with D2D communications in the presence of an eavesdropper. Extensive numerical results show that the proposed joint design scheme significantly outperforms other benchmark schemes in terms of the secrecy rate.
With the exponential growth of data traffic, the use of caching and device-to-device (D2D) communication has been recognized as an effective approach for mitigating the backhaul bottleneck in unmanned aerial vehicle (UAV)-assisted networks. In this article, we investigate the issue of secure transmission in a cache-enabled UAV-relaying network with D2D communications in the presence of an eavesdropper. Specifically, both UAVs and D2D users are equipped with cache memory, which can prestore some popular content to collaboratively serve users. Considering the fairness among users, we formulate an optimization problem to maximize the minimum secrecy rate among users, by jointly optimizing the user association and UAV scheduling, transmission power, and UAV trajectory over a finite period. The joint design problem is a nonconvex mixed-integer programming problem. To efficiently solve this problem, we propose an alternating iterative algorithm based on the block alternating descent and successive convex approximation methods. Specifically, the user association and UAV scheduling, UAV trajectory, and transmission power are optimized alternately in each iteration, and the convergence of the algorithm is proven. Extensive numerical results show that the proposed joint design scheme significantly outperforms other benchmark schemes in terms of the secrecy rate.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据