Joint UAV Deployment and Power Allocation for Secure Space-Air-Ground Communications

被引:20
作者
Han, Chao [1 ,2 ]
Bai, Lin [3 ,4 ]
Bai, Tong [3 ]
Choi, Jinho [5 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing 100191, Peoples R China
[2] Huawei Technol Co Ltd, Beijing 100085, Peoples R China
[3] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
[4] Beihang Univ, Beijing Lab Gen Aviat Technol, Beijing 100191, Peoples R China
[5] Deakin Univ, Sch Informat Technol, Geelong, Vic 3220, Australia
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Resource management; Autonomous aerial vehicles; Satellite broadcasting; Optimization; Uplink; Data collection; Convergence; Space-air-ground communications; physical-layer security; UAV deployment; power allocation; UNMANNED AERIAL VEHICLE; PHYSICAL LAYER SECURITY; PERFORMANCE ANALYSIS; ARTIFICIAL-NOISE; INTELLIGENT; NETWORKS; TRANSMISSION; OPTIMIZATION; ALTITUDE;
D O I
10.1109/TCOMM.2022.3203471
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Owing to their intrinsic advantages of seamless coverage and of high data rate, space-air-ground communications networks (SAGCN) are recognized as one of the emerging technologies for the future wireless communications systems. However, the broadcasting nature of wireless communications inevitably imposes security issues on SAGCN. In this paper, we consider the uplink of the full-duplex unmanned aerial vehicle (UAV)-aided three-layer SAGCN, comprising of ground Internet of Remote Things (IoRT) terminals, an unmanned aerial vehicle, and a low-earth orbit (LEO) satellite, where eavesdroppers are intercepting the information transmitted. In order to ensure a secure uplink transmission, a joint UAV deployment and power allocation scheme is conceived for maximizing the secrecy rate of the SAGCN, subject to the following constraints: i) UAV's power, ii) the UAV deployment area, and iii) the secrecy rate, which are imposed on the different layers. More explicitly, once we formulate a joint optimization problem to maximize the secrecy rate, we decouple the variables and decompose the original problem into multiple subproblems in a tractable manner. Then, we simplify the subproblems with the aid of slack variables and solve them relying on the successive convex approximation method. Following this, initialization schemes are designed to exploit the one-direction greedy method for diverse environment settings, for speeding up the convergence of the iterative algorithm proposed. Finally, simulation results reveal that the convergence can be achieved within a small number of iterations by the proposed initialization scheme, while the algorithm conceived is capable of attaining a substantial improvement of the secrecy rate for the SAGCN.
引用
收藏
页码:6804 / 6818
页数:15
相关论文
共 60 条
[1]   Smart and Secure Wireless Communications via Reflecting Intelligent Surfaces: A Short Survey [J].
Almohamad, Abdullateef ;
Tahir, Anas M. ;
Al-Kababji, Ayman ;
Furqan, Haji M. ;
Khattab, Tamer ;
Hasna, Mazen O. ;
Arslan, Huseyin .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 :1442-1456
[2]   Antenna isolation, wideband multipath propagation measurements, and interference mitigation for on-frequency repeaters [J].
Anderson, CR ;
Krishnamoorthy, S ;
Ranson, CG ;
Lemon, TJ ;
Newhall, WG ;
Kummetz, T ;
Reed, JH .
PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: ENGINEERING CONNECTS, 2004, :110-114
[3]   Resource Allocation for Intelligent Reflecting Surface Aided Wireless Powered Mobile Edge Computing in OFDM Systems [J].
Bai, Tong ;
Pan, Cunhua ;
Ren, Hong ;
Deng, Yansha ;
Elkashlan, Maged ;
Nallanathan, Arumugam .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (08) :5389-5407
[4]   Dynamic Aerial Base Station Placement for Minimum-Delay Communications [J].
Bai, Tong ;
Pan, Cunhua ;
Wang, Jingjing ;
Deng, Yansha ;
Elkashlan, Maged ;
Nallanathan, Arumugam ;
Hanzo, Lajos .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) :1623-1635
[5]   Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems [J].
Bai, Tong ;
Wang, Jingjing ;
Ren, Yong ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (06) :6074-6087
[6]   Physical Layer Security of Multiuser Multirelay Hybrid Satellite-Terrestrial Relay Networks [J].
Bankey, Vinay ;
Upadhyay, Prabhat K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (03) :2488-2501
[7]  
Boyd S., 2004, Convex optimization, DOI [10.1017/CBO9780511804441, DOI 10.1017/CBO9780511804441]
[8]  
Chang T.-H., 2009, Proceedings of the IEEE Global Communications Conference (GLOBECOM), P1
[9]   Secure Primary Transmission Assisted by a Secondary Full-Duplex NOMA Relay [J].
Chen, Bingcai ;
Chen, Yu ;
Chen, Yunfei ;
Cao, Yang ;
Ding, Zhiguo ;
Zhao, Nan ;
Wang, Xianbin .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (07) :7214-7219
[10]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892