Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying

dc.contributor.authorShen, Lingfeng
dc.contributor.authorWang, Ning
dc.contributor.authorJi, Xiang
dc.contributor.authorMu, Xiaomin
dc.contributor.authorCai, Lin
dc.date.accessioned2019-12-24T00:11:59Z
dc.date.available2019-12-24T00:11:59Z
dc.date.copyright2019en_US
dc.date.issued2019
dc.description.abstractWith the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.en_US
dc.description.reviewstatusRevieweden_US
dc.description.scholarlevelFacultyen_US
dc.description.sponsorshipThis research was funded in part by the National Science Foundation of China under Grant no. 61771431, and by the National Science and Technology Major Project under grant No. 2017ZX03001001. The APC was funded by the National Science Foundation of China under Grant no. 61771431.en_US
dc.identifier.citationShen, L., Wang, N., Ji, X., Mu, X. & Cai, L. (2019). Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying. Sensors, 19(15), 3442. https://doi.org/10.3390/s19153442en_US
dc.identifier.urihttp://dx.doi.org/10.3390/s19153442
dc.identifier.urihttp://hdl.handle.net/1828/11423
dc.language.isoenen_US
dc.publisherSensorsen_US
dc.subjectbuffer-aided relaying
dc.subjectphysical-layer security
dc.subjectsecrecy rate
dc.subjecttrajectory optimization
dc.subjectUAV mobile relay
dc.subject.departmentDepartment of Electrical and Computer Engineering
dc.titleIterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relayingen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Shen_L_Sensors_2019.pdf
Size:
1.12 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: