UAV-Relaying-Assisted Secure Transmission With Caching

Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which can achieve significant throughput gain owing to its mobility and line-of-sight (LoS) channel with ground nodes. However, such LoS channels make UAV transmission easy to eavesdrop. In this paper, we propose a novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling. For every two users that have cached the required file for the other, the UAV broadcasts the files together to these two users, and the eavesdropping can be disrupted. For the users without caching, we maximize their minimum average secrecy rate by jointly optimizing the trajectory and scheduling, with the secrecy rate of the caching users satisfied. The corresponding optimization problem is difficult to solve due to its non-convexity, and we propose an iterative algorithm via successive convex optimization to solve it approximately. Furthermore, we also consider a benchmark scheme in which we maximize the minimum average secrecy rate among all users by jointly optimizing the UAV trajectory and time scheduling when no user has the caching ability. Simulation results are provided to show the effectiveness and efficiency of our proposed scheme.

[1]  Victor C. M. Leung,et al.  Physical layer security issues in interference- alignment-based wireless networks , 2016, IEEE Communications Magazine.

[2]  Rui Zhang,et al.  UAV-Aided Offloading for Cellular Hotspot , 2017, IEEE Transactions on Wireless Communications.

[3]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[4]  Walid Saad,et al.  Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience , 2016, IEEE Journal on Selected Areas in Communications.

[5]  Victor C. M. Leung,et al.  Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks , 2018, IEEE Journal on Selected Areas in Communications.

[6]  Rui Zhang,et al.  Placement Optimization of UAV-Mounted Mobile Base Stations , 2016, IEEE Communications Letters.

[7]  Feng Shu,et al.  Artificial-Noise-Aided Secure Multicast Precoding for Directional Modulation Systems , 2017, IEEE Transactions on Vehicular Technology.

[8]  Arnulf Leuther,et al.  mm-Wave SAR demonstrator as a test bed for advanced solutions in microwave imaging , 2014, IEEE Aerospace and Electronic Systems Magazine.

[9]  Youngnam Han,et al.  Optimal Resource Allocation for Packet Delay Minimization in Multi-Layer UAV Networks , 2017, IEEE Communications Letters.

[10]  Xiaoli Xu,et al.  Overcoming Endurance Issue: UAV-Enabled Communications With Proactive Caching , 2017, IEEE Journal on Selected Areas in Communications.

[11]  Xiaoli Xu,et al.  Trajectory Design for Completion Time Minimization in UAV-Enabled Multicasting , 2018, IEEE Transactions on Wireless Communications.

[12]  Tharmalingam Ratnarajah,et al.  A Minorization-Maximization Method for Optimizing Sum Rate in the Downlink of Non-Orthogonal Multiple Access Systems , 2015, IEEE Transactions on Signal Processing.

[13]  George K. Karagiannidis,et al.  Secure Multiple Amplify-and-Forward Relaying Over Correlated Fading Channels , 2017, IEEE Transactions on Communications.

[14]  Walid Saad,et al.  Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs , 2018, IEEE Wireless Communications.

[15]  Lingyang Song,et al.  Joint Trajectory and Power Optimization for UAV Relay Networks , 2018, IEEE Communications Letters.

[16]  George K. Karagiannidis,et al.  A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends , 2017, IEEE Journal on Selected Areas in Communications.

[17]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[18]  Bin Xia,et al.  Artificial Interference Aided Physical Layer Security in Cache-Enabled Heterogeneous Networks , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[19]  Fumiyuki Adachi,et al.  Transceiver Design and Multihop D2D for UAV IoT Coverage in Disasters , 2019, IEEE Internet of Things Journal.

[20]  Mohamed-Slim Alouini,et al.  A Survey of Channel Modeling for UAV Communications , 2018, IEEE Communications Surveys & Tutorials.

[21]  Lajos Hanzo,et al.  Artificial Noise Aided Secure Cognitive Beamforming for Cooperative MISO-NOMA Using SWIPT , 2018, IEEE Journal on Selected Areas in Communications.

[22]  F. Richard Yu,et al.  Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.

[23]  Kaigui Bian,et al.  UAV Relaying: Power Allocation and Trajectory Optimization Using Decode-and-Forward Protocol , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[24]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[25]  Qingqing Wu,et al.  Energy Tradeoff in Ground-to-UAV Communication via Trajectory Design , 2017, IEEE Transactions on Vehicular Technology.

[26]  Feifei Gao,et al.  Joint Information- and Jamming-Beamforming for Physical Layer Security With Full Duplex Base Station , 2014, IEEE Transactions on Signal Processing.

[27]  Victor C. M. Leung,et al.  UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells , 2018, IEEE Transactions on Vehicular Technology.

[28]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[29]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[30]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[31]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[32]  Walid Saad,et al.  Liquid State Machine Learning for Resource and Cache Management in LTE-U Unmanned Aerial Vehicle (UAV) Networks , 2018, IEEE Transactions on Wireless Communications.

[33]  Huiming Wang,et al.  Enhancing wireless secrecy via cooperation: signal design and optimization , 2015, IEEE Communications Magazine.

[34]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[35]  Rui Zhang,et al.  Throughput Maximization for UAV-Enabled Mobile Relaying Systems , 2016, IEEE Transactions on Communications.