Secrecy Analysis and Optimization of UAV-Assisted IoT Networks With RF-EH and Imperfect Hardware

被引:0
|
作者
Pandey, Gaurav Kumar [1 ]
Gurjar, Devendra Singh [1 ]
Yadav, Suneel [2 ]
Krstic, Dragana [3 ]
Jiang, Yuming [4 ]
机构
[1] Natl Inst Technol Silchar, Dept Elect & Commun Engn, Silchar 788010, India
[2] Indian Inst Informat Technol Allahabad, Dept Elect & Commun Engn, Prayagraj 211015, India
[3] Univ Nis, Fac Elect Engn, Nish 18104, Serbia
[4] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-7491 Trondheim, Norway
来源
IEEE INTERNET OF THINGS JOURNAL | 2025年 / 12卷 / 07期
关键词
Autonomous aerial vehicles; Relays; Internet of Things; Jamming; Reliability; Optimization; Genetic algorithms; Fading channels; Air to ground communication; Hardware; Artificial noise (AN); energy harvesting (EH); Internet of Things (IoT) devices; optimization technique; relay selection; security-reliability tradeoff (SRT); uncrewed aerial vehicles (UAVs); PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION; OUTAGE PROBABILITY; TRAJECTORY DESIGN; NOMA; COMMUNICATION; SELECTION;
D O I
10.1109/JIOT.2025.3540061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article introduces uncrewed aerial vehicles (UAVs) assisted communication system for energy-constrained Internet of Things (IoT) devices. Herein, a power beacon transmits radio frequency (RF) signals to enable energy harvesting at the IoT devices (IoDs). The source IoD utilizes harvested energy to transmit information to the destination IoD through multiple UAV relays. Among multiple UAV relays, a selected UAV applies a decode-and-forward operation to relay the information to the destination. An eavesdropper near the destination IoD poses a threat to information secrecy. Consequently, the selected UAV injects artificial noise to degrade the accessibility of the eavesdropper's link. For this setup, we employ a composite fading channel model by combining log-normal distribution for shadowing effects and Nakagami-m distribution for small-scale fading to evaluate system performance. Specifically, the compact expressions for secrecy outage probability and effective secrecy throughput (EST) are derived using the Gauss-Hermite quadrature method. Moreover, we conduct a tradeoff analysis between reliability and security by factoring in outage and intercept probabilities. Lastly, we formulate an EST maximization problem by optimizing the system parameters and UAV's locations under the outage and secrecy constraints. We propose a particle swarm optimization and continuous genetic algorithm-based hybrid algorithm for solving the nonlinear optimization problem. The numerical findings demonstrate that the proposed algorithm outperforms the baseline algorithms regarding the achieved EST.
引用
收藏
页码:8049 / 8063
页数:15
相关论文
共 50 条
  • [21] Massive heterogeneous data collecting in UAV-assisted wireless IoT networks
    Li, Dongji
    Xu, Shaoyi
    Li, Yan
    IET COMMUNICATIONS, 2023, 17 (14) : 1706 - 1720
  • [22] UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach
    Yin, Zhisheng
    Cheng, Nan
    Song, Yunchao
    Hui, Yilong
    Li, Yunhan
    Luan, Tom H.
    Yu, Shui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 6904 - 6915
  • [23] Joint Multi-Domain Resource Allocation and Trajectory Optimization in UAV-Assisted Maritime IoT Networks
    Qian, Li Ping
    Zhang, Hongsen
    Wang, Qian
    Wu, Yuan
    Lin, Bin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 539 - 552
  • [24] Performance Analysis of UAV-Assisted RF-UOWC Systems
    Devaja, Tijana
    Petkovic, Milica
    Beko, Marko
    Vukobratovic, Dejan
    2024 7TH INTERNATIONAL BALKAN CONFERENCE ON COMMUNICATIONS AND NETWORKING, BALKANCOM, 2024, : 280 - 284
  • [25] Performance Analysis of IoT Networks with UAV-assisted NOMA-based WPT-MEC
    Anh-Nhat Nguyen
    Dinh-Cuong Hoang
    Gia-Huy Nguyen
    Khai Nguyen
    Nam-Truong Nguyen
    PROCEEDINGS OF THE 2024 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION TECHNOLOGY, ICIIT 2024, 2024, : 416 - 422
  • [26] Joint Trajectory and Precoding Optimization for UAV-Assisted NOMA Networks
    Zhao, Nan
    Pang, Xiaowei
    Li, Zan
    Chen, Yunfei
    Li, Feng
    Ding, Zhiguo
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (05) : 3723 - 3735
  • [27] Joint Optimization for Covert Communications in UAV-Assisted NOMA Networks
    Deng, Dan
    Dang, Shuping
    Li, Xingwang
    Ng, Derrick Wing Kwan
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (01) : 1012 - 1026
  • [28] Secrecy Performance Analysis of Integrated RF-UOWC IoT Networks Enabled by UAV and Underwater RIS
    Bin Sarawar, Abrar
    Badrudduza, A. S. M.
    Ibrahim, Md.
    Ansari, Imran Shafique
    Yu, Heejung
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 2592 - 2608
  • [29] Modeling and Analysis of UAV-Assisted Mobile Network with Imperfect Beam Alignment
    Ouamri, Mohamed Amine
    Alkanhel, Reem
    Gueguen, Cedric
    Alohali, Manal Abdullah
    Ghoneim, Sherif S. M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (01): : 453 - 467
  • [30] On the Optimization of UAV-Assisted Wireless Networks for Hierarchical Federated Learning
    Khelf, Roumaissa
    Driouch, Elmahdi
    Ajib, Wessam
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,