Cargando…
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695691/ https://www.ncbi.nlm.nih.gov/pubmed/31390843 http://dx.doi.org/10.3390/s19153442 |
_version_ | 1783444094726438912 |
---|---|
author | Shen, Lingfeng Wang, Ning Ji, Xiang Mu, Xiaomin Cai, Lin |
author_facet | Shen, Lingfeng Wang, Ning Ji, Xiang Mu, Xiaomin Cai, Lin |
author_sort | Shen, Lingfeng |
collection | PubMed |
description | With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well. |
format | Online Article Text |
id | pubmed-6695691 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66956912019-09-05 Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying Shen, Lingfeng Wang, Ning Ji, Xiang Mu, Xiaomin Cai, Lin Sensors (Basel) Article With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well. MDPI 2019-08-06 /pmc/articles/PMC6695691/ /pubmed/31390843 http://dx.doi.org/10.3390/s19153442 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Shen, Lingfeng Wang, Ning Ji, Xiang Mu, Xiaomin Cai, Lin Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title | Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_full | Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_fullStr | Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_full_unstemmed | Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_short | Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_sort | iterative trajectory optimization for physical-layer secure buffer-aided uav mobile relaying |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695691/ https://www.ncbi.nlm.nih.gov/pubmed/31390843 http://dx.doi.org/10.3390/s19153442 |
work_keys_str_mv | AT shenlingfeng iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT wangning iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT jixiang iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT muxiaomin iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT cailin iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying |