Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming

In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled mobile relay assisted secure communication system in the presence of a legitimate source-destination pair and multiple eavesdroppers with imperfect locations. The energy-constrained UAV employs the power splitting (PS) scheme to simultaneously receive information and harvest energy from the source, and then exploits the time switching (TS) protocol to perform information relaying. Furthermore, we consider a full-duplex destination node which can simultaneously receive confidential signals from the UAV and cooperatively transmit artificial noise (AN) signals to confuse malicious eavesdroppers. To further enhance the reliability and security of this system, we formulate a worst case secrecy rate maximization problem, which jointly optimizes the position of the UAV, the AN transmit power, as well as the PS and TS ratios. The formulated problem is non-convex and generally intractable. In order to circumvent the non-convexity, we decouple the original optimization problem into three subproblems; this facilitates the design of a suboptimal iterative algorithm. In each iteration, we propose a multi-dimensional search and numerical method to handle the subproblem. Numerical simulation results are provided to demonstrate the effectiveness and superior performance of the proposed joint design versus the conventional schemes in the literature.

[1]  Xin Liu,et al.  Resource Allocation for OFDM Relaying Wireless Power Transfer Based Energy-Constrained UAV Communication Network , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).

[2]  Lav Gupta,et al.  Survey of Important Issues in UAV Communication Networks , 2016, IEEE Communications Surveys & Tutorials.

[3]  Tony Q. S. Quek,et al.  Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.

[4]  Bruno Clerckx,et al.  Communications and Signals Design for Wireless Power Transmission , 2016, IEEE Transactions on Communications.

[5]  Bayan S. Sharif,et al.  Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper , 2014, IEEE Transactions on Vehicular Technology.

[6]  Fuhui Zhou,et al.  Resource Allocation for Secure UAV-Assisted SWIPT Systems , 2019, IEEE Access.

[7]  Wenbo Wang,et al.  Relay Power Control for Two-Way Full-Duplex Amplify-and-Forward Relay Networks , 2016, IEEE Signal Processing Letters.

[8]  Gregory D. Durgin,et al.  Harvesting Wireless Power: Survey of Energy-Harvester Conversion Efficiency in Far-Field, Wireless Power Transfer Systems , 2014, IEEE Microwave Magazine.

[9]  George K. Karagiannidis,et al.  Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks , 2017, IEEE Access.

[10]  F. Richard Yu,et al.  Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment , 2018, IEEE Transactions on Communications.

[11]  J. Bibby Axiomatisations of the average and a further generalisation of monotonic sequences , 1974, Glasgow Mathematical Journal.

[12]  Chunhua Liu,et al.  Design of an effective wireless air charging system for electric unmanned aerial vehicles , 2017, IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society.

[13]  Zheng Ma,et al.  Design of wireless power transfer device for UAV , 2016, 2016 IEEE International Conference on Mechatronics and Automation.

[14]  Qingqing Wu,et al.  Energy Tradeoff in Ground-to-UAV Communication via Trajectory Design , 2017, IEEE Transactions on Vehicular Technology.

[15]  George K. Karagiannidis,et al.  Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis , 2017, IEEE Transactions on Vehicular Technology.

[16]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[17]  Quanzhong Li,et al.  Beamforming for Cooperative Secure Transmission in Cognitive Two-Way Relay Networks , 2020, IEEE Transactions on Information Forensics and Security.

[18]  Qi Zhang,et al.  Joint Position and Time Allocation Optimization of UAV Enabled Time Allocation Optimization Networks , 2019, IEEE Transactions on Communications.

[19]  Dong Han,et al.  Sum Secrecy Rate Maximization for Full-Duplex Two-Way Relay Networks Using Alamouti-Based Rank-Two Beamforming , 2016, IEEE Journal of Selected Topics in Signal Processing.

[20]  Derrick Wing Kwan Ng,et al.  Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.

