Securing Transmission for UAV Swarm-Enabled Communication Network

Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communi...

Full description

Saved in:
Bibliographic Details
Published inIEEE systems journal Vol. 16; no. 4; pp. 5200 - 5211
Main Authors Dong, Runze, Wang, Buhong, Cao, Kunrui, Cheng, Tianhao
Format Journal Article
LanguageEnglish
Published New York IEEE 01.12.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN1932-8184
1937-9234
DOI10.1109/JSYST.2021.3111746

Cover

Abstract Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communication network in this article, where a fixed-wing UAV acts as a legitimate user and a neighboring UAV eavesdropper attempts to eavesdrop the confidential information forwarded by rotary-wing UAV relays. In particular, we jointly optimize transmit power on the base station and UAV relays, power allocation coefficient and beamforming on UAV relays, and trajectory of the fixed-wing UAV to maximize the average secrecy rate. Due to the nonconvexity of the optimization problem, the block coordinate descent method is utilized to solve it. Specifically, the overall optimizing problem is divided into four subproblems in which the transmit power, power allocation coefficient, beamforming vector, and the trajectory of user are optimized, respectively. By employing the successive convex approximate method, subproblems are transformed to convex problems which are numerically tractable. Numerical simulations validate the effectiveness of the proposed algorithm and show that compared with benchmark schemes, the considered transmission scheme with artificial noise and optimized network parameters can improve secrecy rate by about 13.8%.
AbstractList Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communication network in this article, where a fixed-wing UAV acts as a legitimate user and a neighboring UAV eavesdropper attempts to eavesdrop the confidential information forwarded by rotary-wing UAV relays. In particular, we jointly optimize transmit power on the base station and UAV relays, power allocation coefficient and beamforming on UAV relays, and trajectory of the fixed-wing UAV to maximize the average secrecy rate. Due to the nonconvexity of the optimization problem, the block coordinate descent method is utilized to solve it. Specifically, the overall optimizing problem is divided into four subproblems in which the transmit power, power allocation coefficient, beamforming vector, and the trajectory of user are optimized, respectively. By employing the successive convex approximate method, subproblems are transformed to convex problems which are numerically tractable. Numerical simulations validate the effectiveness of the proposed algorithm and show that compared with benchmark schemes, the considered transmission scheme with artificial noise and optimized network parameters can improve secrecy rate by about 13.8%.
Author Wang, Buhong
Dong, Runze
Cao, Kunrui
Cheng, Tianhao
Author_xml – sequence: 1
  givenname: Runze
  orcidid: 0000-0002-7261-8331
  surname: Dong
  fullname: Dong, Runze
  email: drzaxx@buaa.edu.cn
  organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China
– sequence: 2
  givenname: Buhong
  orcidid: 0000-0001-7425-0502
  surname: Wang
  fullname: Wang, Buhong
  email: wbhgroup@aliyun.com
  organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China
– sequence: 3
  givenname: Kunrui
  orcidid: 0000-0003-1950-6901
  surname: Cao
  fullname: Cao, Kunrui
  email: krcao@nudt.edu.cn
  organization: School of Information and Communications, National University of Defense Technology, Xi'an, China
– sequence: 4
  givenname: Tianhao
  orcidid: 0000-0002-7737-4639
  surname: Cheng
  fullname: Cheng, Tianhao
  email: chengtianhao@aliyun.com
  organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China
