Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping
This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external...
Saved in:
| Published in | IEEE communications letters Vol. 25; no. 3; pp. 749 - 753 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1089-7798 1558-2558 |
| DOI | 10.1109/LCOMM.2020.3036457 |
Cover
| Abstract | This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV's trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm. |
|---|---|
| AbstractList | This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV’s trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm. |
| Author | Gao, Ying Tang, Hongying Yuan, Xiaobing Li, Baoqing |
| Author_xml | – sequence: 1 givenname: Ying orcidid: 0000-0003-1411-5047 surname: Gao fullname: Gao, Ying email: gaoying@mail.sim.ac.cn organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China – sequence: 2 givenname: Hongying orcidid: 0000-0002-2606-9570 surname: Tang fullname: Tang, Hongying email: tanghy@mail.sim.ac.cn organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China – sequence: 3 givenname: Baoqing orcidid: 0000-0002-7243-9229 surname: Li fullname: Li, Baoqing email: sinoiot@mail.sim.ac.cn organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China – sequence: 4 givenname: Xiaobing orcidid: 0000-0001-7602-7136 surname: Yuan fullname: Yuan, Xiaobing email: sinowsn@mail.sim.ac.cn organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China |
| BookMark | eNp9kD1PwzAQQC1UJNrCH4DFEnOKP-LEGUtUoFJRByirZZxzSdU6wU4Q_fckbcXAwOLz6e6d7t4IDVzlAKFrSiaUkuxukS-fnyeMMDLhhCexSM_QkAohI9Y9g-5PZBalaSYv0CiEDSFEMkGHSL2AaX3p1njmwK_3UV650HhdOijwavqG82q3a11pdFN2FTxdd6XQ4Puq-cBz14B3eou1K_Ds-5TM9BeEwld13Y29ROdWbwNcneIYrR5mr_lTtFg-zvPpIjIsE00Uc0i4LoqYsMRoG1swqZScZRaYkOLdFiyROhNMWKpTGXMBKQFuKTOMgaV8jG6Pc2tffbYQGrWp2n6doJgglDPKOzFjJI9dxlcheLDKlM3hsv7kraJE9TrVQafqdaqTzg5lf9Dalzvt9_9DN0eoBIBfIOs2ipOE_wAFLINq |
| CODEN | ICLEF6 |
| CitedBy_id | crossref_primary_10_1109_TVT_2023_3347769 crossref_primary_10_1109_TMC_2024_3502685 crossref_primary_10_1016_j_jksuci_2023_101717 crossref_primary_10_1016_j_pmcj_2022_101652 crossref_primary_10_1016_j_phycom_2024_102447 crossref_primary_10_1109_TCOMM_2024_3379417 crossref_primary_10_1109_TVT_2022_3224959 |
| Cites_doi | 10.1109/LCOMM.2019.2898404 10.1017/CBO9780511804441 10.1109/TWC.2017.2789293 10.1109/LWC.2020.2966705 10.1109/TCOMM.2019.2947921 10.1109/TSP.2014.2354312 10.1109/ACCESS.2019.2908407 10.1109/TVT.2020.3001403 10.1109/TWC.2019.2902559 10.1109/TVT.2018.2853723 10.1109/TVT.2019.2924180 10.1109/ICCW.2019.8756815 10.1109/TWC.2019.2892461 10.1109/TVT.2018.2849644 10.1109/TVT.2020.2977948 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
| DOI | 10.1109/LCOMM.2020.3036457 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Xplore Digital Library CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore Digital Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2558 |
| EndPage | 753 |
| ExternalDocumentID | 10_1109_LCOMM_2020_3036457 9250466 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61901457 funderid: 10.13039/501100001809 |
| GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IES IFIPE IFJZH IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS TN5 VH1 AAYXX CITATION 7SP 8FD L7M |
| ID | FETCH-LOGICAL-c295t-43e63add4026caf4fec788329fe2585bfd268a9525f1a78435e70e3f12c22ef13 |
| IEDL.DBID | RIE |
| ISSN | 1089-7798 |
| IngestDate | Mon Jun 30 10:23:49 EDT 2025 Thu Apr 24 23:06:44 EDT 2025 Wed Oct 01 03:18:32 EDT 2025 Wed Aug 27 02:33:27 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c295t-43e63add4026caf4fec788329fe2585bfd268a9525f1a78435e70e3f12c22ef13 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-2606-9570 0000-0002-7243-9229 0000-0003-1411-5047 0000-0001-7602-7136 |
| PQID | 2501321330 |
| PQPubID | 85419 |
| PageCount | 5 |
| ParticipantIDs | crossref_citationtrail_10_1109_LCOMM_2020_3036457 crossref_primary_10_1109_LCOMM_2020_3036457 ieee_primary_9250466 proquest_journals_2501321330 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2021-03-01 |
| PublicationDateYYYYMMDD | 2021-03-01 |
