Skip to main content
Top
Published in: Wireless Networks 4/2020

16-01-2020

Secrecy capacity maximization for untrusted UAV-assisted cooperative communications with wireless information and power transfer

Authors: Van Phu Tuan, Nguyen Quang Sang, Hyung Yun Kong

Published in: Wireless Networks | Issue 4/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article addresses the problem of secure communication in an unmanned aerial vehicle (UAV)-aided wireless communication system in which a source sends confidential messages to a destination via an untrusted UAV mounted with a miniaturized energy-harvesting transceiver. The UAV can overhear the source’s confidential messages. To create a positive secrecy rate, the destination sends jamming signals during the communication. We aim to maximize the achievable secrecy rate for two scenarios: security-on-demand UAV (SoD-UAV), where the UAV can modify its trajectory and power-splitting (PS) ratio to serve the secure communication, and non-security-on-demand UAV (nSoD-UAV), where the UAV only forwards the source’s messages. For the nSoD-UAV, we optimize the transmit powers at the source and the destination for a given UAV’s trajectory and given PS ratios. For the SoD-UAV, the UAV’s trajectory, the PS ratios and the transmit powers are jointly optimized. Due to the non-convex optimization problems, we use successive convex optimization and block coordinate descent methods to find efficient approximate solutions. Numerical results verify that the achievable secrecy rate is significantly improved using the proposed algorithms.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Xu, J., Zeng, Y., & Zhang, R. (2018). UAV-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Transactions on Wireless Communications, 17(8), 5092–5106.CrossRef Xu, J., Zeng, Y., & Zhang, R. (2018). UAV-enabled wireless power transfer: Trajectory design and energy optimization. IEEE Transactions on Wireless Communications, 17(8), 5092–5106.CrossRef
2.
go back to reference Sun, J., Wang, Z., & Huang, Q. (2019). Cyclical NOMA based UAV-enabled wireless network. IEEE Access, 7, 4248–4259.CrossRef Sun, J., Wang, Z., & Huang, Q. (2019). Cyclical NOMA based UAV-enabled wireless network. IEEE Access, 7, 4248–4259.CrossRef
3.
go back to reference Cho, S., Lee, K., Kang, B., Koo, K., & Joe, I. (2018). Weighted harvest-then-transmit: UAV-enabled wireless powered communication networks. IEEE Access, 6, 72212–72224.CrossRef Cho, S., Lee, K., Kang, B., Koo, K., & Joe, I. (2018). Weighted harvest-then-transmit: UAV-enabled wireless powered communication networks. IEEE Access, 6, 72212–72224.CrossRef
4.
go back to reference Feng, Y., Yan, S., Yang, Z., Yang, N., & Yuan, J. (2018). User and relay selection with artificial noise to enhance physical layer security. IEEE Transactions on Vehicular Technology, 67(11), 10906–10920.CrossRef Feng, Y., Yan, S., Yang, Z., Yang, N., & Yuan, J. (2018). User and relay selection with artificial noise to enhance physical layer security. IEEE Transactions on Vehicular Technology, 67(11), 10906–10920.CrossRef
5.
go back to reference Liu, W., Zhou, X., Durrani, S., & Popovski, P. (2016). Secure communication with a wireless-powered friendly Jammer. IEEE Transactions on Wireless Communications, 15(1), 401–415.CrossRef Liu, W., Zhou, X., Durrani, S., & Popovski, P. (2016). Secure communication with a wireless-powered friendly Jammer. IEEE Transactions on Wireless Communications, 15(1), 401–415.CrossRef
6.
go back to reference Zhu, F., & Yao, M. (2016). Improving physical-layer security for CRNs Using SINR-based cooperative beamforming. IEEE Transactions on Vehicular Technology, 65(3), 1835–1841.CrossRef Zhu, F., & Yao, M. (2016). Improving physical-layer security for CRNs Using SINR-based cooperative beamforming. IEEE Transactions on Vehicular Technology, 65(3), 1835–1841.CrossRef
