UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization
Abstract With the inherent advantages of exceptional maneuverability, flexible deployment options and cost-effectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in high-traffic or remote areas....
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2023-09-01
|
Series: | EURASIP Journal on Advances in Signal Processing |
Subjects: | |
Online Access: | https://doi.org/10.1186/s13634-023-01056-5 |
_version_ | 1797555749335859200 |
---|---|
author | Ruibo Han Yongjian Wang Yang Zhang |
author_facet | Ruibo Han Yongjian Wang Yang Zhang |
author_sort | Ruibo Han |
collection | DOAJ |
description | Abstract With the inherent advantages of exceptional maneuverability, flexible deployment options and cost-effectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in high-traffic or remote areas. Nevertheless, the openness of the air–ground channel poses significant security challenges to UAV-based wireless systems. In this paper, a UAV-assisted secure communication system model is established based on non-orthogonal multiple access (NOMA) from the perspective of physical layer security, aiming to conceal the transmission behavior between UAVs and legitimate users (LUs). Specifically, a mobile UAV assumes the role of an aerial base station, leveraging NOMA technique to transmit data to LUs while evading detection from mobile eavesdropper situated on the ground. To fortify the security performance of the system, a hovering UAV acts as a friendly jammer and transmits interference signals to mobile eavesdropper (referred to as Eve). The objective of this scheme is to maximize the minimum average secure rate of all LUs by meticulously optimizing the trajectory and power allocation of the mobile UAV, subject to secrecy performance constraints. The highly interdependent and non-convex nature of this optimization problem renders direct solutions infeasible. Hence, this paper designs an efficient iterative algorithm that decouples the original problem into two subproblems, enabling an alternating optimization process for the trajectory and power allocation of the mobile UAV until the convergence of the objective function is achieved. Simulation results demonstrate that the proposed algorithm effectively improves the minimum average secure rate of all LUs compared with the benchmark scheme. |
first_indexed | 2024-03-10T16:52:01Z |
format | Article |
id | doaj.art-896f3ff9cd4340569efd344acc7b8692 |
institution | Directory Open Access Journal |
issn | 1687-6180 |
language | English |
last_indexed | 2024-03-10T16:52:01Z |
publishDate | 2023-09-01 |
publisher | SpringerOpen |
record_format | Article |
series | EURASIP Journal on Advances in Signal Processing |
spelling | doaj.art-896f3ff9cd4340569efd344acc7b86922023-11-20T11:16:45ZengSpringerOpenEURASIP Journal on Advances in Signal Processing1687-61802023-09-012023111910.1186/s13634-023-01056-5UAV-assisted NOMA secure communications: joint transmit power and trajectory optimizationRuibo Han0Yongjian Wang1Yang Zhang2Yantai Research Institute of Harbin Engineering UniversityNational Computer Network Emergency Response Technical Team/Coordination Center of ChinaNational Computer Network Emergency Response Technical Team/Coordination Center of ChinaAbstract With the inherent advantages of exceptional maneuverability, flexible deployment options and cost-effectiveness, unmanned aerial vehicles (UAVs) present themselves as a viable solution for providing aerial communication services to Internet of Things devices in high-traffic or remote areas. Nevertheless, the openness of the air–ground channel poses significant security challenges to UAV-based wireless systems. In this paper, a UAV-assisted secure communication system model is established based on non-orthogonal multiple access (NOMA) from the perspective of physical layer security, aiming to conceal the transmission behavior between UAVs and legitimate users (LUs). Specifically, a mobile UAV assumes the role of an aerial base station, leveraging NOMA technique to transmit data to LUs while evading detection from mobile eavesdropper situated on the ground. To fortify the security performance of the system, a hovering UAV acts as a friendly jammer and transmits interference signals to mobile eavesdropper (referred to as Eve). The objective of this scheme is to maximize the minimum average secure rate of all LUs by meticulously optimizing the trajectory and power allocation of the mobile UAV, subject to secrecy performance constraints. The highly interdependent and non-convex nature of this optimization problem renders direct solutions infeasible. Hence, this paper designs an efficient iterative algorithm that decouples the original problem into two subproblems, enabling an alternating optimization process for the trajectory and power allocation of the mobile UAV until the convergence of the objective function is achieved. Simulation results demonstrate that the proposed algorithm effectively improves the minimum average secure rate of all LUs compared with the benchmark scheme.https://doi.org/10.1186/s13634-023-01056-5Unmanned aerial vehiclesNon-orthogonal multiple accessPhysical layer securityPower allocation |
spellingShingle | Ruibo Han Yongjian Wang Yang Zhang UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization EURASIP Journal on Advances in Signal Processing Unmanned aerial vehicles Non-orthogonal multiple access Physical layer security Power allocation |
title | UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization |
title_full | UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization |
title_fullStr | UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization |
title_full_unstemmed | UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization |
title_short | UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization |
title_sort | uav assisted noma secure communications joint transmit power and trajectory optimization |
topic | Unmanned aerial vehicles Non-orthogonal multiple access Physical layer security Power allocation |
url | https://doi.org/10.1186/s13634-023-01056-5 |
work_keys_str_mv | AT ruibohan uavassistednomasecurecommunicationsjointtransmitpowerandtrajectoryoptimization AT yongjianwang uavassistednomasecurecommunicationsjointtransmitpowerandtrajectoryoptimization AT yangzhang uavassistednomasecurecommunicationsjointtransmitpowerandtrajectoryoptimization |