| PublicationDate_xml | – month: 03 year: 2021 text: 2021-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE communications letters |
| PublicationTitleAbbrev | LCOMM |
| PublicationYear | 2021 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref12 ref15 ref14 ref11 ref10 ref1 tran (ref2) 2020 ref16 ref18 ref8 ref7 ref9 bramwell (ref17) 2001 ref4 (ref13) 2019 ref3 ref6 ref5 |
| References_xml | – ident: ref6 doi: 10.1109/LCOMM.2019.2898404 – ident: ref15 doi: 10.1017/CBO9780511804441 – ident: ref12 doi: 10.1109/TWC.2017.2789293 – ident: ref18 doi: 10.1109/LWC.2020.2966705 – ident: ref7 doi: 10.1109/TCOMM.2019.2947921 – ident: ref16 doi: 10.1109/TSP.2014.2354312 – year: 2001 ident: ref17 publication-title: Bramwell's Helicopter Dynamics – ident: ref4 doi: 10.1109/ACCESS.2019.2908407 – year: 2019 ident: ref13 publication-title: Enhanced LTE Support for Aerial Vehicles – ident: ref1 doi: 10.1109/TVT.2020.3001403 – ident: ref14 doi: 10.1109/TWC.2019.2902559 – ident: ref8 doi: 10.1109/TVT.2018.2853723 – ident: ref10 doi: 10.1109/TVT.2019.2924180 – year: 2020 ident: ref2 article-title: UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization publication-title: arXiv 2008 00218 – ident: ref9 doi: 10.1109/ICCW.2019.8756815 – ident: ref3 doi: 10.1109/TWC.2019.2892461 – ident: ref5 doi: 10.1109/TVT.2018.2849644 – ident: ref11 doi: 10.1109/TVT.2020.2977948 |
| SSID | ssj0008251 |
| Score | 2.4200044 |
| Snippet | This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 749 |
| SubjectTerms | Accelerometers Algorithms Approximation algorithms Autonomous aerial vehicles Constraints Data transmission Eavesdropping Energy budget max-min secrecy rate Optimization physical layer security Radio equipment Rotors Trajectory trajectory optimization UAV communications Unmanned aerial vehicles |
| Title | Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping |
| URI | https://ieeexplore.ieee.org/document/9250466 https://www.proquest.com/docview/2501321330 |
| Volume | 25 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Xplore Digital Library customDbUrl: eissn: 1558-2558 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0008251 issn: 1089-7798 databaseCode: RIE dateStart: 19970101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0BEwx8I8qXPLBB2sRJHXssqBVCFBaKukWJc-5A1SKaMvDrOTtuxZcQWyTHkqPn2Pfse-8AzhNraaS1CBKudZAYe79rdBRQ8IEylFjGpdUO9-_FzSC5HbaHK3C51MIgoks-w6Z9dHf55VTP7VFZS1m_LSFWYTWVotZqLVddK8Gsk-kVRYxKLgQyoWrdXT_0-0QFOTFUd-2WftmEXFWVH0ux2196W9BfjKxOK3luzquiqd-_mTb-d-jbsOkDTdapZ8YOrOBkFzY-2Q_uQeYP20es6xSAga3e6WpGYMkGnSf2RT0yY50RNc0qdkXoMn-UOGb5pGRd7yXNuvkbzsrXqXV9GO3DoNd9vL4JfMGFQHPVroIkRhHTgkecUujcJAY1MeSYK4OcaEVhSi5krtq8baI8lRRpYRpibCKuOUcTxQewNplO8BBYnhP71YJzhXlSxEYKFDLCJEUKUWVaNCBaIJBp70ZuP3CcOVYSqsyhllnUMo9aAy6WfV5qL44_396zMCzf9Ag04GQBdOZ_11lGTcTKia6HR7_3OoZ1bpNZXPLZCaxVr3M8pWikKs7cNPwAy2nbLw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT9swFH4Cdhgc9gvQurHhw26QkjiOEx87VNSxhl3oxM1KnOceqNqJphz463l23GqwadotkmPJ0efY77Pf9z2AL8JZGhkjI8GNiYR197vWJBEFH1jEBTZp47TD5ZUcTcTlTXazBacbLQwi-uQz7LtHf5ffLMzKHZWdKee3JeU2vMiEEFmn1tqsu06E2aXTK4oZVbGWyMTqbHz-oyyJDHLiqP7iLX-yDfm6Kn8sxn6HuXgN5XpsXWLJbX_V1n3z8My28X8H_wZehVCTDbq58Ra2cP4O9n4zINwHHY7bp2zoNYCRq9_pq0ZgwyaDn-yJfmTJBlNqWrbsK-HLwmHijFXzhg2DmzQbVve4bO4WzvdhegCTi-H1-SgKJRciw1XWRiJFmdKSR6xSmsoKi4Y4csqVRU7EorYNl0WlMp7ZpMoLirUwjzG1CTeco03SQ9iZL-b4HlhVEf81knOFlahTW0iURYIiRwpSi7zuQbJGQJvgR-4-cKY9L4mV9qhph5oOqPXgZNPnV-fG8c-39x0MmzcDAj04WgOtww-71NREvJwIe_zh772O4eXouhzr8ber7x9hl7vUFp-KdgQ77d0KP1Fs0taf_ZR8BG6_3nw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Energy-Constrained+UAV+Communications+Against+Both+Internal+and+External+Eavesdropping&rft.jtitle=IEEE+communications+letters&rft.au=Gao%2C+Ying&rft.au=Tang%2C+Hongying&rft.au=Li%2C+Baoqing&rft.au=Yuan%2C+Xiaobing&rft.date=2021-03-01&rft.issn=1089-7798&rft.eissn=1558-2558&rft.volume=25&rft.issue=3&rft.spage=749&rft.epage=753&rft_id=info:doi/10.1109%2FLCOMM.2020.3036457&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_LCOMM_2020_3036457 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7798&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7798&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7798&client=summon |