TY - JOUR
T1 - Joint Trajectory Design and User Scheduling for Secure Aerial Underlay IoT Systems
AU - Lei, Hongjiang
AU - Yang, Haosi
AU - Park, Kihong
AU - Ansari, Imran Shafique
AU - Jiang, Jing
AU - Alouini, Mohamed-Slim
N1 - KAUST Repository Item: Exported on 2023-03-31
Acknowledgements: This work was supported by the National Natural Science Foundation of China under Grant 61971080 and the Open Fund of the Shaanxi Key Laboratory of Information Communication Network and Security under Grant ICNS201807.
PY - 2023/3/28
Y1 - 2023/3/28
N2 - Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. In this work, we investigate the security of aerial underlay Internet of Things (IoT) systems by jointly designing trajectory and user scheduling. An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial jammer transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdropping node locations is considered, and the average secrecy rate of the secondary user is maximized by optimizing multiple users’ scheduling, the UAVs’ trajectory, and transmit power. To solve the non-convex optimization problem with mixed multi-integer variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial in improving the secrecy performance of aerial underlay IoT systems.
AB - Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. In this work, we investigate the security of aerial underlay Internet of Things (IoT) systems by jointly designing trajectory and user scheduling. An airborne base station transmits confidential messages to secondary users utilizing the same spectrum as the primary network. An aerial jammer transmits jamming signals to suppress the eavesdropper to enhance secrecy performance. The uncertainty of eavesdropping node locations is considered, and the average secrecy rate of the secondary user is maximized by optimizing multiple users’ scheduling, the UAVs’ trajectory, and transmit power. To solve the non-convex optimization problem with mixed multi-integer variable problem, we propose an iterative algorithm based on block coordinate descent and successive convex approximation. Numerical results verify the effectiveness of our proposed algorithm and demonstrate that our scheme is beneficial in improving the secrecy performance of aerial underlay IoT systems.
UR - http://hdl.handle.net/10754/690738
UR - https://ieeexplore.ieee.org/document/10083188/
U2 - 10.1109/jiot.2023.3262697
DO - 10.1109/jiot.2023.3262697
M3 - Article
SN - 2327-4662
SP - 1
EP - 1
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
ER -