Skip to main content
Top
Published in: Wireless Networks 6/2023

11-04-2023 | Original Paper

Secure SWIPT-powered UAV communication against full-duplex active eavesdropper

Authors: Danyu Diao, Buhong Wang, Kunrui Cao

Published in: Wireless Networks | Issue 6/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To further address the energy constraint problem and improve the secrecy performance of unmanned aerial vehicle (UAV) systems in the fifth generation (5G)-enabled Internet of Things, we consider a secure UAV system with simultaneous wireless information and power transfer in the presence of a full-duplex active eavesdropper, which eavesdrops on confidential information and transmits malicious jamming signals simultaneously. In particular, the UAV is powered by a constrained onboard battery that can harvest energy from the ambient radio frequency signals. The trajectory of the UAV, power splitting ratio, and transmitting power are jointly optimized to maximize the secrecy rate of the system. Owing to the non-convexity of the problem, we propose an alternative optimization algorithm by applying successive convex approximation and block coordinate descent methods. The simulation results show the proposed joint optimization algorithm can promote the average secrecy rate of the system as compared with other benchmark schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
The contribution of our paper may be extended to multi-antenna cases, details will be taken as future work.
 
2
Experiments in [30] show that the LoS channel model can describe the ground-air channel well.
 
Literature
1.
go back to reference Shahzadi, R., Ali, M., Khan, H. Z., & Naeem, M. (2021). UAV assisted 5G and beyond wireless networks: A survey. Journal of Network and Computer Applications, 189, 103114.CrossRef Shahzadi, R., Ali, M., Khan, H. Z., & Naeem, M. (2021). UAV assisted 5G and beyond wireless networks: A survey. Journal of Network and Computer Applications, 189, 103114.CrossRef
2.
go back to reference Li, B., Li, Q., Zeng, Y., Rong, Y., & Zhang, R. (2021). 3D trajectory optimization for energy-efficient UAV communication: A control design perspective. IEEE Transactions on Wireless Communications, 21(6), 4579–4593.CrossRef Li, B., Li, Q., Zeng, Y., Rong, Y., & Zhang, R. (2021). 3D trajectory optimization for energy-efficient UAV communication: A control design perspective. IEEE Transactions on Wireless Communications, 21(6), 4579–4593.CrossRef
3.
go back to reference Zhang, G., Wu, Q., Cui, M., & Zhang, R. (2019). Securing UAV communications via joint trajectory and power control. IEEE Transactions on Wireless Communications, 18(2), 1376–1389.CrossRef Zhang, G., Wu, Q., Cui, M., & Zhang, R. (2019). Securing UAV communications via joint trajectory and power control. IEEE Transactions on Wireless Communications, 18(2), 1376–1389.CrossRef
4.
go back to reference Tran, D.-H., Nguyen, V.-D., Chatzinotas, S., Vu, T. X., & Ottersten, B. (2021). UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization. IEEE Transactions on Wireless Communications, 21(3), 1621–1637.CrossRef Tran, D.-H., Nguyen, V.-D., Chatzinotas, S., Vu, T. X., & Ottersten, B. (2021). UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization. IEEE Transactions on Wireless Communications, 21(3), 1621–1637.CrossRef
5.
go back to reference Fan, X., Liu, D., Fu, B., & Wen, S. (2021). Optimal relay selection for UAV-assisted V2V communications. Wireless Networks, 27(5), 3233–3249.CrossRef Fan, X., Liu, D., Fu, B., & Wen, S. (2021). Optimal relay selection for UAV-assisted V2V communications. Wireless Networks, 27(5), 3233–3249.CrossRef
6.
go back to reference Ho-Van, K., & Do, T. (2021). Performance analysis of energy harvesting UAV selection. Wireless Communications and Mobile Computing, 2021, 1–13, 03. Ho-Van, K., & Do, T. (2021). Performance analysis of energy harvesting UAV selection. Wireless Communications and Mobile Computing, 2021, 1–13, 03.
7.
go back to reference Sharma, P. K., & Kim, D. I. (2020). Secure 3d mobile UAV relaying for hybrid satellite-terrestrial networks. IEEE Transactions on Wireless Communications, 19(4), 2770–2784.CrossRef Sharma, P. K., & Kim, D. I. (2020). Secure 3d mobile UAV relaying for hybrid satellite-terrestrial networks. IEEE Transactions on Wireless Communications, 19(4), 2770–2784.CrossRef
8.
go back to reference Du, H., Niyato, D., Xie, Y.-A., Cheng, Y., Kang, J., & Kim, D. I. (2022). Performance analysis and optimization for jammer-aided multiantenna UAV covert communication. IEEE Journal on Selected Areas in Communications, 40(10), 2962–2979.CrossRef Du, H., Niyato, D., Xie, Y.-A., Cheng, Y., Kang, J., & Kim, D. I. (2022). Performance analysis and optimization for jammer-aided multiantenna UAV covert communication. IEEE Journal on Selected Areas in Communications, 40(10), 2962–2979.CrossRef
9.
go back to reference Li, A., Wu, Q., & Zhang, R. (2019). UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wireless Communications Letters, 8(1), 181–184.CrossRef Li, A., Wu, Q., & Zhang, R. (2019). UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wireless Communications Letters, 8(1), 181–184.CrossRef
10.
go back to reference Jia, Z., Sheng, M., Li, J., Niyato, D., & Han, Z. (2021). Leo-satellite-assisted UAV: Joint trajectory and data collection for internet of remote things in 6G aerial access networks. IEEE Internet of Things Journal, 8(12), 9814–9826.CrossRef Jia, Z., Sheng, M., Li, J., Niyato, D., & Han, Z. (2021). Leo-satellite-assisted UAV: Joint trajectory and data collection for internet of remote things in 6G aerial access networks. IEEE Internet of Things Journal, 8(12), 9814–9826.CrossRef
11.
go back to reference Al-Hilo, A., Samir, M., Elhattab, M., Assi, C., & Sharafeddine, S. (2022). RIS-assisted UAV for timely data collection in IoT networks. IEEE Systems Journal. Al-Hilo, A., Samir, M., Elhattab, M., Assi, C., & Sharafeddine, S. (2022). RIS-assisted UAV for timely data collection in IoT networks. IEEE Systems Journal.
12.
go back to reference Nan, Y., Wang, L., Geraci, G., Elkashlan, M., & Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. Communications Magazine IEEE, 53(4), 20–27.CrossRef Nan, Y., Wang, L., Geraci, G., Elkashlan, M., & Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. Communications Magazine IEEE, 53(4), 20–27.CrossRef
13.
go back to reference Cao, K., Wang, B., Ding, H., Lv, L., Dong, R., Cheng, T., & Gong, F. (2021). Improving physical layer security of uplink NOMA via energy harvesting jammers. IEEE Transactions on Information Forensics and Security, 16, 786–799.CrossRef Cao, K., Wang, B., Ding, H., Lv, L., Dong, R., Cheng, T., & Gong, F. (2021). Improving physical layer security of uplink NOMA via energy harvesting jammers. IEEE Transactions on Information Forensics and Security, 16, 786–799.CrossRef
15.
go back to reference Wu, Q., Mei, W., & Zhang, R. (2019). Safeguarding wireless network with UAVs: A physical layer security perspective. IEEE Wireless Communications, 26(5), 12–18.CrossRef Wu, Q., Mei, W., & Zhang, R. (2019). Safeguarding wireless network with UAVs: A physical layer security perspective. IEEE Wireless Communications, 26(5), 12–18.CrossRef
16.
go back to reference Gao, Y., Wu, Y., Cui, Z., Chen, H., & Yang, W. (2021). Robust design for turning and climbing angle-constrained uav communication under malicious jamming. IEEE Communications Letters, 25(2), 584–588.CrossRef Gao, Y., Wu, Y., Cui, Z., Chen, H., & Yang, W. (2021). Robust design for turning and climbing angle-constrained uav communication under malicious jamming. IEEE Communications Letters, 25(2), 584–588.CrossRef
