TY - JOUR
T1 - Robust 3D-Trajectory and Time Switching Optimization for Dual-UAV-Enabled Secure Communications
AU - Wang, Wei
AU - Li, Xinrui
AU - Wang, Rui
AU - Cumanan, Kanapathippillai
AU - Feng, Wei
AU - Ding, Zhiguo
AU - Dobre, Octavia A.
N1 - Funding Information:
This work was supported in part by the National Natural Science Foundation of China under Grant 61971245, Grant 61771345, and Grant 61922049; in part by the Six Categories Talent Peak of Jiangsu Province under Grant KTHY-039; in part by the Verification Platform of Multi-tier Coverage Communication Network for oceans under Grant LZC0020; in part by the Project from Shanghai Science and Technology Committee under Grant 19DZ1201102; in part by the Science and Technology Program of Nantong under Grant MS22019019 and Grant JC2021199; in part by the Postgraduate Research and Practice Innovation Program of Jiangsu Province under Grant KYCX19-2057; and in part by the Natural Sciences and Engineering Research Council of Canada (NSERC), though its Discovery Program.
Publisher Copyright:
© 1983-2012 IEEE.
PY - 2021/11/1
Y1 - 2021/11/1
N2 - This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure communication system, in which, a UAV moves around to send confidential messages to a mobile user while another cooperative UAV transmits artificial noise signals to confuse malicious eavesdroppers. Both UAVs have energy constraints and the location information of eavesdroppers is imperfect. We consider a worst-case secrecy rate maximization problem of the mobile user over all time slots. This optimization problem is solved by jointly designing the three-dimensional (3D) trajectory of UAVs and the time allocation (recharging and service or jamming) under practical constraints including maximum UAV speed, UAV collision avoidance, UAV positioning error, and UAV energy harvesting. Specifically, we adopt a more practical UAV-ground channel model with both large-scale and small-scale fading components. Due to the non-convex feasible region constructed by the complicated constraints, directly finding the optimal solution of the original problem is intractable. To address this issue, we decouple the original optimization problem into three subproblems and develop an iterative algorithm to find its suboptimal solution by using the block coordinate descent technique. To solve each subproblem, certain advanced optimization tools, such as integer relaxation, S-procedure, and successive convex approximation techniques, are utilized. Numerical simulation results are provided to corroborate the theoretical derivations and to evaluate the performance of the proposed algorithm. Additionally, the numerical results assist to draw new insights on the 3D UAV trajectory by comparing the performance with conventional two-dimensional (2D) schemes.
AB - This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure communication system, in which, a UAV moves around to send confidential messages to a mobile user while another cooperative UAV transmits artificial noise signals to confuse malicious eavesdroppers. Both UAVs have energy constraints and the location information of eavesdroppers is imperfect. We consider a worst-case secrecy rate maximization problem of the mobile user over all time slots. This optimization problem is solved by jointly designing the three-dimensional (3D) trajectory of UAVs and the time allocation (recharging and service or jamming) under practical constraints including maximum UAV speed, UAV collision avoidance, UAV positioning error, and UAV energy harvesting. Specifically, we adopt a more practical UAV-ground channel model with both large-scale and small-scale fading components. Due to the non-convex feasible region constructed by the complicated constraints, directly finding the optimal solution of the original problem is intractable. To address this issue, we decouple the original optimization problem into three subproblems and develop an iterative algorithm to find its suboptimal solution by using the block coordinate descent technique. To solve each subproblem, certain advanced optimization tools, such as integer relaxation, S-procedure, and successive convex approximation techniques, are utilized. Numerical simulation results are provided to corroborate the theoretical derivations and to evaluate the performance of the proposed algorithm. Additionally, the numerical results assist to draw new insights on the 3D UAV trajectory by comparing the performance with conventional two-dimensional (2D) schemes.
KW - cooperative jamming
KW - maritime communications
KW - physical layer security
KW - robust 3D-trajectory design
KW - Unmanned aerial vehicles (UAV) communications
UR - http://www.scopus.com/inward/record.url?scp=85112216773&partnerID=8YFLogxK
U2 - 10.1109/JSAC.2021.3088628
DO - 10.1109/JSAC.2021.3088628
M3 - Article
AN - SCOPUS:85112216773
SN - 0733-8716
VL - 39
SP - 3334
EP - 3347
JO - IEEE Journal on Selected Areas in Communications
JF - IEEE Journal on Selected Areas in Communications
IS - 11
ER -