Next Article in Journal
A Novel Resource Allocation and Spectrum Defragmentation Mechanism for IoT-Based Big Data in Smart Cities
Previous Article in Journal
Simultaneous Measurement of Ear Canal Movement, Electromyography of the Masseter Muscle and Occlusal Force for Earphone-Type Occlusal Force Estimation Device Development
Previous Article in Special Issue
3D Path Planning for the Ground Robot with Improved Ant Colony Optimization
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying

1
School of Information Engineering, Zhengzhou University, Zhengzhou 450001, China
2
Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC V8W 2Y2, Canada
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(15), 3442; https://doi.org/10.3390/s19153442
Submission received: 30 July 2019 / Accepted: 31 July 2019 / Published: 6 August 2019
(This article belongs to the Special Issue Selected Papers from CyberC 2018)

Abstract

:
With the fast development of commercial unmanned aerial vehicle (UAV) technology, there are increasing research interests on UAV communications. In this work, the mobility and deployment flexibility of UAVs are exploited to form a buffer-aided relaying system assisting terrestrial communication that is blocked. Optimal UAV trajectory design of the UAV-enabled mobile relaying system with a randomly located eavesdropper is investigated from the physical-layer security perspective to improve the overall secrecy rate. Based on the mobility of the UAV relay, a wireless channel model that changes with the trajectory and is exploited for improved secrecy is established. The secrecy rate is maximized by optimizing the discretized trajectory anchor points based on the information causality and UAV mobility constraints. However, the problem is non-convex and therefore difficult to solve. To make the problem tractable, we alternatively optimize the increments of the trajectory anchor points iteratively in a two-dimensional space and decompose the problem into progressive convex approximate problems through the iterative procedure. Convergence of the proposed iterative trajectory optimization technique is proved analytically by the squeeze principle. Simulation results show that finding the optimal trajectory by iteratively updating the displacements is effective and fast converging. It is also shown by the simulation results that the distribution of the eavesdropper location influences the security performance of the system. Specifically, an eavesdropper further away from the destination is beneficial to the system’s overall secrecy rate. Furthermore, it is observed that eavesdropper being further away from the destination also results in shorter trajectories, which implies it being energy-efficient as well.

1. Introduction

Unmanned aerial vehicles (UAVs), also known as drones in many commercial applications, have witnessed a dramatic growth in the industry and market in the past few years. As the ecosystem is building up, there is an increasing research interest in UAV-related topics, in particular from the communication perspective. Due to their mobility and implementation flexibility, UAVs can be used as airborne mobile relays to assist terrestrial point-to-point communications where direct communication between the source and the destination is obstructed [1]. The Quality-of-Service (QoS) provisioning of the communication system can be significantly improved by jointly optimizing the UAV relay placement and the radio resource allocation [2,3]. UAV-based stations in the air may also be a viable means to solve the backhaul crunch that is critical to the deployment of dense small cell networks [4]. However, the use of UAVs as mobile relays also raises new problems and challenges to the communication system design. In particular, the characteristics of the air-to-ground wireless channels and the mobility of UAVs may bring in favorable conditions to potential eavesdropping and as such require new designs to better protect information security.
Because of the rapid development of computing power, the traditional cryptosystem based on computational security is facing continuing increasing challenges. Physical-layer (PHY) security has emerged as a promising supplement to the computational security because of its information-theoretic security nature [5,6]. In the context of wireless communications, PHY security technologies can achieve information-theoretic security by exploiting randomness in physical properties of wireless channels [7]. Reliable data transmissions with Shannon’s notion of perfect secrecy can be supported accordingly under realistic conditions over a wide range of wireless-channel models. In 1975, Wyner demonstrated the basic idea of PHY security with a noisy wire-tap channel model and illustrated that when the legitimate channel is more favorable than the eavesdropping channel, the communication between the source and the destination can achieve Shannon’s notion of perfect secrecy [8]. Since then, a number of wireless-channel models, e.g., broadcast channel, multiple access channel, relay channel, interference channel, have been studied from the PHY security perspective in noisy and interference communication environments. The PHY security of conventional cooperative relaying systems with fixed relay(s) has been extensively investigated in the literature [9,10,11,12]. The realizations of such schemes mainly rely on management and optimized allocation of the radio resources under static or quasi-static conditions, which cannot fully use the dynamic radio propagation environment from the spatial perspective to improve PHY security.
Recently, it has been demonstrated that UAV-assisted communications can adaptively change the UAV station’s position according to the dynamic radio propagation environment to better exploit the spatial degrees-of-freedom for performance improvement [13,14,15]. For instance, an altitude dependent model was proposed to conduct performance analysis for the power and sum-rate gains of UAV-based aerial base stations (ABSs) [13]. By adaptively changing the height of the ABS, optimization of the sum-rate or power can be achieved accordingly. Extending the above idea to the studies of PHY security related problems, UAV position can be exploited in the PHY security design to add an extra degree-of-freedom in the design variables such that improved security performance is expected. In [16], security challenges of UAV communications due to the dominant line-of-sight (LOS) transmission are identified, and possible solution approaches are envisioned from the PHY security perspective. In the case of air-to-ground communications, it is suggested that a well-designed UAV trajectory can be an effective means against terrestrial eavesdropping.
On the other hand, queue awareness and buffer-aided protocols have been shown, from the cross-layer design perspective, to also provide gains to the physical-layer performance of cooperative relaying communications [17,18,19,20]. UAV relays equipped with data storage can, therefore, benefit from both relay node mobility and buffer-aided relaying in a way that data packets can be stored and then transmitted at more favorable locations subject to certain QoS requirements. How such mechanism affects PHY security designs of UAV mobile relaying systems is an interesting problem that has yet been adequately studied.
Recent emerging research interests in UAV wireless communications have been mainly focused on resource allocation and trajectory optimization. A UAV-enabled data collection system for wireless sensor networks was considered in [21], where a shortest-tour trajectory design was proposed based on policy gradient reinforcement learning. Zeng et al. further considered joint source/relay transmit power allocation and mobile relay trajectory design in a throughput optimization problem for UAV-enabled mobile relaying systems, subject to practical mobility constraints of the UAV relay [22]. Similar works conducting joint UAV trajectory design and radio resource allocation have been reported for various system setups such as UAV-enabled wireless powered communication networks [23] and UAV-enabled amplify-and-forward relay networks [24]. In [25], the minimum average throughput of multiple users is maximized under delay considerations by jointly optimizing the UAV trajectory and OFDMA resource allocation. It can be observed that most of the existing works focus on the throughput performance. The PHY security aspect of the UAV mobile relaying has yet been adequately investigated. In [26], secrecy rate maximization was achieved by optimal power allocation at the source and the relay. Zhang et al. added the UAV trajectory to the design problem and studied maximization of the sum secrecy rate of the UAV by jointly designing the UAV trajectory and the transmit power control [27]. However, these works rely on a strong assumption of fixed and known eavesdropper location. More recently, multiple potential eavesdroppers with imperfect knowledge of the eavesdropper locations were considered in [28], where robust design of the UAV trajectory and the transmit power for PHY security optimization was investigated. Still, how UAV-enabled secure mobile relaying benefits from buffer-aided relaying is under-investigated.
In this work, PHY security of a buffer-aided UAV mobile relaying system is studied. Specifically, a four-node system model containing a source, a destination, a UAV mobile relay with finite data buffer, and a randomly located eavesdropper is considered. The sum secrecy rate of the system is maximized through UAV relay trajectory optimization. The main contributions of this work are summarized in the following.
  • Instead of making a strong assumption of known and static eavesdropper location/channel, in this work, a randomly located eavesdropper with only the statistical information of its location known to the legitimate system is considered in the secure trajectory design for buffer-aided UAV mobile relaying.
  • By discretizing the total flight time into N equal quasi-static time slots and exploiting the buffer-aided relaying protocol, a sum secrecy rate maximization problem is formulated to find the optimal UAV relay trajectory anchor points that achieve the maximum sum secrecy rate.
  • The lower bounds of the maximal achievable rates are derived through Taylor’s expansion. The accuracy of the lower bounding technique is guaranteed by extra upper bounding the rates in the constraints of the optimization problem.
  • To make the original non-convex problem tractable, an iterative trajectory optimization scheme is proposed. Specifically, instead of optimizing the trajectory anchor points of the UAV directly, the increments from the previous iteration for each anchor point are iteratively optimized. The problem is then decomposed into successive convex approximation subproblems by invoking the rate bounds in an iterative procedure. The convergence of this trajectory iteration method is proved analytically by the squeeze principle.
Simulation results illustrate that the method of finding the optimal trajectory by iterative incrementing of the anchor points is effective and fast converging. The simulation results show that the trajectory of the UAV converges in around 10 iterations, and the performance of the system’s sum secrecy rate is significantly improved. The location of the eavesdropper affects the security performance of the system. Specifically, the eavesdropper further away from the destination is more favorable to the system’s secrecy capacity. Furthermore, it was observed that having higher maximum UAV speed is also beneficial to the improvement of the secrecy rate performance.
The remainder of this paper is organized as follows. In Section 2, we present the buffer-aided UAV relaying system model and give an initial description of the trajectory optimization problem. In Section 3, the solution approach based on decomposition and progressive convex approximation of the original non-convex problem is proposed. Three propositions are presented, and we prove analytically the trajectory iteration method converges. Simulation results are presented in Section 4, and concluding remarks are made in Section 5.

