Abstract
To further address the energy constraint problem and improve the secrecy performance of unmanned aerial vehicle (UAV) systems in the fifth generation (5G)-enabled Internet of Things, we consider a secure UAV system with simultaneous wireless information and power transfer in the presence of a full-duplex active eavesdropper, which eavesdrops on confidential information and transmits malicious jamming signals simultaneously. In particular, the UAV is powered by a constrained onboard battery that can harvest energy from the ambient radio frequency signals. The trajectory of the UAV, power splitting ratio, and transmitting power are jointly optimized to maximize the secrecy rate of the system. Owing to the non-convexity of the problem, we propose an alternative optimization algorithm by applying successive convex approximation and block coordinate descent methods. The simulation results show the proposed joint optimization algorithm can promote the average secrecy rate of the system as compared with other benchmark schemes.
Similar content being viewed by others
Notes
The contribution of our paper may be extended to multi-antenna cases, details will be taken as future work.
Experiments in [30] show that the LoS channel model can describe the ground-air channel well.
References
Shahzadi, R., Ali, M., Khan, H. Z., & Naeem, M. (2021). UAV assisted 5G and beyond wireless networks: A survey. Journal of Network and Computer Applications, 189, 103114.
Li, B., Li, Q., Zeng, Y., Rong, Y., & Zhang, R. (2021). 3D trajectory optimization for energy-efficient UAV communication: A control design perspective. IEEE Transactions on Wireless Communications, 21(6), 4579–4593.
Zhang, G., Wu, Q., Cui, M., & Zhang, R. (2019). Securing UAV communications via joint trajectory and power control. IEEE Transactions on Wireless Communications, 18(2), 1376–1389.
Tran, D.-H., Nguyen, V.-D., Chatzinotas, S., Vu, T. X., & Ottersten, B. (2021). UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization. IEEE Transactions on Wireless Communications, 21(3), 1621–1637.
Fan, X., Liu, D., Fu, B., & Wen, S. (2021). Optimal relay selection for UAV-assisted V2V communications. Wireless Networks, 27(5), 3233–3249.
Ho-Van, K., & Do, T. (2021). Performance analysis of energy harvesting UAV selection. Wireless Communications and Mobile Computing, 2021, 1–13, 03.
Sharma, P. K., & Kim, D. I. (2020). Secure 3d mobile UAV relaying for hybrid satellite-terrestrial networks. IEEE Transactions on Wireless Communications, 19(4), 2770–2784.
Du, H., Niyato, D., Xie, Y.-A., Cheng, Y., Kang, J., & Kim, D. I. (2022). Performance analysis and optimization for jammer-aided multiantenna UAV covert communication. IEEE Journal on Selected Areas in Communications, 40(10), 2962–2979.
Li, A., Wu, Q., & Zhang, R. (2019). UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wireless Communications Letters, 8(1), 181–184.
Jia, Z., Sheng, M., Li, J., Niyato, D., & Han, Z. (2021). Leo-satellite-assisted UAV: Joint trajectory and data collection for internet of remote things in 6G aerial access networks. IEEE Internet of Things Journal, 8(12), 9814–9826.
Al-Hilo, A., Samir, M., Elhattab, M., Assi, C., & Sharafeddine, S. (2022). RIS-assisted UAV for timely data collection in IoT networks. IEEE Systems Journal.
Nan, Y., Wang, L., Geraci, G., Elkashlan, M., & Renzo, M. (2015). Safeguarding 5G wireless communication networks using physical layer security. Communications Magazine IEEE, 53(4), 20–27.
Cao, K., Wang, B., Ding, H., Lv, L., Dong, R., Cheng, T., & Gong, F. (2021). Improving physical layer security of uplink NOMA via energy harvesting jammers. IEEE Transactions on Information Forensics and Security, 16, 786–799.
Wyner, A. D. (1975). The wire-tap channel. The Bell System Technical Journal, 54(8), 1355–1387.
Wu, Q., Mei, W., & Zhang, R. (2019). Safeguarding wireless network with UAVs: A physical layer security perspective. IEEE Wireless Communications, 26(5), 12–18.
Gao, Y., Wu, Y., Cui, Z., Chen, H., & Yang, W. (2021). Robust design for turning and climbing angle-constrained uav communication under malicious jamming. IEEE Communications Letters, 25(2), 584–588.
Li, Y., Wang, W., Liu, M., Zhao, N., Jiang, X., Chen, Y., & Wang, X. (2022). Joint trajectory and power optimization for jamming-aided noma-uav secure networks. IEEE Systems Journal.
Dong, R., Wang, B., Cao, K., & Cheng, T. (2021). Securing transmission for UAV swarm-enabled communication network. IEEE Systems Journal, 1–12.
Bi, S., Ho, C. K., & Zhang, R. (2015). Wireless powered communication: Opportunities and challenges. IEEE Communications Magazine, 53(4), 117–125.
Tran, H. Q. (2022). Two energy harvesting protocols for swipt at UAVs in cooperative relaying networks of iot systems. Wireless Personal Communications, 1–22.
Peng, H., Wang, L.-C., Li, G. Y., & Tsai, A.-H. (2022). Long-lasting UAV-aided RIS communications based on SWIPT. In IEEE wireless communications and networking conference (WCNC) (pp. 1844–1849). IEEE.
Özyurt, S., Coşkun, A., Büyükçorak, S., Kurt, G. K., & Kucur, O. (2022). A survey on multiuser SWIPT communications for 5G+. IEEE Access, 10, 109814–109849.
Wang, W., Li, X., Zhang, M., Cumanan, K., Ng, D. W. K., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.
Wang, J., Zhang, J., Han, M., & Pan, G. (2022). Secrecy outage analysis for UAV assisted satellite-terrestrial swipt systems with NOMA. Digital Signal Processing, 123, 103453.
Duo, B., Luo, J., Li, Y., Hu, H., & Wang, Z. (2021). Joint trajectory and power optimization for securing UAV communications against active eavesdropping. China Communications, 18(1), 88–99.
Yin, S., Zhao, Y., Li, L., & Yu, F. R. (2019). UAV-assisted cooperative communications with power-splitting information and power transfer. IEEE Transactions on Green Communications and Networking, 3(4), 1044–1057.
Wang, W., Li, X., Zhang, M., Cumanan, K., Kwan Ng, D. W., Zhang, G., Tang, J., & Dobre, O. A. (2020). Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming. IEEE Transactions on Communications, 68(7), 4476–4489.
Yin, S., Zhao, Y., & Li, L. (2018). UAV-assisted cooperative communications with time-sharing swipt. In IEEE international conference on communications (ICC),2018 (pp. 1–6).
Wu, Q., Zeng, Y., & Zhang, R. (2018). Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Transactions on Wireless Communications, 17(3), 2109–2121.
Lin, X., Yajnanarayana, V., Muruganathan, S. D., Gao, S., Asplund, H., Maattanen, H.-L., Bergstrom, M., Euler, S., & Wang, Y.-P.E. (2018). The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Communications Magazine, 56(4), 204–210.
Liu, C., Lee, J., & Quek, T. Q. S. (2019). Safeguarding UAV communications against full-duplex active eavesdropper. IEEE Transactions on Wireless Communications, 18(6), 2919–2931.
Kang, H., Chang, X., Mišić, J., Mišić, V. B., Fan, J., & Bai, J. (2022). Improving dual-uav aided ground-uav Bi-directional communication security: Joint uav trajectory and transmit power optimization. IEEE Transactions on Vehicular Technology, 71(10), 10570–10583.
Grant, M., & Boyd, S. (2014). CVX: Matlab software for disciplined convex programming. version 2.1. http://cvxr.com/cvx, Mar.
Wang, K.-Y., So, A.M.-C., Chang, T.-H., Ma, W.-K., & Chi, C.-Y. (2014). Outage constrained robust transmit optimization for multiuser MISO downlinks: Tractable approximations by conic optimization. IEEE Transactions on Signal Processing, 62(21), 5690–5705.
Fang, S., Chen, G., & Li, Y. (2021). Joint optimization for secure intelligent reflecting surface assisted UAV networks. IEEE Wireless Communications Letters, 10(2), 276–280.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This work was supported in part by the National Natural Science Foundation of China under Grant 62101560, 61671465 and 61902426, in part by the Natural Science Basic Research Program of Shaanxi under Grant 2022JQ-619, in part by the open research fund of the State Key Laboratory of ISN under Grant ISN23-04, in part by China Postdoctoral Science Foundation under Grant 2021M692502, and in part by the National University of Defense Technology Research Fund under Grant ZK21-44.
Appendix 1: Proof of the Theorem 1
Appendix 1: Proof of the Theorem 1
It is obvious to find that if \(a_n \le b\), the information sent to U is eavesdropped by E. In this case, optimal transmitting power \(P_s[n]=0\). For the case of \(a_n > b\), we can see that the objective function (9a) is concave with respect to \(P_s\). The Lagrangian of Problem (9) can be given as follows
where \(\lambda _1, \lambda _2 \ge 0\). Thus, the Lagrangian dual function of Problem (9) be reexpressed as
It can be concluded that solving Problem (9) is equivalent to its dual problem, which is expressed as
Note that the dual problem can be divided into N subproblems, as follows
where
As such, the derivation of the Lagrangian of Problem (9) can be obtained as
By setting the derivative to 0, we can obtain the optimal transmitted power \(\hat{P}_s[n]\). The proof is completed.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Diao, D., Wang, B. & Cao, K. Secure SWIPT-powered UAV communication against full-duplex active eavesdropper. Wireless Netw 29, 2495–2504 (2023). https://doi.org/10.1007/s11276-023-03318-4
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-023-03318-4