Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping

This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external...

Full description

Saved in:
Bibliographic Details
Published inIEEE communications letters Vol. 25; no. 3; pp. 749 - 753
Main Authors Gao, Ying, Tang, Hongying, Li, Baoqing, Yuan, Xiaobing
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1089-7798
1558-2558
DOI10.1109/LCOMM.2020.3036457

Cover

More Information
Summary:This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV's trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1089-7798
1558-2558
DOI:10.1109/LCOMM.2020.3036457