| Literature DB >> 35746304 |
Qi An1, Yu Pan1, Huizhu Han1, Hang Hu1.
Abstract
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibility, on-demand deployment and the freedom in trajectory design. The communication channel quality can be effectively improved by using UAV to build a line-of-sight communication link between the transmitter and the receiver. Furthermore, there is increasing demand for communication security improvement, as the openness of a wireless channel brings serious threat. This paper formulates a secrecy capacity optimization problem of a UAV-enabled relay communication system in the presence of malicious eavesdroppers, in which the secrecy capacity is maximized by jointly optimizing the UAV relay's location, power allocation, and bandwidth allocation under the communication quality and information causality constraints. A successive convex approximation-alternative iterative optimization (SCA-AIO) algorithm is proposed to solve this highly coupled nonconvex problem. Simulation results demonstrate the superiority of the proposed secrecy transmission strategy with optimal trajectory design and resource allocation compared with the benchmark schemes and reveal the impacts of communication resources on system performance.Entities:
Keywords: joint optimization algorithm; mobile relay; secrecy capacity; unmanned aerial vehicle (UAV) communication
Year: 2022 PMID: 35746304 PMCID: PMC9228934 DOI: 10.3390/s22124519
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1UAV-enabled relaying system model.
Simulation parameters.
| Parameter | Value | Parameter | Value |
|---|---|---|---|
|
| 10 MHz |
| 30 dbm |
|
| 1 db |
| −169 dbm/Hz |
|
| −22 dbm |
| 5 |
|
| 10 dbm |
| (6000, 0, 0) |
|
| 0.95 |
| 11.95 |
|
| 2500 m |
Figure 2Secrecy communication capacity vs. iterations. (a) N = 5, . (b) N = 10, = 10 MHz.
Figure 3The trajectory of UAV relay versus the network mobility. (a) The 3D trajectory of UAV relay. (b) Plane projection of UAV trajectory.
Figure 4System performance comparisons with distance between the BS and the center of mobile users.
Figure 5Secrecy communication capacity v.s with different values of .
Figure 6Secrecy capacity of each mobile user under different schemes ().