17.
go back to reference Li, Y., Wang, W., Liu, M., Zhao, N., Jiang, X., Chen, Y., & Wang, X. (2022). Joint trajectory and power optimization for jamming-aided noma-uav secure networks. IEEE Systems Journal. Li, Y., Wang, W., Liu, M., Zhao, N., Jiang, X., Chen, Y., & Wang, X. (2022). Joint trajectory and power optimization for jamming-aided noma-uav secure networks. IEEE Systems Journal.
18.
go back to reference Dong, R., Wang, B., Cao, K., & Cheng, T. (2021). Securing transmission for UAV swarm-enabled communication network. IEEE Systems Journal, 1–12. Dong, R., Wang, B., Cao, K., & Cheng, T. (2021). Securing transmission for UAV swarm-enabled communication network. IEEE Systems Journal, 1–12.
19.
go back to reference Bi, S., Ho, C. K., & Zhang, R. (2015). Wireless powered communication: Opportunities and challenges. IEEE Communications Magazine, 53(4), 117–125.CrossRef Bi, S., Ho, C. K., & Zhang, R. (2015). Wireless powered communication: Opportunities and challenges. IEEE Communications Magazine, 53(4), 117–125.CrossRef
20.
go back to reference Tran, H. Q. (2022). Two energy harvesting protocols for swipt at UAVs in cooperative relaying networks of iot systems. Wireless Personal Communications, 1–22. Tran, H. Q. (2022). Two energy harvesting protocols for swipt at UAVs in cooperative relaying networks of iot systems. Wireless Personal Communications, 1–22.
21.
go back to reference Peng, H., Wang, L.-C., Li, G. Y., & Tsai, A.-H. (2022). Long-lasting UAV-aided RIS communications based on SWIPT. In IEEE wireless communications and networking conference (WCNC) (pp. 1844–1849). IEEE. Peng, H., Wang, L.-C., Li, G. Y., & Tsai, A.-H. (2022). Long-lasting UAV-aided RIS communications based on SWIPT. In IEEE wireless communications and networking conference (WCNC) (pp. 1844–1849). IEEE.
22.
go back to reference Özyurt, S., Coşkun, A., Büyükçorak, S., Kurt, G. K., & Kucur, O. (2022). A survey on multiuser SWIPT communications for 5G+. IEEE Access, 10, 109814–109849.CrossRef Özyurt, S., Coşkun, A., Büyükçorak, S., Kurt, G. K., & Kucur, O. (2022). A survey on multiuser SWIPT communications for 5G+. IEEE Access, 10, 109814–109849.CrossRef
23.
go back to reference Wang, W., Li, X., Zhang, M., Cumanan, K., Ng, D. W. K., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.CrossRef Wang, W., Li, X., Zhang, M., Cumanan, K., Ng, D. W. K., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.CrossRef
24.
go back to reference Wang, J., Zhang, J., Han, M., & Pan, G. (2022). Secrecy outage analysis for UAV assisted satellite-terrestrial swipt systems with NOMA. Digital Signal Processing, 123, 103453.CrossRef Wang, J., Zhang, J., Han, M., & Pan, G. (2022). Secrecy outage analysis for UAV assisted satellite-terrestrial swipt systems with NOMA. Digital Signal Processing, 123, 103453.CrossRef
25.
go back to reference Duo, B., Luo, J., Li, Y., Hu, H., & Wang, Z. (2021). Joint trajectory and power optimization for securing UAV communications against active eavesdropping. China Communications, 18(1), 88–99.CrossRef Duo, B., Luo, J., Li, Y., Hu, H., & Wang, Z. (2021). Joint trajectory and power optimization for securing UAV communications against active eavesdropping. China Communications, 18(1), 88–99.CrossRef
26.
go back to reference Yin, S., Zhao, Y., Li, L., & Yu, F. R. (2019). UAV-assisted cooperative communications with power-splitting information and power transfer. IEEE Transactions on Green Communications and Networking, 3(4), 1044–1057.CrossRef Yin, S., Zhao, Y., Li, L., & Yu, F. R. (2019). UAV-assisted cooperative communications with power-splitting information and power transfer. IEEE Transactions on Green Communications and Networking, 3(4), 1044–1057.CrossRef
