Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System
Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles. In this paper, we study secure transmission in a four-node (source, destination, mobile relay, and eavesdropper) system, wherein we focus on maximizing t...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8501974/ |
_version_ | 1818641547152850944 |
---|---|
author | Qian Wang Zhi Chen Hang Li Shaoqian Li |
author_facet | Qian Wang Zhi Chen Hang Li Shaoqian Li |
author_sort | Qian Wang |
collection | DOAJ |
description | Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles. In this paper, we study secure transmission in a four-node (source, destination, mobile relay, and eavesdropper) system, wherein we focus on maximizing the secrecy rate via jointly optimizing the relay trajectory and the source/relay transmit power. Nevertheless, due to the coupling of the trajectory designing and the power allocating, the secrecy rate maximization problem is intractable to solve. Accordingly, we propose an alternating optimization approach, wherein the trajectory designing and the power allocating are tackled in an alternating manner. Unfortunately, the trajectory designing is a nonconvex problem, and thus, it is still hard to solve. To circumvent the nonconvexity, we exploit sequential convex programming to derive an iterative algorithm, which is proven to converge to a Karush-Kuhn-Tucker point of the trajectory design problem. The simulation results demonstrate the efficacy of the joint power and trajectory design in improving the secrecy throughput. |
first_indexed | 2024-12-16T23:28:54Z |
format | Article |
id | doaj.art-0f7a91833fe24eb3845c27acc1d7f234 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T23:28:54Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-0f7a91833fe24eb3845c27acc1d7f2342022-12-21T22:11:55ZengIEEEIEEE Access2169-35362018-01-016628496285510.1109/ACCESS.2018.28772108501974Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying SystemQian Wang0https://orcid.org/0000-0002-8196-8026Zhi Chen1https://orcid.org/0000-0003-2943-9861Hang Li2Shaoqian Li3National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, ChinaNational Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, ChinaNational Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, ChinaNational Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, ChinaMobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles. In this paper, we study secure transmission in a four-node (source, destination, mobile relay, and eavesdropper) system, wherein we focus on maximizing the secrecy rate via jointly optimizing the relay trajectory and the source/relay transmit power. Nevertheless, due to the coupling of the trajectory designing and the power allocating, the secrecy rate maximization problem is intractable to solve. Accordingly, we propose an alternating optimization approach, wherein the trajectory designing and the power allocating are tackled in an alternating manner. Unfortunately, the trajectory designing is a nonconvex problem, and thus, it is still hard to solve. To circumvent the nonconvexity, we exploit sequential convex programming to derive an iterative algorithm, which is proven to converge to a Karush-Kuhn-Tucker point of the trajectory design problem. The simulation results demonstrate the efficacy of the joint power and trajectory design in improving the secrecy throughput.https://ieeexplore.ieee.org/document/8501974/UAVmobile relayphysical-layer securityjoint power and trajectory design |
spellingShingle | Qian Wang Zhi Chen Hang Li Shaoqian Li Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System IEEE Access UAV mobile relay physical-layer security joint power and trajectory design |
title | Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System |
title_full | Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System |
title_fullStr | Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System |
title_full_unstemmed | Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System |
title_short | Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System |
title_sort | joint power and trajectory design for physical layer secrecy in the uav aided mobile relaying system |
topic | UAV mobile relay physical-layer security joint power and trajectory design |
url | https://ieeexplore.ieee.org/document/8501974/ |
work_keys_str_mv | AT qianwang jointpowerandtrajectorydesignforphysicallayersecrecyintheuavaidedmobilerelayingsystem AT zhichen jointpowerandtrajectorydesignforphysicallayersecrecyintheuavaidedmobilerelayingsystem AT hangli jointpowerandtrajectorydesignforphysicallayersecrecyintheuavaidedmobilerelayingsystem AT shaoqianli jointpowerandtrajectorydesignforphysicallayersecrecyintheuavaidedmobilerelayingsystem |