Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-08-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/19/15/3442 |
id |
doaj-58106a4642f34071a81f3fdfe90f3841 |
---|---|
record_format |
Article |
spelling |
doaj-58106a4642f34071a81f3fdfe90f38412020-11-25T01:34:38ZengMDPI AGSensors1424-82202019-08-011915344210.3390/s19153442s19153442Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile RelayingLingfeng Shen0Ning Wang1Xiang Ji2Xiaomin Mu3Lin Cai4School of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaDepartment of Electrical and Computer Engineering, University of Victoria, Victoria, BC V8W 2Y2, CanadaWith the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.https://www.mdpi.com/1424-8220/19/15/3442buffer-aided relayingphysical-layer securitysecrecy ratetrajectory optimizationUAV mobile relay |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Lingfeng Shen Ning Wang Xiang Ji Xiaomin Mu Lin Cai |
spellingShingle |
Lingfeng Shen Ning Wang Xiang Ji Xiaomin Mu Lin Cai Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying Sensors buffer-aided relaying physical-layer security secrecy rate trajectory optimization UAV mobile relay |
author_facet |
Lingfeng Shen Ning Wang Xiang Ji Xiaomin Mu Lin Cai |
author_sort |
Lingfeng Shen |
title |
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_short |
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_full |
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_fullStr |
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_full_unstemmed |
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying |
title_sort |
iterative trajectory optimization for physical-layer secure buffer-aided uav mobile relaying |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2019-08-01 |
description |
With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well. |
topic |
buffer-aided relaying physical-layer security secrecy rate trajectory optimization UAV mobile relay |
url |
https://www.mdpi.com/1424-8220/19/15/3442 |
work_keys_str_mv |
AT lingfengshen iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT ningwang iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT xiangji iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT xiaominmu iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying AT lincai iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying |
_version_ |
1725070653345759232 |