Multi-UAV Assisted Communication Networks: Towards Max-Min Secrecy Rate

This paper investigates a multi-unmanned aerial vehicle (UAV) assisted network, where multiple UAVs send confidential information to multiple authorized access users (AUs), in the existence of an unauthorized access users. In order to improve the AUs' experience quality, an optimization problem is formulated to maximize the minimum secrecy rate of AUs by jointly optimizing user scheduling, UAVs' trajectories and transmit power allocation, subject to on board energy budget and curvature radius constraints. Since the problem is a mixed integer non-convex optimization problem, an efficient algorithm is proposed based on the block coordinate descent (BCD) and successive convex approximation (SCA) theories, which achieves a good suboptimal solution. Simulation results show that the proposed algorithm converges within several iterations, and significant system performance gain is achieved compared to other benchmarks. Moreover, the larger the curvature radius is, the smoother the UAVs' trajectories are. Although it also yields the lower the secrecy rate, introducing curvature radius into trajectory design is an effective approach to make the optimized UAVs' trajectories closer to practical flight. Besides, the higher the propulsion energy stored at UAVs is, the higher the achieved max-min secrecy rate is. Additionally, the max-min secrecy rate is improved by allowing concurrent transmissions of multiple UAVs.

[1]  Geoffrey Ye Li,et al.  Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.

[2]  Jie Xu,et al.  Secure UAV Communication With Cooperative Jamming and Trajectory Control , 2018, IEEE Communications Letters.

[3]  Ambuj Tewari,et al.  On the Nonasymptotic Convergence of Cyclic Coordinate Descent Methods , 2013, SIAM J. Optim..

[4]  Khaled Ben Letaief,et al.  UAV-Assisted Wireless Powered Cooperative Mobile Edge Computing: Joint Offloading, CPU Control, and Trajectory Optimization , 2020, IEEE Internet of Things Journal.

[5]  Yu Xu,et al.  Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying , 2018, IEEE Transactions on Green Communications and Networking.

[6]  Paolo Dell'Olmo,et al.  Optimal Throughput Management in UAV-based Networks during Disasters , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[7]  Qingqing Wu,et al.  Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks , 2017, IEEE Transactions on Wireless Communications.

[8]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[9]  Baoqing Li,et al.  Joint Trajectory and Power Design for UAV-Enabled Secure Communications With No-Fly Zone Constraints , 2019, IEEE Access.

[10]  Li Jiandong,et al.  UAV Assisted Heterogeneous Wireless Networks: Potentials and Challenges , 2019 .

[11]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[12]  Derrick Wing Kwan Ng,et al.  Energy-Efficient Resource Allocation for Secure UAV Communication Systems , 2022 .

[13]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[14]  Rui Zhang,et al.  Energy-Efficient UAV Communication With Trajectory Optimization , 2016, IEEE Transactions on Wireless Communications.

[15]  A. Lee Swindlehurst,et al.  Detecting passive eavesdroppers in the MIMO wiretap channel , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).