[21]  Guoan Zhang,et al.  Optimal Transceiver Designs for Wireless-Powered Full-Duplex Two-Way Relay Networks With SWIPT , 2017, IEEE Access.

[22]  Derrick Wing Kwan Ng,et al.  Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.

[23]  Haji M. Furqan,et al.  Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey , 2019, IEEE Communications Surveys & Tutorials.

[24]  Shuowen Zhang,et al.  Cellular-Enabled UAV Communication: A Connectivity-Constrained Trajectory Optimization Perspective , 2018, IEEE Transactions on Communications.

[25]  Yongming Huang,et al.  Throughput maximization for UAV-enabled wireless power transfer in relaying system , 2017, 2017 9th International Conference on Wireless Communications and Signal Processing (WCSP).

[26]  Yueming Cai,et al.  Physical Layer Security in Millimeter Wave SWIPT UAV-Based Relay Networks , 2019, IEEE Access.

[27]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[28]  Fuhui Zhou,et al.  Robust Secure Beamforming for SWIPT-Aided Relay Systems With Full-Duplex Receiver and Imperfect CSI , 2020, IEEE Transactions on Vehicular Technology.

[29]  Mohsen Guizani,et al.  Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.

[30]  Dinh Chi-Nguyen,et al.  Secrecy Performance of the UAV Enabled Cognitive Relay Network , 2018, 2018 IEEE 3rd International Conference on Communication and Information Systems (ICCIS).

[31]  Derrick Wing Kwan Ng,et al.  Optimal 3D-Trajectory Design and Resource Allocation for Solar-Powered UAV Communication Systems , 2018, IEEE Transactions on Communications.

[32]  H. Vincent Poor,et al.  Secrecy Rate Optimization for Secure Multicast Communications , 2016, IEEE Journal of Selected Topics in Signal Processing.

[33]  Zhi Chen,et al.  Improving Physical Layer Security Using UAV-Enabled Mobile Relaying , 2017, IEEE Wireless Communications Letters.

[34]  Rui Zhang,et al.  Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.

[35]  Qingqing Wu,et al.  UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.

[36]  Derrick Wing Kwan Ng,et al.  Physical Layer Security in UAV Systems: Challenges and Opportunities , 2019, IEEE Wireless Communications.

[37]  Lihua Li,et al.  UAV-Assisted Cooperative Communications with Time-Sharing SWIPT , 2018, 2018 IEEE International Conference on Communications (ICC).

[38]  Caijun Zhong,et al.  Wireless Information and Power Transfer With Full Duplex Relaying , 2014, IEEE Transactions on Communications.

[39]  Hsiao-Hwa Chen,et al.  A Survey on Multiple-Antenna Techniques for Physical Layer Security , 2017, IEEE Communications Surveys & Tutorials.

[40]  Meng Zhang,et al.  Energy Harvesting for Physical-Layer Security in OFDMA Networks , 2015, IEEE Transactions on Information Forensics and Security.

[41]  Hani Mehrpouyan,et al.  Beamforming for Simultaneous Wireless Information and Power Transfer in Two-Way Relay Channels , 2016, IEEE Access.

[42]  Walid Saad,et al.  Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.

[43]  Alister G. Burr,et al.  Energy Efficiency Optimization for Secure Transmission in MISO Cognitive Radio Network With Energy Harvesting , 2019, IEEE Access.

[44]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[45]  Rui Zhang,et al.  Wireless communications with unmanned aerial vehicles: opportunities and challenges , 2016, IEEE Communications Magazine.

[46]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[47]  Rui Zhang,et al.  Energy-Efficient Data Collection in UAV Enabled Wireless Sensor Network , 2017, IEEE Wireless Communications Letters.

[48]  Derrick Wing Kwan Ng,et al.  Practical Non-Linear Energy Harvesting Model and Resource Allocation for SWIPT Systems , 2015, IEEE Communications Letters.