27.
go back to reference Wang, W., Li, X., Zhang, M., Cumanan, K., Kwan Ng, D. W., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.CrossRef Wang, W., Li, X., Zhang, M., Cumanan, K., Kwan Ng, D. W., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.CrossRef
28.
go back to reference Yin, S., Zhao, Y., & Li, L. (2018). UAV-assisted cooperative communications with time-sharing swipt. In IEEE international conference on communications (ICC),2018 (pp. 1–6). Yin, S., Zhao, Y., & Li, L. (2018). UAV-assisted cooperative communications with time-sharing swipt. In IEEE international conference on communications (ICC),2018 (pp. 1–6).
29.
go back to reference Wu, Q., Zeng, Y., & Zhang, R. (2018). Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Transactions on Wireless Communications, 17(3), 2109–2121.CrossRef Wu, Q., Zeng, Y., & Zhang, R. (2018). Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Transactions on Wireless Communications, 17(3), 2109–2121.CrossRef
30.
go back to reference Lin, X., Yajnanarayana, V., Muruganathan, S. D., Gao, S., Asplund, H., Maattanen, H.-L., Bergstrom, M., Euler, S., & Wang, Y.-P.E. (2018). The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Communications Magazine, 56(4), 204–210.CrossRef Lin, X., Yajnanarayana, V., Muruganathan, S. D., Gao, S., Asplund, H., Maattanen, H.-L., Bergstrom, M., Euler, S., & Wang, Y.-P.E. (2018). The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Communications Magazine, 56(4), 204–210.CrossRef
31.
go back to reference Liu, C., Lee, J., & Quek, T. Q. S. (2019). Safeguarding UAV communications against full-duplex active eavesdropper. IEEE Transactions on Wireless Communications, 18(6), 2919–2931.CrossRef Liu, C., Lee, J., & Quek, T. Q. S. (2019). Safeguarding UAV communications against full-duplex active eavesdropper. IEEE Transactions on Wireless Communications, 18(6), 2919–2931.CrossRef
32.
go back to reference Kang, H., Chang, X., Mišić, J., Mišić, V. B., Fan, J., & Bai, J. (2022). Improving dual-uav aided ground-uav Bi-directional communication security: Joint uav trajectory and transmit power optimization. IEEE Transactions on Vehicular Technology, 71(10), 10570–10583.CrossRef Kang, H., Chang, X., Mišić, J., Mišić, V. B., Fan, J., & Bai, J. (2022). Improving dual-uav aided ground-uav Bi-directional communication security: Joint uav trajectory and transmit power optimization. IEEE Transactions on Vehicular Technology, 71(10), 10570–10583.CrossRef
34.
go back to reference Wang, K.-Y., So, A.M.-C., Chang, T.-H., Ma, W.-K., & Chi, C.-Y. (2014). Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization. IEEE Transactions on Signal Processing, 62(21), 5690–5705.MathSciNetCrossRefMATH Wang, K.-Y., So, A.M.-C., Chang, T.-H., Ma, W.-K., & Chi, C.-Y. (2014). Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization. IEEE Transactions on Signal Processing, 62(21), 5690–5705.MathSciNetCrossRefMATH
35.
go back to reference Fang, S., Chen, G., & Li, Y. (2021). Joint optimization for secure intelligent reflecting surface assisted UAV networks. IEEE Wireless Communications Letters, 10(2), 276–280.CrossRef Fang, S., Chen, G., & Li, Y. (2021). Joint optimization for secure intelligent reflecting surface assisted UAV networks. IEEE Wireless Communications Letters, 10(2), 276–280.CrossRef
Metadata
Title
Secure SWIPT-powered UAV communication against full-duplex active eavesdropper
Authors
Danyu Diao
Buhong Wang
Kunrui Cao
Publication date
11-04-2023
Publisher
Springer US
Published in
Wireless Networks / Issue 6/2023
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-023-03318-4

Other articles of this Issue 6/2023

Wireless Networks 6/2023 Go to the issue