Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping

This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external...

Full description

Saved in:
Bibliographic Details
Published inIEEE communications letters Vol. 25; no. 3; pp. 749 - 753
Main Authors Gao, Ying, Tang, Hongying, Li, Baoqing, Yuan, Xiaobing
Format Journal Article
LanguageEnglish
Published New York IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1089-7798
1558-2558
DOI10.1109/LCOMM.2020.3036457

Cover

Abstract This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV's trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm.
AbstractList This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple ground users (GUs), while the data transmission between the UAV and each GU faces security threats from both multiple external eavesdroppers (Eves) and other GUs that potentially act as internal Eves. To ensure the user fairness, we maximize the minimum average secrecy rate among all GUs via jointly optimizing the UAV’s trajectory and transmit power as well as the user scheduling, subject to the constraint on the UAV energy budget. To this end, an iterative suboptimal algorithm is proposed by leveraging the block coordinate descent and successive convex approximation techniques. Simulation results are provided to demonstrate the efficacy of the proposed algorithm.
Author Gao, Ying
Tang, Hongying
Yuan, Xiaobing
Li, Baoqing
Author_xml – sequence: 1
  givenname: Ying
  orcidid: 0000-0003-1411-5047
  surname: Gao
  fullname: Gao, Ying
  email: gaoying@mail.sim.ac.cn
  organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China
– sequence: 2
  givenname: Hongying
  orcidid: 0000-0002-2606-9570
  surname: Tang
  fullname: Tang, Hongying
  email: tanghy@mail.sim.ac.cn
  organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China
– sequence: 3
  givenname: Baoqing
  orcidid: 0000-0002-7243-9229
  surname: Li
  fullname: Li, Baoqing
  email: sinoiot@mail.sim.ac.cn
  organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China
– sequence: 4
  givenname: Xiaobing
  orcidid: 0000-0001-7602-7136
  surname: Yuan
  fullname: Yuan, Xiaobing
  email: sinowsn@mail.sim.ac.cn
  organization: Science and Technology on Microsystem Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China
BookMark eNp9kD1PwzAQQC1UJNrCH4DFEnOKP-LEGUtUoFJRByirZZxzSdU6wU4Q_fckbcXAwOLz6e6d7t4IDVzlAKFrSiaUkuxukS-fnyeMMDLhhCexSM_QkAohI9Y9g-5PZBalaSYv0CiEDSFEMkGHSL2AaX3p1njmwK_3UV650HhdOijwavqG82q3a11pdFN2FTxdd6XQ4Puq-cBz14B3eou1K_Ds-5TM9BeEwld13Y29ROdWbwNcneIYrR5mr_lTtFg-zvPpIjIsE00Uc0i4LoqYsMRoG1swqZScZRaYkOLdFiyROhNMWKpTGXMBKQFuKTOMgaV8jG6Pc2tffbYQGrWp2n6doJgglDPKOzFjJI9dxlcheLDKlM3hsv7kraJE9TrVQafqdaqTzg5lf9Dalzvt9_9DN0eoBIBfIOs2ipOE_wAFLINq
CODEN ICLEF6
CitedBy_id crossref_primary_10_1109_TVT_2023_3347769
crossref_primary_10_1109_TMC_2024_3502685
crossref_primary_10_1016_j_jksuci_2023_101717
crossref_primary_10_1016_j_pmcj_2022_101652
crossref_primary_10_1016_j_phycom_2024_102447
crossref_primary_10_1109_TCOMM_2024_3379417
crossref_primary_10_1109_TVT_2022_3224959
