Secrecy Analysis and Optimization of UAV-Assisted IoT Networks With RF-EH and Imperfect Hardware

被引:0
|
作者
Pandey, Gaurav Kumar [1 ]
Gurjar, Devendra Singh [1 ]
Yadav, Suneel [2 ]
Krstic, Dragana [3 ]
Jiang, Yuming [4 ]
机构
[1] Natl Inst Technol Silchar, Dept Elect & Commun Engn, Silchar 788010, India
[2] Indian Inst Informat Technol Allahabad, Dept Elect & Commun Engn, Prayagraj 211015, India
[3] Univ Nis, Fac Elect Engn, Nish 18104, Serbia
[4] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-7491 Trondheim, Norway
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 07期
关键词
Autonomous aerial vehicles; Relays; Internet of Things; Jamming; Reliability; Optimization; Genetic algorithms; Fading channels; Air to ground communication; Hardware; Artificial noise (AN); energy harvesting (EH); Internet of Things (IoT) devices; optimization technique; relay selection; security-reliability tradeoff (SRT); uncrewed aerial vehicles (UAVs); PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION; OUTAGE PROBABILITY; TRAJECTORY DESIGN; NOMA; COMMUNICATION; SELECTION;
D O I
10.1109/JIOT.2025.3540061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article introduces uncrewed aerial vehicles (UAVs) assisted communication system for energy-constrained Internet of Things (IoT) devices. Herein, a power beacon transmits radio frequency (RF) signals to enable energy harvesting at the IoT devices (IoDs). The source IoD utilizes harvested energy to transmit information to the destination IoD through multiple UAV relays. Among multiple UAV relays, a selected UAV applies a decode-and-forward operation to relay the information to the destination. An eavesdropper near the destination IoD poses a threat to information secrecy. Consequently, the selected UAV injects artificial noise to degrade the accessibility of the eavesdropper's link. For this setup, we employ a composite fading channel model by combining log-normal distribution for shadowing effects and Nakagami-m distribution for small-scale fading to evaluate system performance. Specifically, the compact expressions for secrecy outage probability and effective secrecy throughput (EST) are derived using the Gauss-Hermite quadrature method. Moreover, we conduct a tradeoff analysis between reliability and security by factoring in outage and intercept probabilities. Lastly, we formulate an EST maximization problem by optimizing the system parameters and UAV's locations under the outage and secrecy constraints. We propose a particle swarm optimization and continuous genetic algorithm-based hybrid algorithm for solving the nonlinear optimization problem. The numerical findings demonstrate that the proposed algorithm outperforms the baseline algorithms regarding the achieved EST.
引用
收藏
页码:8049 / 8063
页数:15
相关论文
共 50 条
  • [1] Secrecy Offloading Analysis for UAV-Assisted NOMA-MEC in IoT Networks with Imperfect CSI
    Anh-Nhat Nguyen
    Tung-Son Ngo
    Manh-Duc Hoang
    Phuong-Chi Le
    Ngoc-Anh Bui
    Tien-Dat Trinh
    Gia-Huy Nguyen
    Minh-Sang Nguyen
    INTELLIGENCE OF THINGS: TECHNOLOGIES AND APPLICATIONS, ICIT 2024, VOL 2, 2025, 230 : 349 - 360
  • [2] Flying path optimization in UAV-assisted IoT sensor networks
    Yoo, Sang-Jo
    Park, Jae-hyun
    Kim, Su-hee
    Shrestha, Anish
    ICT EXPRESS, 2016, 2 (03): : 140 - 144
  • [3] Nonlinear EH-Based UAV-Assisted FD IoT Networks: Infinite and Finite Blocklength Analysis
    Raut, Prasanna
    Singh, Keshav
    Li, Chih-Peng
    Alouini, Mohamed-Slim
    Huang, Wan-Jen
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24): : 17655 - 17668
  • [4] Max-Min Secrecy Rate for UAV-Assisted Energy Harvesting IoT Networks
    Zheng, Mingrui
    Feng, Tianrui
    He, Tengjiao
    INFORMATION, 2025, 16 (02)
  • [5] Energy-Efficient Trajectory Optimization for UAV-Assisted IoT Networks
    Zhang, Liang
    Celik, Abdulkadir
    Dang, Shuping
    Shihada, Basem
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (12) : 4323 - 4337
  • [6] On the Coverage of UAV-Assisted SWIPT Networks With Nonlinear EH Model
    Jiang, Ruihong
    Xiong, Ke
    Yang, Hong-Chuan
    Fan, Pingyi
    Zhong, Zhangdui
    Ben Letaief, Khaled
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (06) : 4464 - 4481
  • [7] Secrecy-Optimized Resource Allocation for UAV-Assisted Relaying Networks
    Li, Bin
    Fei, Zesong
    Dai, Yueyue
    Zhang, Yan
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [8] Secrecy Performance Analysis of UAV-Assisted Relaying Communication Systems
    Bao, Tingnan
    Yang, Hong-Chuan
    Hasna, Mazen O.
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (01) : 1122 - 1126
  • [9] The Role of UAV-Assisted IoT Networks in Managing the Impact of the Pandemic
    Rouault M.
    Ejaz W.
    Naeem M.
    Masroor R.
    IEEE Communications Standards Magazine, 2021, 5 (04): : 10 - 16
  • [10] On the Secrecy Performance of UAV-assisted Wireless Communication System With Hardware Impairments and Protected Zone
    Li, Minglu
    Yu, Xiangbin
    He, Ansu
    Teng, Tao
    2022 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2022, : 993 - 998