This letter studies the physical layer security of an unmanned aerial vehicle (UAV)-enabled multicasting system, where a UAV serves as a mobile transmitter to send a common confidential message to a group of legitimate users under the existence of multiple eavesdroppers. The worst situation in which each eavesdropper can wiretap all legitimate users is considered. We seek to maximize the average secrecy rate by jointly optimizing the UAV's transmit power and trajectory over a given flight period. The resulting optimization problem is nonconvex and intractable to solve. To circumvent the nonconvexity, we propose an iterative algorithm to approximate the solution based on the alternating optimization and successive convex approximation methods. Simulation results validate the convergence and effectiveness of our proposed algorithm.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Ke WANG, Wei HENG, "Joint Trajectory and Power Design for Secure UAV-Enabled Multicasting" in IEICE TRANSACTIONS on Fundamentals,
vol. E103-A, no. 6, pp. 860-864, June 2020, doi: 10.1587/transfun.2019EAL2166.
Abstract: This letter studies the physical layer security of an unmanned aerial vehicle (UAV)-enabled multicasting system, where a UAV serves as a mobile transmitter to send a common confidential message to a group of legitimate users under the existence of multiple eavesdroppers. The worst situation in which each eavesdropper can wiretap all legitimate users is considered. We seek to maximize the average secrecy rate by jointly optimizing the UAV's transmit power and trajectory over a given flight period. The resulting optimization problem is nonconvex and intractable to solve. To circumvent the nonconvexity, we propose an iterative algorithm to approximate the solution based on the alternating optimization and successive convex approximation methods. Simulation results validate the convergence and effectiveness of our proposed algorithm.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.2019EAL2166/_p
Copy
@ARTICLE{e103-a_6_860,
author={Ke WANG, Wei HENG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Joint Trajectory and Power Design for Secure UAV-Enabled Multicasting},
year={2020},
volume={E103-A},
number={6},
pages={860-864},
abstract={This letter studies the physical layer security of an unmanned aerial vehicle (UAV)-enabled multicasting system, where a UAV serves as a mobile transmitter to send a common confidential message to a group of legitimate users under the existence of multiple eavesdroppers. The worst situation in which each eavesdropper can wiretap all legitimate users is considered. We seek to maximize the average secrecy rate by jointly optimizing the UAV's transmit power and trajectory over a given flight period. The resulting optimization problem is nonconvex and intractable to solve. To circumvent the nonconvexity, we propose an iterative algorithm to approximate the solution based on the alternating optimization and successive convex approximation methods. Simulation results validate the convergence and effectiveness of our proposed algorithm.},
keywords={},
doi={10.1587/transfun.2019EAL2166},
ISSN={1745-1337},
month={June},}
Copy
TY - JOUR
TI - Joint Trajectory and Power Design for Secure UAV-Enabled Multicasting
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 860
EP - 864
AU - Ke WANG
AU - Wei HENG
PY - 2020
DO - 10.1587/transfun.2019EAL2166
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E103-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 2020
AB - This letter studies the physical layer security of an unmanned aerial vehicle (UAV)-enabled multicasting system, where a UAV serves as a mobile transmitter to send a common confidential message to a group of legitimate users under the existence of multiple eavesdroppers. The worst situation in which each eavesdropper can wiretap all legitimate users is considered. We seek to maximize the average secrecy rate by jointly optimizing the UAV's transmit power and trajectory over a given flight period. The resulting optimization problem is nonconvex and intractable to solve. To circumvent the nonconvexity, we propose an iterative algorithm to approximate the solution based on the alternating optimization and successive convex approximation methods. Simulation results validate the convergence and effectiveness of our proposed algorithm.
ER -