Trajectory and Power Design for Aerial CRNs with Colluding Eavesdroppers

Hongjiang Lei, Jiacheng Jiang, Haosi Yang, Ki Hong Park, Imran Shafique Ansari, Gaofeng Pan, Mohamed Slim Alouini

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Unmanned aerial vehicles (UAVs) offer wireless access services to terrestrial users without geographical limitations, making them integral to future communication systems. However, the openness of wireless channels and the mobility of UAVs pose significant security challenges to UAV-based communication systems. This work delves into the security of aerial cognitive radio networks (CRNs) with multiple location-uncertain colluding eavesdroppers. In this setup, a cognitive aerial base station transmits messages to cognitive terrestrial users using the spectrum resources of primary users. All secondary terrestrial users employ the maximal ratio combining scheme to decode the received message, as do all illegitimate receivers. To maximize the average secrecy rate of aerial CRNs, we jointly optimize the trajectory of the UAV and its transmission power while ensuring that the propulsion energy consumption remains within an acceptable threshold. To address the non-convex mixedvariable optimization problem, we propose an iterative algorithm based on Karush-Kuhn-Tucker condition and successive convex approximation. Numerical results validate the effectiveness of our proposed algorithm, demonstrating improved secrecy performance for airborne CRNs.

Original languageEnglish (US)
Pages (from-to)1-10
Number of pages10
JournalIEEE Transactions on Vehicular Technology
Volume73
Issue number12
DOIs
StateAccepted/In press - 2024

Keywords

  • average secrecy rate
  • multiple colluding eavesdroppers
  • trajectory and power design
  • Unmanned aerial vehicle

ASJC Scopus subject areas

  • Automotive Engineering
  • Aerospace Engineering
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Trajectory and Power Design for Aerial CRNs with Colluding Eavesdroppers'. Together they form a unique fingerprint.

Cite this