BookMark eNp9kE1LAzEQhoNUsK3-Ab0seN6aZJNsciylflH00FbwFLLprKR2szXZpfjv3X7gwYOnGYb3mRmeAer52gNC1wSPCMHq7nn-Pl-MKKZklBFCcibOUJ-oLE8VzVjv0NNUEsku0CDGNcZc8lz10XgOtg3OfySLYHysXIyu9klZh2Q5fkvmOxOqdOpNsYFVMqmrqvXOmmafeYFmV4fPS3Remk2Eq1MdouX9dDF5TGevD0-T8Sy1VPEmLbgAyYtSyNJmrCC2tIXNOVZMYgbArMQA1IoCW0ZLMN2ssNQwYfOVobnIhuj2uHcb6q8WYqPXdRt8d1LTnEkuuGSqS8ljyoY6xgCltq45_NsE4zaaYL0Xpg_C9F6YPgnrUPoH3QZXmfD9P3RzhBwA_AKKcyoIyX4AuKF58w
CODEN ISJEB2
CitedBy_id crossref_primary_10_1109_TGCN_2023_3243394
crossref_primary_10_3390_s22124519
crossref_primary_10_1109_TVT_2024_3357821
crossref_primary_10_1186_s13634_023_01081_4
crossref_primary_10_1109_JSYST_2023_3326991
crossref_primary_10_1109_JSYST_2023_3241002
crossref_primary_10_1109_JSYST_2022_3214813
crossref_primary_10_1109_ACCESS_2022_3162628
Cites_doi 10.1109/LWC.2018.2879842
10.1109/ACCESS.2019.2936680
10.1109/ACCESS.2019.2908407
10.1109/TCOMM.2019.2900630
10.1109/COMST.2019.2902862
10.1109/LWC.2020.3040607
10.1109/TVT.2020.2977948
10.1109/TVT.2019.2924180
10.1109/MNET.2019.1800222
10.1109/LCOMM.2018.2881182
10.1109/LWC.2019.2895597
10.1109/TWC.2020.3007648
10.1109/LWC.2017.2680449
10.1109/TVT.2018.2789466
10.1109/MWC.2019.1800458
10.1109/ACCESS.2019.2898995
10.1109/JSYST.2019.2922848
10.1109/TVT.2020.2998060
10.1109/TWC.2019.2906177
10.1109/TWC.2019.2906202
10.1109/GLOCOMW.2018.8644069
10.1109/TVT.2020.2971520
10.1109/TWC.2019.2902559
10.1109/TWC.2020.3016024
10.1109/JSYST.2017.2691159
10.1017/CBO9780511804441
10.1109/MWC.2018.1800023
10.1109/TIFS.2020.3023277
10.1109/LWC.2014.2342736
10.1109/TVT.2018.2849644
10.1109/TSP.2011.2146775
10.1109/TSP.2014.2354312
10.1109/JCN.2018.000074
10.1109/TIFS.2020.2980202
10.1109/JIOT.2019.2954620
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/JSYST.2021.3111746
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1937-9234
EndPage 5211
ExternalDocumentID 10_1109_JSYST_2021_3111746
9552611
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61671465; 62101560
  funderid: 10.13039/501100001809
– fundername: National University of Defense Technology Research Fund
  grantid: ZK21-44
GroupedDBID 0R~
29I
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IFIPE
IPLJI
JAVBF
LAI
M43
O9-
OCL
RIA
RIE
RNS
AAYXX
CITATION
ID FETCH-LOGICAL-c295t-b56e85bf68fc34b1cfcbc75094804ee4c80ee2c6b0c42fea4eebc2a46c7da2763
IEDL.DBID RIE
ISSN 1932-8184
IngestDate Mon Jun 30 04:23:45 EDT 2025
Thu Apr 24 23:10:17 EDT 2025
Wed Oct 01 02:25:53 EDT 2025
Wed Aug 27 02:14:28 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c295t-b56e85bf68fc34b1cfcbc75094804ee4c80ee2c6b0c42fea4eebc2a46c7da2763
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-7737-4639
0000-0002-7261-8331
0000-0003-1950-6901
0000-0001-7425-0502
PQID 2748565849
PQPubID 85494
PageCount 12
ParticipantIDs crossref_citationtrail_10_1109_JSYST_2021_3111746
crossref_primary_10_1109_JSYST_2021_3111746
ieee_primary_9552611
proquest_journals_2748565849
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-Dec.
2022-12-00
20221201
PublicationDateYYYYMMDD 2022-12-01
PublicationDate_xml – month: 12
  year: 2022
  text: 2022-Dec.
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE systems journal
PublicationTitleAbbrev JSYST
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
ref34
ref12
ref15
ref14
ref31
ref30
ref33
ref11
ref32
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref22
  doi: 10.1109/LWC.2018.2879842
– ident: ref23
  doi: 10.1109/ACCESS.2019.2936680
– ident: ref9
  doi: 10.1109/ACCESS.2019.2908407
– ident: ref25
  doi: 10.1109/TCOMM.2019.2900630
– ident: ref1
  doi: 10.1109/COMST.2019.2902862
– ident: ref31
  doi: 10.1109/LWC.2020.3040607
– ident: ref15
  doi: 10.1109/TVT.2020.2977948
– ident: ref28
  doi: 10.1109/TVT.2019.2924180
– ident: ref3
  doi: 10.1109/MNET.2019.1800222
– ident: ref17
