Joint Trajectory Design and Resource Allocation for Secure Transmission in Cache-Enabled UAV-Relaying Networks With D2D Communications

被引:75
作者
Ji, Jiequ [1 ,2 ]
Zhu, Kun [1 ,2 ]
Niyato, Dusit [3 ]
Wang, Ran [1 ,2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Collaborat Innovat Ctr Novel Software Technol & I, Nanjing 211106, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Device-to-device communication; Trajectory; Unmanned aerial vehicles; Wireless networks; Communication system security; Transmitters; Device-to-device (D2D) communication; secrecy rate; transmission power; unmanned aerial vehicle (UAV) trajectory; UAV-relaying; user association;
D O I
10.1109/JIOT.2020.3013647
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the exponential growth of data traffic, the use of caching and device-to-device (D2D) communication has been recognized as an effective approach for mitigating the backhaul bottleneck in unmanned aerial vehicle (UAV)-assisted networks. In this article, we investigate the issue of secure transmission in a cache-enabled UAV-relaying network with D2D communications in the presence of an eavesdropper. Specifically, both UAVs and D2D users are equipped with cache memory, which can prestore some popular content to collaboratively serve users. Considering the fairness among users, we formulate an optimization problem to maximize the minimum secrecy rate among users, by jointly optimizing the user association and UAV scheduling, transmission power, and UAV trajectory over a finite period. The joint design problem is a nonconvex mixed-integer programming problem. To efficiently solve this problem, we propose an alternating iterative algorithm based on the block alternating descent and successive convex approximation methods. Specifically, the user association and UAV scheduling, UAV trajectory, and transmission power are optimized alternately in each iteration, and the convergence of the algorithm is proven. Extensive numerical results show that the proposed joint design scheme significantly outperforms other benchmark schemes in terms of the secrecy rate.
引用
收藏
页码:1557 / 1571
页数:15
相关论文
共 32 条
[1]  
Boyd S. P., 2004, Convex Optimization
[2]  
Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
[3]   Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling [J].
Cai, Yunlong ;
Cui, Fangyu ;
Shi, Qingjiang ;
Zhao, Minjian ;
Li, Geoffrey Ye .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (09) :1972-1985
[4]   UAV-Relaying-Assisted Secure Transmission With Caching [J].
Cheng, Fen ;
Gui, Guan ;
Zhao, Nan ;
Chen, Yunfei ;
Tang, Jie ;
Sari, Hikmet .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (05) :3140-3153
[5]   UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells [J].
Cheng, Fen ;
Zhang, Shun ;
Li, Zan ;
Chen, Yunfei ;
Zhao, Nan ;
Yu, F. Richard ;
Leung, Victor C. M. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (07) :6732-6736
[6]   Robust Trajectory and Transmit Power Design for Secure UAV Communications [J].
Cui, Miao ;
Zhang, Guangchi ;
Wu, Qingqing ;
Ng, Derrick Wing Kwan .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (09) :9042-9046
[7]   Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis [J].
Cumanan, Kanapathippillai ;
Alexandropoulos, George C. ;
Ding, Zhiguo ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7495-7505
[8]  
Grant M., CVX: MATLAB software for disciplined convex programming
[9]   Network Coded Software Defined Networking: Enabling 5G Transmission and Storage Networks [J].
Hansen, Jonas ;
Lucani, Daniel E. ;
Krigslund, Jeppe ;
Medard, Muriel ;
Fitzek, Frank H. P. .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (09) :100-107
[10]   A Unified Algorithmic Framework for Block-Structured Optimization Involving Big Data [J].
Hong, Mingyi ;
Razaviyayn, Meisam ;
Luo, Zhi-Quan ;
Pang, Jong-Shi .
IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (01) :57-77