7.
go back to reference Zhang, W., Chen, J., Kuo, Y., & Zhou, Y. (2019). Artificial-noise-aided optimal beamforming in layered physical layer security. IEEE Communications Letters, 23(1), 72–75.CrossRef Zhang, W., Chen, J., Kuo, Y., & Zhou, Y. (2019). Artificial-noise-aided optimal beamforming in layered physical layer security. IEEE Communications Letters, 23(1), 72–75.CrossRef
8.
go back to reference Zhong, C., Yao, J. & Xu, J. (2019). Secure UAV communication with cooperative jamming and trajectory control. IEEE Communications Letters (accepted). Zhong, C., Yao, J. & Xu, J. (2019). Secure UAV communication with cooperative jamming and trajectory control. IEEE Communications Letters (accepted).
9.
go back to reference Cai, Y., Cui, F., Shi, Q., Zhao, M., & Li, G. Y. (2018). Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling. IEEE Journal on Selected Areas in Communication, 36(9), 1972–1985.CrossRef Cai, Y., Cui, F., Shi, Q., Zhao, M., & Li, G. Y. (2018). Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling. IEEE Journal on Selected Areas in Communication, 36(9), 1972–1985.CrossRef
10.
go back to reference Cui, M., Zhang, G., Wu, Q., & Ng, D. W. K. (2018). Robust trajectory and transmit power design for secure UAV communications. IEEE Transactions on Vehicular Technology, 67(9), 9042–9046.CrossRef Cui, M., Zhang, G., Wu, Q., & Ng, D. W. K. (2018). Robust trajectory and transmit power design for secure UAV communications. IEEE Transactions on Vehicular Technology, 67(9), 9042–9046.CrossRef
11.
go back to reference Liu, L., Zhang, R., & Chua, K. C. (2014). Secrecy wireless information and power transfer With MISO beamforming. IEEE Transactions on Signal Processing, 62(7), 1850–1863.MathSciNetCrossRef Liu, L., Zhang, R., & Chua, K. C. (2014). Secrecy wireless information and power transfer With MISO beamforming. IEEE Transactions on Signal Processing, 62(7), 1850–1863.MathSciNetCrossRef
12.
go back to reference Zhang, H., Li, C., Huang, Y., & Yang, L. (2016). Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Communications Letters, 19(8), 1347–1350.CrossRef Zhang, H., Li, C., Huang, Y., & Yang, L. (2016). Secure beamforming for SWIPT in multiuser MISO broadcast channel with confidential messages. IEEE Communications Letters, 19(8), 1347–1350.CrossRef
13.
go back to reference Kalamkar, S. S., & Banerjee, A. (2017). Secure communication via a wireless energy harvesting untrusted relay. IEEE Transactions on Vehicular Technology, 66(3), 2199–2213.CrossRef Kalamkar, S. S., & Banerjee, A. (2017). Secure communication via a wireless energy harvesting untrusted relay. IEEE Transactions on Vehicular Technology, 66(3), 2199–2213.CrossRef
14.
go back to reference Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge Univ. Press.CrossRef Boyd, S., & Vandenberghe, L. (2004). Convex optimization. Cambridge: Cambridge Univ. Press.CrossRef
15.
go back to reference Chong, E. K. P., & Zak, S. H. (2004). An introduction to optimization (2nd ed.). Hoboken: Wiley.MATH Chong, E. K. P., & Zak, S. H. (2004). An introduction to optimization (2nd ed.). Hoboken: Wiley.MATH
Metadata
Title
Secrecy capacity maximization for untrusted UAV-assisted cooperative communications with wireless information and power transfer
Authors
Van Phu Tuan
Nguyen Quang Sang
Hyung Yun Kong
Publication date
16-01-2020
Publisher
Springer US
Published in
Wireless Networks / Issue 4/2020
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-020-02255-w

Other articles of this Issue 4/2020

Wireless Networks 4/2020 Go to the issue