Cargando…

Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying

With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that...

Descripción completa

Detalles Bibliográficos
Autores principales: Shen, Lingfeng, Wang, Ning, Ji, Xiang, Mu, Xiaomin, Cai, Lin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695691/
https://www.ncbi.nlm.nih.gov/pubmed/31390843
http://dx.doi.org/10.3390/s19153442
_version_ 1783444094726438912
author Shen, Lingfeng
Wang, Ning
Ji, Xiang
Mu, Xiaomin
Cai, Lin
author_facet Shen, Lingfeng
Wang, Ning
Ji, Xiang
Mu, Xiaomin
Cai, Lin
author_sort Shen, Lingfeng
collection PubMed
description With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.
format Online
Article
Text
id pubmed-6695691
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66956912019-09-05 Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying Shen, Lingfeng Wang, Ning Ji, Xiang Mu, Xiaomin Cai, Lin Sensors (Basel) Article With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well. MDPI 2019-08-06 /pmc/articles/PMC6695691/ /pubmed/31390843 http://dx.doi.org/10.3390/s19153442 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Shen, Lingfeng
Wang, Ning
Ji, Xiang
Mu, Xiaomin
Cai, Lin
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_full Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_fullStr Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_full_unstemmed Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_short Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_sort iterative trajectory optimization for physical-layer secure buffer-aided uav mobile relaying
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6695691/
https://www.ncbi.nlm.nih.gov/pubmed/31390843
http://dx.doi.org/10.3390/s19153442
work_keys_str_mv AT shenlingfeng iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT wangning iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT jixiang iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT muxiaomin iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT cailin iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying