scispace - formally typeset
Open AccessJournal ArticleDOI

UAV-Relaying-Assisted Secure Transmission With Caching

TLDR
A novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling and a benchmark scheme in which the minimum average secrecy rate among all users is maximized and no user has the caching ability.
Abstract
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which can achieve significant throughput gain owing to its mobility and line-of-sight (LoS) channel with ground nodes. However, such LoS channels make UAV transmission easy to eavesdrop. In this paper, we propose a novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling. For every two users that have cached the required file for the other, the UAV broadcasts the files together to these two users, and the eavesdropping can be disrupted. For the users without caching, we maximize their minimum average secrecy rate by jointly optimizing the trajectory and scheduling, with the secrecy rate of the caching users satisfied. The corresponding optimization problem is difficult to solve due to its non-convexity, and we propose an iterative algorithm via successive convex optimization to solve it approximately. Furthermore, we also consider a benchmark scheme in which we maximize the minimum average secrecy rate among all users by jointly optimizing the UAV trajectory and time scheduling when no user has the caching ability. Simulation results are provided to show the effectiveness and efficiency of our proposed scheme.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secrecy Performance Analysis of UAV Assisted Relay Transmission for Cognitive Network With Energy Harvesting

TL;DR: A cooperative secrecy transmission mechanism, which can take advantage of transmitter signal of primary user (PU) as a dedicated radio frequency (RF) source with decode and forward UAV selection and energy harvesting under cognitive network is proposed.
Journal ArticleDOI

3D UAV Trajectory Design and Frequency Band Allocation for Energy-Efficient and Fair Communication: A Deep Reinforcement Learning Approach

TL;DR: A deep reinforcement learning (DRL)-based algorithm, named as EEFC-TDBA (energy-efficient fair communication through trajectory design and band allocation) that chooses the state-of-the-art DRL algorithm, deep deterministic policy gradient (DDPG), as its basis is proposed.
Journal ArticleDOI

Energy-efficient design for mmWave-enabled NOMA-UAV networks

TL;DR: This work aims to maximize the energy efficiency for mmWave-enabled NOMA-UAV networks by optimizing the UAV placement, hybrid precoding and power allocation, and three schemes are proposed, where the cluster head selection algorithm is adopted while considering different equivalent channels of users.
Journal ArticleDOI

Security Enhancement for NOMA-UAV Networks

TL;DR: This paper proposes two schemes to guarantee the secure transmission in UAV-NOMA networks by derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users.
Journal ArticleDOI

UAV-Enabled Secure Communications by Multi-Agent Deep Reinforcement Learning

TL;DR: This paper proposes a cooperative jamming approach by letting UAV jammers help the UAV transmitter defend against GEs, and proposes a continuous action attention MADDPG (CAA-MADDPG) method, where the agent learns to pay attention to the actions and observations of other agents that are more relevant with it.
References
More filters
Book

Convex Optimization

TL;DR: In this article, the focus is on recognizing convex optimization problems and then finding the most appropriate technique for solving them, and a comprehensive introduction to the subject is given. But the focus of this book is not on the optimization problem itself, but on the problem of finding the appropriate technique to solve it.
Journal ArticleDOI

Wireless communications with unmanned aerial vehicles: opportunities and challenges

TL;DR: An overview of UAV-aided wireless communications is provided, by introducing the basic networking architecture and main channel characteristics, highlighting the key design considerations as well as the new opportunities to be exploited.
Journal ArticleDOI

A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends

TL;DR: In this paper, the authors provide an overview of the latest NOMA research and innovations as well as their applications in 5G wireless networks and discuss future challenges and future research challenges.
Journal ArticleDOI

Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks

TL;DR: In this paper, the minimum throughput over all ground users in the downlink communication was maximized by optimizing the multiuser communication scheduling and association jointly with the UAV's trajectory and power control.
Posted Content

A Survey on Non-Orthogonal Multiple Access for 5G Networks: Research Challenges and Future Trends

TL;DR: In this paper, the authors provide an overview of the latest NOMA research and innovations as well as their applications in 5G wireless networks and discuss future research challenges regarding 5G and beyond.
Related Papers (5)
Frequently Asked Questions (11)
Q1. What are the contributions mentioned in the paper "Uav relaying assisted secure transmission with caching" ?

In this paper, the authors propose a novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling. The corresponding optimization problem is difficult to solve due to its non-convexity, and the authors propose an iterative algorithm via successive convex optimization to solve it approximatively. Furthermore, the authors also consider a benchmark scheme in which they maximize the minimum average secrecy rate among all users by jointly optimizing the UAV trajectory and time scheduling when no user has the caching ability. 

larger T will also result in higher energy consumption and larger access delay since each user need to wait for longer time to communicate with the UAV in the next cycle. 

The authors can observe that a larger flight period T will achieve higher throughput since more time can be provided for the UAV to fly closer to each ground user to make better wireless channel. 

It’s obvious to find that the optimized secrecy rate of User i3 at each time slot must be higher than or equal to 0, due to the fact that if the secrecy rate of User i3 is less than 0 at the nth time slot, αi3 [n] will be equal to 0 for maximizing the minimum average secrecy rate of the users without caching. 

the minimum secrecy rate of all the uncached users can be optimized to be 0.607 bit/s/Hz, with the secrecy rate of cached users higher than η = 0.6 bit/s/Hz.Finally, the authors consider the scenario in which no user has caching ability, and the authors maximize the minimum secrecy rateamong all users by jointly optimizing the UAV trajectory and time scheduling according to (P2). 

The authors aim to maximize the minimum secrecy rate of all the uncached users by jointly optimizing the UAV trajectory and time scheduling, with the secrecy rate of other caching users guaranteed. 

the authors can conclude that N1 should be set as small as possible to achieve better performance, on the condition that the optimization problem can be solved. 

When two users have cached the file required by the other, the UAV can broadcast the files to them and disrupt the eavesdropping. 

(10)The average transmission rate from the UAV to the ith user can be presented asR[i] = 1N ∑N n=1 αi[n]ru,i[n], i ∈ I1 ∪ I2 ∪ I3. 

From the results, the authors can see that the proposed Algorithm 1 can be guaranteed to converge for both the authors = (700m, 0m) and the authors = (500m, 0m) within about 5 iterations, which is consistent with the analysis in Proposition 1. 

This is because the instantaneous secrecy rate of all the users in each time slot should be higher than 0; otherwise, the UAV will serve other users with positive secrecy rate to improve the network security.