Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping
This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external...
Saved in:
| Published in | IEEE communications letters Vol. 25; no. 3; pp. 749 - 753 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1089-7798 1558-2558 |
| DOI | 10.1109/LCOMM.2020.3036457 |
Cover
| Summary: | This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV's trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1089-7798 1558-2558 |
| DOI: | 10.1109/LCOMM.2020.3036457 |