Securing Transmission for UAV Swarm-Enabled Communication Network
Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communi...
Saved in:
| Published in | IEEE systems journal Vol. 16; no. 4; pp. 5200 - 5211 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
IEEE
01.12.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1932-8184 1937-9234 |
| DOI | 10.1109/JSYST.2021.3111746 |
Cover
| Abstract | Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communication network in this article, where a fixed-wing UAV acts as a legitimate user and a neighboring UAV eavesdropper attempts to eavesdrop the confidential information forwarded by rotary-wing UAV relays. In particular, we jointly optimize transmit power on the base station and UAV relays, power allocation coefficient and beamforming on UAV relays, and trajectory of the fixed-wing UAV to maximize the average secrecy rate. Due to the nonconvexity of the optimization problem, the block coordinate descent method is utilized to solve it. Specifically, the overall optimizing problem is divided into four subproblems in which the transmit power, power allocation coefficient, beamforming vector, and the trajectory of user are optimized, respectively. By employing the successive convex approximate method, subproblems are transformed to convex problems which are numerically tractable. Numerical simulations validate the effectiveness of the proposed algorithm and show that compared with benchmark schemes, the considered transmission scheme with artificial noise and optimized network parameters can improve secrecy rate by about 13.8%. |
|---|---|
| AbstractList | Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security threats faced by UAV communications are serious. Taking that into consideration, we focus on a UAV swarm-enabled communication network in this article, where a fixed-wing UAV acts as a legitimate user and a neighboring UAV eavesdropper attempts to eavesdrop the confidential information forwarded by rotary-wing UAV relays. In particular, we jointly optimize transmit power on the base station and UAV relays, power allocation coefficient and beamforming on UAV relays, and trajectory of the fixed-wing UAV to maximize the average secrecy rate. Due to the nonconvexity of the optimization problem, the block coordinate descent method is utilized to solve it. Specifically, the overall optimizing problem is divided into four subproblems in which the transmit power, power allocation coefficient, beamforming vector, and the trajectory of user are optimized, respectively. By employing the successive convex approximate method, subproblems are transformed to convex problems which are numerically tractable. Numerical simulations validate the effectiveness of the proposed algorithm and show that compared with benchmark schemes, the considered transmission scheme with artificial noise and optimized network parameters can improve secrecy rate by about 13.8%. |
| Author | Wang, Buhong Dong, Runze Cao, Kunrui Cheng, Tianhao |
| Author_xml | – sequence: 1 givenname: Runze orcidid: 0000-0002-7261-8331 surname: Dong fullname: Dong, Runze email: drzaxx@buaa.edu.cn organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China – sequence: 2 givenname: Buhong orcidid: 0000-0001-7425-0502 surname: Wang fullname: Wang, Buhong email: wbhgroup@aliyun.com organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China – sequence: 3 givenname: Kunrui orcidid: 0000-0003-1950-6901 surname: Cao fullname: Cao, Kunrui email: krcao@nudt.edu.cn organization: School of Information and Communications, National University of Defense Technology, Xi'an, China – sequence: 4 givenname: Tianhao orcidid: 0000-0002-7737-4639 surname: Cheng fullname: Cheng, Tianhao email: chengtianhao@aliyun.com organization: School of Information and Navigation, Air Force Engineering University, Xi'an, China |
| BookMark | eNp9kE1LAzEQhoNUsK3-Ab0seN6aZJNsciylflH00FbwFLLprKR2szXZpfjv3X7gwYOnGYb3mRmeAer52gNC1wSPCMHq7nn-Pl-MKKZklBFCcibOUJ-oLE8VzVjv0NNUEsku0CDGNcZc8lz10XgOtg3OfySLYHysXIyu9klZh2Q5fkvmOxOqdOpNsYFVMqmrqvXOmmafeYFmV4fPS3Remk2Eq1MdouX9dDF5TGevD0-T8Sy1VPEmLbgAyYtSyNJmrCC2tIXNOVZMYgbArMQA1IoCW0ZLMN2ssNQwYfOVobnIhuj2uHcb6q8WYqPXdRt8d1LTnEkuuGSqS8ljyoY6xgCltq45_NsE4zaaYL0Xpg_C9F6YPgnrUPoH3QZXmfD9P3RzhBwA_AKKcyoIyX4AuKF58w |
| CODEN | ISJEB2 |
| CitedBy_id | crossref_primary_10_1109_TGCN_2023_3243394 crossref_primary_10_3390_s22124519 crossref_primary_10_1109_TVT_2024_3357821 crossref_primary_10_1186_s13634_023_01081_4 crossref_primary_10_1109_JSYST_2023_3326991 crossref_primary_10_1109_JSYST_2023_3241002 crossref_primary_10_1109_JSYST_2022_3214813 crossref_primary_10_1109_ACCESS_2022_3162628 |
| Cites_doi | 10.1109/LWC.2018.2879842 10.1109/ACCESS.2019.2936680 10.1109/ACCESS.2019.2908407 10.1109/TCOMM.2019.2900630 10.1109/COMST.2019.2902862 10.1109/LWC.2020.3040607 10.1109/TVT.2020.2977948 10.1109/TVT.2019.2924180 10.1109/MNET.2019.1800222 10.1109/LCOMM.2018.2881182 10.1109/LWC.2019.2895597 10.1109/TWC.2020.3007648 10.1109/LWC.2017.2680449 10.1109/TVT.2018.2789466 10.1109/MWC.2019.1800458 10.1109/ACCESS.2019.2898995 10.1109/JSYST.2019.2922848 10.1109/TVT.2020.2998060 10.1109/TWC.2019.2906177 10.1109/TWC.2019.2906202 10.1109/GLOCOMW.2018.8644069 10.1109/TVT.2020.2971520 10.1109/TWC.2019.2902559 10.1109/TWC.2020.3016024 10.1109/JSYST.2017.2691159 10.1017/CBO9780511804441 10.1109/MWC.2018.1800023 10.1109/TIFS.2020.3023277 10.1109/LWC.2014.2342736 10.1109/TVT.2018.2849644 10.1109/TSP.2011.2146775 10.1109/TSP.2014.2354312 10.1109/JCN.2018.000074 10.1109/TIFS.2020.2980202 10.1109/JIOT.2019.2954620 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/JSYST.2021.3111746 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1937-9234 |
| EndPage | 5211 |
| ExternalDocumentID | 10_1109_JSYST_2021_3111746 9552611 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61671465; 62101560 funderid: 10.13039/501100001809 – fundername: National University of Defense Technology Research Fund grantid: ZK21-44 |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL RIA RIE RNS AAYXX CITATION |
| ID | FETCH-LOGICAL-c295t-b56e85bf68fc34b1cfcbc75094804ee4c80ee2c6b0c42fea4eebc2a46c7da2763 |
| IEDL.DBID | RIE |
| ISSN | 1932-8184 |
| IngestDate | Mon Jun 30 04:23:45 EDT 2025 Thu Apr 24 23:10:17 EDT 2025 Wed Oct 01 02:25:53 EDT 2025 Wed Aug 27 02:14:28 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c295t-b56e85bf68fc34b1cfcbc75094804ee4c80ee2c6b0c42fea4eebc2a46c7da2763 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-7737-4639 0000-0002-7261-8331 0000-0003-1950-6901 0000-0001-7425-0502 |
| PQID | 2748565849 |
| PQPubID | 85494 |
| PageCount | 12 |
| ParticipantIDs | crossref_citationtrail_10_1109_JSYST_2021_3111746 crossref_primary_10_1109_JSYST_2021_3111746 ieee_primary_9552611 proquest_journals_2748565849 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-Dec. 2022-12-00 20221201 |
| PublicationDateYYYYMMDD | 2022-12-01 |
| PublicationDate_xml | – month: 12 year: 2022 text: 2022-Dec. |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE systems journal |
| PublicationTitleAbbrev | JSYST |
| PublicationYear | 2022 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref35 ref13 ref34 ref12 ref15 ref14 ref31 ref30 ref33 ref11 ref32 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