  doi: 10.1109/LCOMM.2018.2881182
– ident: ref21
  doi: 10.1109/LWC.2019.2895597
– ident: ref35
  doi: 10.1109/TWC.2020.3007648
– ident: ref11
  doi: 10.1109/LWC.2017.2680449
– ident: ref13
  doi: 10.1109/TVT.2018.2789466
– ident: ref2
  doi: 10.1109/MWC.2019.1800458
– ident: ref18
  doi: 10.1109/ACCESS.2019.2898995
– ident: ref7
  doi: 10.1109/JSYST.2019.2922848
– ident: ref10
  doi: 10.1109/TVT.2020.2998060
– ident: ref14
  doi: 10.1109/TWC.2019.2906177
– ident: ref16
  doi: 10.1109/TWC.2019.2906202
– ident: ref12
  doi: 10.1109/GLOCOMW.2018.8644069
– ident: ref19
  doi: 10.1109/TVT.2020.2971520
– ident: ref27
  doi: 10.1109/TWC.2019.2902559
– ident: ref30
  doi: 10.1109/TWC.2020.3016024
– ident: ref6
  doi: 10.1109/JSYST.2017.2691159
– ident: ref32
  doi: 10.1017/CBO9780511804441
– ident: ref4
  doi: 10.1109/MWC.2018.1800023
– ident: ref26
  doi: 10.1109/TIFS.2020.3023277
– ident: ref29
  doi: 10.1109/LWC.2014.2342736
– ident: ref8
  doi: 10.1109/TVT.2018.2849644
– ident: ref33
  doi: 10.1109/TSP.2011.2146775
– ident: ref34
  doi: 10.1109/TSP.2014.2354312
– ident: ref24
  doi: 10.1109/JCN.2018.000074
– ident: ref5
  doi: 10.1109/TIFS.2020.2980202
– ident: ref20
  doi: 10.1109/JIOT.2019.2954620
SSID ssj0058579
Score 2.3657298
Snippet Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5200
SubjectTerms Algorithms
Antenna arrays
Array signal processing
Artificial noise (AN)
Base stations
Beamforming
block coordinate descent
Communication
Communication networks
Communications networks
Eavesdropping
Fixed wings
Line of sight communication
Optimization
physical layer security
Relays
Trajectory
trajectory optimization
unmanned aerial vehicle (UAV) swarm
Unmanned aerial vehicles
Title Securing Transmission for UAV Swarm-Enabled Communication Network
URI https://ieeexplore.ieee.org/document/9552611
https://www.proquest.com/docview/2748565849
Volume 16
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1937-9234
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0058579
  issn: 1932-8184
  databaseCode: RIE
  dateStart: 20070101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkx78hUYUzQ7etLB1bdceiYEQErgABk_L2nUeVDA4YuJf72u3EVFjvC1NmzR97Xvf173vFaFr5mtgx8zHJqQppkaBH-QBxyFhikidqDCy2uHRmA9mdDhn8xq63WhhjDEu-cy07af7l58u9dpelXUkYwD4gevsRIIXWq3K6wLqdXX1LB7BEIRoJZDxZWc4eZhMgQqSABhqABCcbwUh96rKD1fs4kv_AI2qmRVpJU_tda7a-uNb0cb_Tv0Q7ZdA0-sWO-MI1cziGO19KT_YAJdaXLY_ei5igcXt1ZkHMNabde-9yXuyesE9J65KvS0liTcussdP0Kzfm94NcPmkAtZEshwrxo1gKuMi0yFVgc600hY0UOFTY6gWvjFEc-VrSjKTQJvSJKFcR2lCwBedovpiuTBnyNNpBAfYCCUkpVJwJalUlh9GwGD8JGiioFrjWJf1xu2zF8-x4x2-jJ1dYmuXuLRLE91sxrwW1Tb-7N2wC73pWa5xE7UqU8blgXyLgXwLZtGWPP991AXaJVbZ4DJVWqier9bmEvBGrq7cRvsEljbQbg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHtSDv9CIou7gTQdb15b1SAwEEbgABk_N2nUeVDA4YuJf72u3EVFjvC1NmzR97Xvf173vFaFL6ilgx9RzdUBil2gJfpD5zA0wlZirSAZNox0eDFl3QnpTOi2h65UWRmttk8903Xzaf_nxXC3NVVmDUwqAH7jOBiWE0EytVfhdwL22sp5BJC6EIVJIZDze6I0eRmMgg9gHjuoDCGdrYci-q_LDGdsI09lFg2JuWWLJU32Zyrr6-Fa28b-T30M7OdR0Wtne2EclPTtA218KEFbAqWbX7Y-OjVlgc3N55gCQdSate2f0Hi1e3LaVV8XOmpbEGWb544do0mmPb7pu_qiCqzCnqSsp0yGVCQsTFRDpq0RJZWADCT2iNVGhpzVWTHqK4ERH0CYVjghTzTjC4I2OUHk2n-lj5Ki4CUdYhzLkhPCQSU64NAyxCRzGi_wq8os1FiqvOG4evngWlnl4XFi7CGMXkduliq5WY16zeht_9q6YhV71zNe4imqFKUV-JN8E0O-QGrzFT34fdYE2u-NBX_Rvh3enaAsbnYPNW6mhcrpY6jNAH6k8t5vuE6ub07s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Transmission+for+UAV+Swarm-Enabled+Communication+Network&rft.jtitle=IEEE+systems+journal&rft.au=Dong%2C+Runze&rft.au=Wang%2C+Buhong&rft.au=Cao%2C+Kunrui&rft.au=Cheng%2C+Tianhao&rft.date=2022-12-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=16&rft.issue=4&rft.spage=5200&rft.epage=5211&rft_id=info:doi/10.1109%2FJSYST.2021.3111746&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2021_3111746
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon