Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying

With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that...

Full description

Bibliographic Details
Main Authors: Lingfeng Shen, Ning Wang, Xiang Ji, Xiaomin Mu, Lin Cai
Format: Article
Language:English
Published: MDPI AG 2019-08-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/19/15/3442
id doaj-58106a4642f34071a81f3fdfe90f3841
record_format Article
spelling doaj-58106a4642f34071a81f3fdfe90f38412020-11-25T01:34:38ZengMDPI AGSensors1424-82202019-08-011915344210.3390/s19153442s19153442Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile RelayingLingfeng Shen0Ning Wang1Xiang Ji2Xiaomin Mu3Lin Cai4School of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaSchool of Information Engineering, Zhengzhou University, Zhengzhou 450001, ChinaDepartment of Electrical and Computer Engineering, University of Victoria, Victoria, BC V8W 2Y2, CanadaWith the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.https://www.mdpi.com/1424-8220/19/15/3442buffer-aided relayingphysical-layer securitysecrecy ratetrajectory optimizationUAV mobile relay
collection DOAJ
language English
format Article
sources DOAJ
author Lingfeng Shen
Ning Wang
Xiang Ji
Xiaomin Mu
Lin Cai
spellingShingle Lingfeng Shen
Ning Wang
Xiang Ji
Xiaomin Mu
Lin Cai
Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
Sensors
buffer-aided relaying
physical-layer security
secrecy rate
trajectory optimization
UAV mobile relay
author_facet Lingfeng Shen
Ning Wang
Xiang Ji
Xiaomin Mu
Lin Cai
author_sort Lingfeng Shen
title Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_short Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_full Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_fullStr Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_full_unstemmed Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying
title_sort iterative trajectory optimization for physical-layer secure buffer-aided uav mobile relaying
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2019-08-01
description With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.
topic buffer-aided relaying
physical-layer security
secrecy rate
trajectory optimization
UAV mobile relay
url https://www.mdpi.com/1424-8220/19/15/3442
work_keys_str_mv AT lingfengshen iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT ningwang iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT xiangji iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT xiaominmu iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
AT lincai iterativetrajectoryoptimizationforphysicallayersecurebufferaideduavmobilerelaying
_version_ 1725070653345759232