Secrecy capacity maximization for untrusted UAV-assisted cooperative communications with wireless information and power transfer

被引:8
作者
Van Phu Tuan [1 ]
Nguyen Quang Sang [2 ]
Kong, Hyung Yun [3 ]
机构
[1] Kongju Natl Univ, Dept Informat & Commun Engn, Cheonan, South Korea
[2] DuyTan Univ, Inst Fundamental & Appl Sci, Ho Chi Minh City, Vietnam
[3] Univ Ulsan, Dept Elect Engn, Ulsan, South Korea
基金
新加坡国家研究基金会;
关键词
Physical layer security; Cooperative communication; Untrusted UAV; Wireless energy harvesting; Destination-assisted jamming; TRAJECTORY DESIGN;
D O I
10.1007/s11276-020-02255-w
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article addresses the problem of secure communication in an unmanned aerial vehicle (UAV)-aided wireless communication system in which a source sends confidential messages to a destination via an untrusted UAV mounted with a miniaturized energy-harvesting transceiver.The UAV can overhear the source's confidential messages. To create a positive secrecy rate, the destination sends jamming signals during the communication. We aim to maximize the achievable secrecy rate for two scenarios: security-on-demand UAV (SoD-UAV), where the UAV can modify its trajectory and power-splitting (PS) ratio to serve the secure communication, and non-security-on-demand UAV (nSoD-UAV), where the UAV only forwards the source's messages. For the nSoD-UAV, we optimize the transmit powers at the source and the destination for a given UAV's trajectory and given PS ratios. For the SoD-UAV, the UAV's trajectory, the PS ratios and the transmit powers are jointly optimized. Due to the non-convex optimization problems, we use successive convex optimization and block coordinate descent methods to find efficient approximate solutions. Numerical results verify that the achievable secrecy rate is significantly improved using the proposed algorithms.
引用
收藏
页码:2999 / 3010
页数:12
相关论文
共 15 条
[1]  
Boyd S., 2004, Convex optimization
[2]   Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling [J].
Cai, Yunlong ;
Cui, Fangyu ;
Shi, Qingjiang ;
Zhao, Minjian ;
Li, Geoffrey Ye .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) :1972-1985
[3]   Weighted Harvest-Then-Transmit: UAV-Enabled Wireless Powered Communication Networks [J].
Cho, Sungryung ;
Lee, Kyungrak ;
Kang, Boojoong ;
Koo, Kwangmin ;
Joe, Inwhee .
IEEE ACCESS, 2018, 6 :72212-72224
[4]  
Chong EK, 2004, INTRO OPTIMIZATION
[5]   Robust Trajectory and Transmit Power Design for Secure UAV Communications [J].
Cui, Miao ;
Zhang, Guangchi ;
Wu, Qingqing ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :9042-9046
[6]   User and Relay Selection With Artificial Noise to Enhance Physical Layer Security [J].
Feng, Youhong ;
Yan, Shihao ;
Yang, Zhen ;
Yang, Nan ;
Yuan, Jinhong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (11) :10906-10920
[7]   Secure Communication via a Wireless Energy Harvesting Untrusted Relay [J].
Kalamkar, Sanket S. ;
Banerjee, Adrish .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (03) :2199-2213
[8]   Secrecy Wireless Information and Power Transfer With MISO Beamforming [J].
Liu, Liang ;
Zhang, Rui ;
Chua, Kee-Chaing .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (07) :1850-1863
[9]   Secure Communication With a Wireless-Powered Friendly Jammer [J].
Liu, Wanchun ;
Zhou, Xiangyun ;
Durrani, Salman ;
Popovski, Petar .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (01) :401-415
[10]   Cyclical NOMA Based UAV-Enabled Wireless Network [J].
Sun, Jinjing ;
Wang, Zulin ;
Huang, Qin .
IEEE ACCESS, 2019, 7 :4248-4259