Cites_doi 10.1109/LCOMM.2019.2898404
10.1017/CBO9780511804441
10.1109/TWC.2017.2789293
10.1109/LWC.2020.2966705
10.1109/TCOMM.2019.2947921
10.1109/TSP.2014.2354312
10.1109/ACCESS.2019.2908407
10.1109/TVT.2020.3001403
10.1109/TWC.2019.2902559
10.1109/TVT.2018.2853723
10.1109/TVT.2019.2924180
10.1109/ICCW.2019.8756815
10.1109/TWC.2019.2892461
10.1109/TVT.2018.2849644
10.1109/TVT.2020.2977948
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/LCOMM.2020.3036457
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore Digital Library
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore Digital Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2558
EndPage 753
ExternalDocumentID 10_1109_LCOMM_2020_3036457
9250466
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61901457
  funderid: 10.13039/501100001809
GroupedDBID -~X
0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
AZLTO
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
TN5
VH1
AAYXX
CITATION
7SP
8FD
L7M
ID FETCH-LOGICAL-c295t-43e63add4026caf4fec788329fe2585bfd268a9525f1a78435e70e3f12c22ef13
IEDL.DBID RIE
ISSN 1089-7798
IngestDate Mon Jun 30 10:23:49 EDT 2025
Thu Apr 24 23:06:44 EDT 2025
Wed Oct 01 03:18:32 EDT 2025
Wed Aug 27 02:33:27 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-43e63add4026caf4fec788329fe2585bfd268a9525f1a78435e70e3f12c22ef13
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-2606-9570
0000-0002-7243-9229
0000-0003-1411-5047
0000-0001-7602-7136
PQID 2501321330
PQPubID 85419
PageCount 5
ParticipantIDs crossref_citationtrail_10_1109_LCOMM_2020_3036457
crossref_primary_10_1109_LCOMM_2020_3036457
ieee_primary_9250466
proquest_journals_2501321330
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-03-01
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 03
  year: 2021
  text: 2021-03-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE communications letters
PublicationTitleAbbrev LCOMM
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref12
ref15
ref14
ref11
ref10
ref1
tran (ref2) 2020
ref16
ref18
ref8
ref7
ref9
bramwell (ref17) 2001
ref4
(ref13) 2019
ref3
ref6
ref5
References_xml – ident: ref6
  doi: 10.1109/LCOMM.2019.2898404
– ident: ref15
  doi: 10.1017/CBO9780511804441
– ident: ref12
  doi: 10.1109/TWC.2017.2789293
– ident: ref18
  doi: 10.1109/LWC.2020.2966705
– ident: ref7
  doi: 10.1109/TCOMM.2019.2947921
– ident: ref16
  doi: 10.1109/TSP.2014.2354312
– year: 2001
  ident: ref17
  publication-title: Bramwell's Helicopter Dynamics
– ident: ref4
  doi: 10.1109/ACCESS.2019.2908407
– year: 2019
  ident: ref13
  publication-title: Enhanced LTE Support for Aerial Vehicles
– ident: ref1
  doi: 10.1109/TVT.2020.3001403
– ident: ref14
  doi: 10.1109/TWC.2019.2902559
– ident: ref8
  doi: 10.1109/TVT.2018.2853723
– ident: ref10
  doi: 10.1109/TVT.2019.2924180
– year: 2020
  ident: ref2
  article-title: UAV relay-assisted emergency communications in IoT networks: Resource allocation and trajectory optimization
  publication-title: arXiv 2008 00218
– ident: ref9
  doi: 10.1109/ICCW.2019.8756815
– ident: ref3
  doi: 10.1109/TWC.2019.2892461
– ident: ref5
  doi: 10.1109/TVT.2018.2849644
– ident: ref11
  doi: 10.1109/TVT.2020.2977948
SSID ssj0008251
Score 2.4200044
Snippet This letter investigates an unmanned aerial vehicle (UAV) enabled network where an energy-constrained rotary-wing UAV is employed as a mobile base station to...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 749
SubjectTerms Accelerometers
Algorithms
Approximation algorithms
Autonomous aerial vehicles
Constraints
Data transmission
Eavesdropping
Energy budget
max-min secrecy rate
Optimization
physical layer security
Radio equipment
Rotors
Trajectory
trajectory optimization
UAV communications
Unmanned aerial vehicles
Title Securing Energy-Constrained UAV Communications Against Both Internal and External Eavesdropping
URI https://ieeexplore.ieee.org/document/9250466
https://www.proquest.com/docview/2501321330
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore Digital Library
  customDbUrl:
  eissn: 1558-2558
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0008251
  issn: 1089-7798
  databaseCode: RIE
  dateStart: 19970101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED0BEwx8I8qXPLBB2sRJHXssqBVCFBaKukWJc-5A1SKaMvDrOTtuxZcQWyTHkqPn2Pfse-8AzhNraaS1CBKudZAYe79rdBRQ8IEylFjGpdUO9-_FzSC5HbaHK3C51MIgoks-w6Z9dHf55VTP7VFZS1m_LSFWYTWVotZqLVddK8Gsk-kVRYxKLgQyoWrdXT_0-0QFOTFUd-2WftmEXFWVH0ux2196W9BfjKxOK3luzquiqd-_mTb-d-jbsOkDTdapZ8YOrOBkFzY-2Q_uQeYP20es6xSAga3e6WpGYMkGnSf2RT0yY50RNc0qdkXoMn-UOGb5pGRd7yXNuvkbzsrXqXV9GO3DoNd9vL4JfMGFQHPVroIkRhHTgkecUujcJAY1MeSYK4OcaEVhSi5krtq8baI8lRRpYRpibCKuOUcTxQewNplO8BBYnhP71YJzhXlSxEYKFDLCJEUKUWVaNCBaIJBp70ZuP3CcOVYSqsyhllnUMo9aAy6WfV5qL44_396zMCzf9Ag04GQBdOZ_11lGTcTKia6HR7_3OoZ1bpNZXPLZCaxVr3M8pWikKs7cNPwAy2nbLw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT9swFH4Cdhgc9gvQurHhw26QkjiOEx87VNSxhl3oxM1KnOceqNqJphz463l23GqwadotkmPJ0efY77Pf9z2AL8JZGhkjI8GNiYR197vWJBEFH1jEBTZp47TD5ZUcTcTlTXazBacbLQwi-uQz7LtHf5ffLMzKHZWdKee3JeU2vMiEEFmn1tqsu06E2aXTK4oZVbGWyMTqbHz-oyyJDHLiqP7iLX-yDfm6Kn8sxn6HuXgN5XpsXWLJbX_V1n3z8My28X8H_wZehVCTDbq58Ra2cP4O9n4zINwHHY7bp2zoNYCRq9_pq0ZgwyaDn-yJfmTJBlNqWrbsK-HLwmHijFXzhg2DmzQbVve4bO4WzvdhegCTi-H1-SgKJRciw1XWRiJFmdKSR6xSmsoKi4Y4csqVRU7EorYNl0WlMp7ZpMoLirUwjzG1CTeco03SQ9iZL-b4HlhVEf81knOFlahTW0iURYIiRwpSi7zuQbJGQJvgR-4-cKY9L4mV9qhph5oOqPXgZNPnV-fG8c-39x0MmzcDAj04WgOtww-71NREvJwIe_zh772O4eXouhzr8ber7x9hl7vUFp-KdgQ77d0KP1Fs0taf_ZR8BG6_3nw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Energy-Constrained+UAV+Communications+Against+Both+Internal+and+External+Eavesdropping&rft.jtitle=IEEE+communications+letters&rft.au=Gao%2C+Ying&rft.au=Tang%2C+Hongying&rft.au=Li%2C+Baoqing&rft.au=Yuan%2C+Xiaobing&rft.date=2021-03-01&rft.issn=1089-7798&rft.eissn=1558-2558&rft.volume=25&rft.issue=3&rft.spage=749&rft.epage=753&rft_id=info:doi/10.1109%2FLCOMM.2020.3036457&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_LCOMM_2020_3036457
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1089-7798&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1089-7798&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1089-7798&client=summon