UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization

被引:1
作者
Han, Ruibo [1 ]
Wang, Yongjian [2 ]
Zhang, Yang [2 ]
机构
[1] Harbin Engn Univ, Yantai Res Inst, Yantai 264000, Peoples R China
[2] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100000, Peoples R China
关键词
Unmanned aerial vehicles; Non-orthogonal multiple access; Physical layer security; Power allocation; NETWORKS; INTERNET; DESIGN;
D O I
10.1186/s13634-023-01056-5
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the inherent advantages of exceptional maneuverability, flexible deployment options and cost-effectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in high-traffic or remote areas. Nevertheless, the openness of the air-ground channel poses significant security challenges to UAV-based wireless systems. In this paper, a UAV-assisted secure communication system model is established based on non-orthogonal multiple access (NOMA) from the perspective of physical layer security, aiming to conceal the transmission behavior between UAVs and legitimate users (LUs). Specifically, a mobile UAV assumes the role of an aerial base station, leveraging NOMA technique to transmit data to LUs while evading detection from mobile eavesdropper situated on the ground. To fortify the security performance of the system, a hovering UAV acts as a friendly jammer and transmits interference signals to mobile eavesdropper (referred to as Eve). The objective of this scheme is to maximize the minimum average secure rate of all LUs by meticulously optimizing the trajectory and power allocation of the mobile UAV, subject to secrecy performance constraints. The highly interdependent and non-convex nature of this optimization problem renders direct solutions infeasible. Hence, this paper designs an efficient iterative algorithm that decouples the original problem into two subproblems, enabling an alternating optimization process for the trajectory and power allocation of the mobile UAV until the convergence of the objective function is achieved. Simulation results demonstrate that the proposed algorithm effectively improves the minimum average secure rate of all LUs compared with the benchmark scheme.
引用
收藏
页数:19
相关论文
共 41 条
[1]   Relay-Assisted Federated Edge Learning: Performance Analysis and System Optimization [J].
Chen, Lunyuan ;
Fan, Lisheng ;
Lei, Xianfu ;
Duong, Trung Q. ;
Nallanathan, Arumugam ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (06) :3387-3401
[2]  
Duo B, 2021, CHINA COMMUN, V18, P88, DOI 10.23919/JCC.2021.01.008
[3]   5G Technology and the Future of Architecture [J].
El-Shorbagy, Abdel-moniem .
LEARNING AND TECHNOLOGY CONFERENCE 2020; BEYOND 5G: PAVING THE WAY FOR 6G, 2021, 182 :121-131
[4]   AoI-Inspired Collaborative Information Collection for AUV-Assisted Internet of Underwater Things [J].
Fang, Zhengru ;
Wang, Jingjing ;
Jiang, Chunxiao ;
Zhang, Qinyu ;
Ren, Yong .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (19) :14559-14571
[5]   Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints [J].
Gao, Ying ;
Tang, Hongying ;
Li, Baoqing ;
Yuan, Xiaobing .
IEEE ACCESS, 2019, 7 :44459-44470
[6]  
Gui G, 2019, IEEE COMMUN LETT, V23, P1267, DOI [10.1109/LCOMM.2019.2916398, 10.1109/lcomm.2019.2916398]
[7]   Distributed Machine Learning for Multiuser Mobile Edge Computing Systems [J].
Guo, Yinghao ;
Zhao, Rui ;
Lai, Shiwei ;
Fan, Lisheng ;
Lei, Xianfu ;
Karagiannidis, George K. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2022, 16 (03) :460-473
[8]   Nonorthogonal Interleave-Grid Multiple Access Scheme for Industrial Internet of Things in 5G Network [J].
Hu, Su ;
Yu, Bin ;
Qian, Chen ;
Xiao, Yue ;
Xiong, Qi ;
Sun, Chengjun ;
Gao, Yuan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (12) :5436-5446
[9]   A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security [J].
Jameel, Furqan ;
Wyne, Shurjeel ;
Kaddoum, Georges ;
Trung Q Duong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2734-2771
[10]   Joint Cache and Trajectory Optimization for Secure UAV-relaying with Underlaid D2D Communications [J].
Ji, Jiequ ;
Zhu, Kun ;
Niyato, Dusit ;
Wang, Ran .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,