| References_xml | – ident: ref22 doi: 10.1109/LWC.2018.2879842 – ident: ref23 doi: 10.1109/ACCESS.2019.2936680 – ident: ref9 doi: 10.1109/ACCESS.2019.2908407 – ident: ref25 doi: 10.1109/TCOMM.2019.2900630 – ident: ref1 doi: 10.1109/COMST.2019.2902862 – ident: ref31 doi: 10.1109/LWC.2020.3040607 – ident: ref15 doi: 10.1109/TVT.2020.2977948 – ident: ref28 doi: 10.1109/TVT.2019.2924180 – ident: ref3 doi: 10.1109/MNET.2019.1800222 – ident: ref17 doi: 10.1109/LCOMM.2018.2881182 – ident: ref21 doi: 10.1109/LWC.2019.2895597 – ident: ref35 doi: 10.1109/TWC.2020.3007648 – ident: ref11 doi: 10.1109/LWC.2017.2680449 – ident: ref13 doi: 10.1109/TVT.2018.2789466 – ident: ref2 doi: 10.1109/MWC.2019.1800458 – ident: ref18 doi: 10.1109/ACCESS.2019.2898995 – ident: ref7 doi: 10.1109/JSYST.2019.2922848 – ident: ref10 doi: 10.1109/TVT.2020.2998060 – ident: ref14 doi: 10.1109/TWC.2019.2906177 – ident: ref16 doi: 10.1109/TWC.2019.2906202 – ident: ref12 doi: 10.1109/GLOCOMW.2018.8644069 – ident: ref19 doi: 10.1109/TVT.2020.2971520 – ident: ref27 doi: 10.1109/TWC.2019.2902559 – ident: ref30 doi: 10.1109/TWC.2020.3016024 – ident: ref6 doi: 10.1109/JSYST.2017.2691159 – ident: ref32 doi: 10.1017/CBO9780511804441 – ident: ref4 doi: 10.1109/MWC.2018.1800023 – ident: ref26 doi: 10.1109/TIFS.2020.3023277 – ident: ref29 doi: 10.1109/LWC.2014.2342736 – ident: ref8 doi: 10.1109/TVT.2018.2849644 – ident: ref33 doi: 10.1109/TSP.2011.2146775 – ident: ref34 doi: 10.1109/TSP.2014.2354312 – ident: ref24 doi: 10.1109/JCN.2018.000074 – ident: ref5 doi: 10.1109/TIFS.2020.2980202 – ident: ref20 doi: 10.1109/JIOT.2019.2954620 |
| SSID | ssj0058579 |
| Score | 2.3657298 |
| Snippet | Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve desirable degrees of freedom, but resulting from the high line-of-sight link... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 5200 |
| SubjectTerms | Algorithms Antenna arrays Array signal processing Artificial noise (AN) Base stations Beamforming block coordinate descent Communication Communication networks Communications networks Eavesdropping Fixed wings Line of sight communication Optimization physical layer security Relays Trajectory trajectory optimization unmanned aerial vehicle (UAV) swarm Unmanned aerial vehicles |
| Title | Securing Transmission for UAV Swarm-Enabled Communication Network |
| URI | https://ieeexplore.ieee.org/document/9552611 https://www.proquest.com/docview/2748565849 |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1937-9234 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0058579 issn: 1932-8184 databaseCode: RIE dateStart: 20070101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkx78hUYUzQ7etLB1bdceiYEQErgABk_L2nUeVDA4YuJf72u3EVFjvC1NmzR97Xvf173vFaFr5mtgx8zHJqQppkaBH-QBxyFhikidqDCy2uHRmA9mdDhn8xq63WhhjDEu-cy07af7l58u9dpelXUkYwD4gevsRIIXWq3K6wLqdXX1LB7BEIRoJZDxZWc4eZhMgQqSABhqABCcbwUh96rKD1fs4kv_AI2qmRVpJU_tda7a-uNb0cb_Tv0Q7ZdA0-sWO-MI1cziGO19KT_YAJdaXLY_ei5igcXt1ZkHMNabde-9yXuyesE9J65KvS0liTcussdP0Kzfm94NcPmkAtZEshwrxo1gKuMi0yFVgc600hY0UOFTY6gWvjFEc-VrSjKTQJvSJKFcR2lCwBedovpiuTBnyNNpBAfYCCUkpVJwJalUlh9GwGD8JGiioFrjWJf1xu2zF8-x4x2-jJ1dYmuXuLRLE91sxrwW1Tb-7N2wC73pWa5xE7UqU8blgXyLgXwLZtGWPP991AXaJVbZ4DJVWqier9bmEvBGrq7cRvsEljbQbg |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4IHtSDv9CIou7gTQdb15b1SAwEEbgABk_N2nUeVDA4YuJf72u3EVFjvC1NmzR97Xvf173vFaFL6ilgx9RzdUBil2gJfpD5zA0wlZirSAZNox0eDFl3QnpTOi2h65UWRmttk8903Xzaf_nxXC3NVVmDUwqAH7jOBiWE0EytVfhdwL22sp5BJC6EIVJIZDze6I0eRmMgg9gHjuoDCGdrYci-q_LDGdsI09lFg2JuWWLJU32Zyrr6-Fa28b-T30M7OdR0Wtne2EclPTtA218KEFbAqWbX7Y-OjVlgc3N55gCQdSate2f0Hi1e3LaVV8XOmpbEGWb544do0mmPb7pu_qiCqzCnqSsp0yGVCQsTFRDpq0RJZWADCT2iNVGhpzVWTHqK4ERH0CYVjghTzTjC4I2OUHk2n-lj5Ki4CUdYhzLkhPCQSU64NAyxCRzGi_wq8os1FiqvOG4evngWlnl4XFi7CGMXkduliq5WY16zeht_9q6YhV71zNe4imqFKUV-JN8E0O-QGrzFT34fdYE2u-NBX_Rvh3enaAsbnYPNW6mhcrpY6jNAH6k8t5vuE6ub07s |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Securing+Transmission+for+UAV+Swarm-Enabled+Communication+Network&rft.jtitle=IEEE+systems+journal&rft.au=Dong%2C+Runze&rft.au=Wang%2C+Buhong&rft.au=Cao%2C+Kunrui&rft.au=Cheng%2C+Tianhao&rft.date=2022-12-01&rft.issn=1932-8184&rft.eissn=1937-9234&rft.volume=16&rft.issue=4&rft.spage=5200&rft.epage=5211&rft_id=info:doi/10.1109%2FJSYST.2021.3111746&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JSYST_2021_3111746 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1932-8184&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1932-8184&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1932-8184&client=summon |