2. System Model and Problem Description

A UAV mobile relaying wireless communication system model as shown in Figure 1 is considered in this work. There are four single-antenna nodes in the model: a single source (S), a single destination (D), a UAV mobile relay (R), and an eavesdropper (E). Suppose the source and the destination are fixed in a straight line on the ground, which is designated as the d x axis in the model. The positions of the source and the destination in the two-dimensional (2D) space are denoted by ( L s , 0 ) and ( L d , 0 ) , respectively. The ground-based eavesdropper is located at ( L e , 0 ) . In this work, it is assumed that L e is a random variable, and uniformly distributed L e is considered in the subsequent analysis to demonstrate the proposed solution approach. Specifically, L e is uniformly distributed in an interval [ a , b ] , where a and b are two real valued constants with a b . This work and the proposed solution technique can be extended to scenarios with more complex geometries of the node locations. Direct communication between the source and the destination is assumed to be blocked. In addition, it is assumed that the eavesdropper cannot receive direct transmissions from the source, either. The UAV moves in the 2D geographical area at a fixed height h above the terrestrial communication system to assist communications between the source and the destination. It also raises information security issues because the ground-based eavesdropper can now receive the forwarded signals from the UAV relay.
Ignoring the taking off and landing processes, the UAV serves as a mobile relay for a finite time horizon T, and its starting and ending points are denoted as SP and EP, respectively, as shown in Figure 1. For convenience, we designate the location of SP as the origin, and the location of EP is denoted as ( L , 0 ) . As the UAV moves, the distance between the UAV and each terminal is constantly changing, and the channel gains of the corresponding communication links change accordingly. A dynamic channel model is established to reflect these changes with the UAV location. The UAV relay’s service time interval T is divided into N equally spaced time slots. Each time slot is sufficiently short to guarantee the quasi-static assumption, i.e., the wireless channels are almost constant within one time slot. The N time slots then correspond to N decision instants for the trajectory, and the UAV position ( d x [ n ] , d y [ n ] ) at the beginning of the nth time slot is used to characterize the wireless channels of the corresponding decision instant. Based on the above assumptions on the starting and ending points, there are ( d x [ 1 ] , d y [ 1 ] ) = ( 0 , 0 ) and ( d x [ N + 1 ] , d y [ N + 1 ] ) = ( L , 0 ) . The UAV relay R operates in a time-division duplex (TDD) mode, with equal time allocation for the S-R transmission and the R-D transmission. A finite data buffer of size B is equipped by the UAV relay to enable buffer-aided relaying. The channel coefficients of the S-R, R-D, and R-E channels in time slot n are denoted by h s r [ n ] , h r d [ n ] , and h r e [ n ] , respectively. It is assumed that the UAV relay is flying at a height where the path is clear of obstacles to allow total freedom in the trajectory design. This requires the UAV to fly at a relatively high altitude to be well above all the buildings. Consequently, as discussed in [13], the LOS path dominates the air-to-ground channel. The large-scale free-space path-loss is the dominating factor in h s r [ n ] , h r d [ n ] , and h r e [ n ] . The S-R channel path-loss is given as [29]
P L s r [ n ] = P L s r ( d 0 ) + 10 n ¯ log ( d s r [ n ] / d 0 ) , n = 1 , , N ,
where d 0 is the free-space reference distance, and d is the distance between the transmitter and the receiver. A path-loss exponent n ¯ = 2 is used due to the large elevation angle of the air-to-ground communication system model under consideration [13]. As a result, (1) is written as
P L s r [ n ] = C 0 + 20 log ( d s r [ n ] ) , n = 1 , , N ,
where C 0 = P L s r ( d 0 ) 20 log ( d 0 ) . Let C = 10 C 0 / 10 , the large-scale S-R channel coefficient in time slot n is approximately given as
h s r [ n ] = 1 C h 2 + ( d x [ n ] L s ) 2 + d y 2 [ n ] , n = 1 , , N .
The approximate channel coefficients of the S-R and R-D channels can be obtained similarly as
h r d [ n ] = 1 C h 2 + d x [ n ] L d 2 + d y 2 [ n ] , n = 1 , , N ,
and
h r e [ n ] = 1 C h 2 + d x [ n ] L e 2 + d y 2 [ n ] , n = 1 , , N .
As the UAV relay moves in the 2D geographic area in the air, the wireless-channel states constantly change, resulting in different h s r [ n ] , h r d [ n ] , and h r e [ n ] values in different time slots. The corresponding achievable rate and secrecy rate also change accordingly. In contrast to conventional wireless communication systems where the channel coefficients’ changes with time are mainly due to fading that has a random nature, in the UAV mobile relaying system studied in this work, based on the above assumptions of the air-to-ground channels, these changes are primarily determined by the UAV trajectory and therefore can be planned ahead, in an off-line manner. It is then possible to improve the sum achievable secrecy rate of the UAV mobile relaying system by designing a favorable UAV trajectory. The computation task of finding the optimal trajectory, as a result, can be offloaded to a ground-based computing facility with controllable communication overhead considering the limited computing power and battery lifetime of the UAV relay. This is important to the practical implementation of the proposed design technique.
Denote by R s [ n ] and R d [ n ] the maximum achievable rates of the S-R and R-D channels in the nth time slot. It is straightforward to show that
R s [ n ] = log 2 1 + p s h s r [ n ] W N 0 = log 2 1 + p s C W N 0 ( h 2 + ( d x [ n ] L s ) 2 + d y 2 [ n ] ) ,
and
R d [ n ] = log 2 1 + p r h r d [ n ] W N 0 = log 2 1 + p r C W N 0 [ h 2 + ( d x [ n ] L d ) 2 + d y 2 [ n ] ] ,
where p s and p r represent the transmit power of the source and the UAV relay, respectively, W is the communication bandwidth, and N 0 is the power spectral density of the additive white Gaussian noise (AWGN). Because only statistical information about the eavesdropper location is known to the legitimate communication system, and the UAV position keeps changing along time, the eavesdropper’s ergodic achievable rate in the nth time slot, denote by R e [ n ] , is a reasonable measure of the eavesdropper capability. By definition of ergodic rate, R e [ n ] is the expected value of the R-E rate over the distribution of the eavesdropper location.
R e [ n ] = E log 2 1 + p r h r e [ n ] W N 0 = E log 2 1 + p r C W N 0 [ h 2 + ( d x [ n ] L e ) 2 + d y 2 [ n ] ] .
The idea of PHY security is based on the notion of perfect secrecy, which requires the information leaked about the transmitted message to the eavesdropper is asymptotically zero. Maximal achievable secrecy rate, or secrecy capacity, characterizes the maximal rate at which the legitimate receiver can reliably recover the message, while the eavesdropper obtains no information about the message. The underlying idea is that the existence of the eavesdropper undermines the reliable transmission between the legitimate parties from information security perspective. The mutual information between the legitimate parties is penalized by the amount of the mutual information of the transmitter-eavesdropper link. Conditioned on the quasi-static fading in one time slot, the second-hop (R-D/R-E) channel can be modeled as a discrete memoryless AWGN wire-tap channel. The corresponding ergodic secrecy rate in the nth time slot is then given as R * [ n ] = R d [ n ] R e [ n ] + , where [ x ] + = max { x , 0 } . To improve PHY security in the trajectory design, the following optimization problem P 1 is formulated that maximizes the sum ergodic secrecy rate by finding the optimal UAV trajectory points ( d x [ n ] , d y [ n ] ) for all n = 2 , , N .
P 1 : maximize { d x [ n ] , d y [ n ] } n = 2 N n = 1 N R * [ n ]
s . t . i = 1 n R * [ n ] i = 1 n R s [ n ] + B , n = 1 , , N ;
( d x [ n + 1 ] d x [ n ] ) 2 + ( d y [ n + 1 ] d y [ n ] ) 2 v 2 , n = 1 , , N ;
where v and B represent the UAV’s maximum speed and buffer size, respectively. Equation (9a) is the information causality and buffer size constraint for buffer-aided relaying, which implies that the forwarded secrecy packets must be cached in a buffer of size no larger than B. And (9b) sets constraints on the UAV’s mobility, taking into consideration both the UAV’s starting and ending locations as well as the maximum UAV speed. Owing to the form of the objective function and the information causality constraint (9a), it can be shown that the original problem P 1 is non-convex. In the following section, we reformulate P 1 by change of variables and successive convex approximation to make the problem mathematically tractable.

3. The Progressive Convex Approximation Method for the Non-Convex Problem

In this section, firstly the design variables are changed to transform the original problem P 1 into a more friendly form. An iterative updating procedure of the trajectory anchor points based on optimization of the increments of each anchor point in each iteration is proposed. Lower bounding the rate expressions in each algorithm iteration by Taylor’s expansion results in convex subproblems which can be readily solved by standard techniques for convex optimization. This successive convex approximation procedure is shown to approach the optimal trajectory progressively with good convergence properties. The optimality gap of the proposed iterative optimization technique is shown to be very small with only a few algorithm iterations.

3.1. Change of Variables and Lower Bounding the Achievable Rates

It can be observed from Problem P 1 that optimizing the trajectory anchor points ( d x [ n ] , d y [ n ] ) directly is cumbersome due to the analytic forms of the objective function and the constraints. Alternatively, because of the assumption of linear motion between decision (anchor) points, we propose to optimize the trajectory increments for each anchor point, denoted ( η [ n ] 0 , ξ [ n ] 0 ) , in an iterative procedure. The results have shown that finding the optimal trajectory through optimizing the increments is effective and fast converging.
Assume the trajectory increment on the nth trajectory anchor point obtained in the lth algorithm iteration is { η ( l ) [ n ] , ξ ( l ) [ n ] } , n = 0 , 1 , , N . By setting an initial trajectory, e.g., the straight line segment from the source to the destination, it is straightforward to obtain the corresponding initial values of the anchor points, i.e., { ( d x ( 0 ) [ n ] , d y ( 0 ) [ n ] ) } . The trajectory anchor points for the lth algorithm iteration is updated after the ( l 1 ) th algorithm iteration as
d x ( l ) [ n ] = d x ( l 1 ) [ n ] + η ( l 1 ) [ n ] ,
d y ( l ) [ n ] = d y ( l 1 ) [ n ] + ξ ( l 1 ) [ n ] .
The achievable rate of the S-R channel in the lth algorithm iteration is calculated as
R s ( l ) [ n ] log 2 1 + p s h s r ( l ) [ n ] W N 0 ,
where the channel coefficient h s r ( l ) [ n ] is calculated based on ( d x ( l ) [ n ] , d y ( l ) [ n ] ) . Similarly, the achievable rates of the R-D and R-E channels for the current iteration, denoted R d ( l ) [ n ] and R e ( l ) [ n ] , can also be obtained. The lth iteration is then an optimization problem about the trajectory point increments { ( η ( l ) [ n ] , ξ ( l ) [ n ] ) } .
P 1 ( l ) : maximize { ( η ( l ) [ n ] , ξ ( l ) [ n ] ) } n = 1 N n = 1 N R * ( l + 1 ) [ n ]
s . t . i = 1 n R * ( l + 1 ) [ n ] i = 1 n R s ( l + 1 ) [ n ] + B , n = 1 , , N ;
( d x ( l ) [ 1 ] + η ( l ) [ 1 ] ) 2 + ( d y ( l ) [ 1 ] + ξ ( l ) [ 1 ] ) 2 v 2 ;
( d x ( l ) [ n + 1 ] + η ( l ) [ n + 1 ] d x ( l ) [ n ] η ( l ) [ n ] ) 2
+ ( d y ( l ) [ n + 1 ] + ξ ( l ) [ n + 1 ] d y ( l ) [ n ] ξ ( l ) [ n ] ) 2 v 2 , n = 1 , , N 1 ;
( d x ( l ) [ N ] + η ( l ) [ N ] L ) 2 + ( d y ( l ) [ N ] + ξ ( l ) [ N ] ) 2 v 2 .
The iterative procedure that updates { ( d x ( l ) [ n ] , d y ( l ) [ n ] ) } and { ( η ( l ) [ n ] , ξ ( l ) [ n ] ) } alternatively is conducted until some convergence criteria are met.
The subproblem P 1 ( l ) of the lth iteration obtained after the conversion is still non-convex. In order to deal with the non-convexity in the rate expressions in P 1 ( l ) , a lower bounding technique based on Taylor’s expansion is proposed. The idea of the proposed technique is illustrated through three propositions in the following.
Proposition 1.
For any trajectory increment ( η ( l ) [ n ] , ξ ( l ) [ n ] ) , the inequalities below must hold for all algorithm iterations.
R s ( l + 1 ) [ n ] R s ( l + 1 ) l b [ n ] R s ( l ) [ n ] a s ( l ) [ n ] ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 b s ( l ) [ n ] η ( l ) [ n ] c s ( l ) [ n ] ξ ( l ) [ n ] ,
R d ( l + 1 ) [ n ] R d ( l + 1 ) l b [ n ] R d ( l ) [ n ] a d ( l ) [ n ] ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 b d ( l ) [ n ] η ( l ) [ n ] c d ( l ) [ n ] ξ ( l ) [ n ] ,
where a s ( l ) [ n ] , a d ( l ) [ n ] , b s ( l ) [ n ] , b d ( l ) [ n ] , c s ( l ) [ n ] and c d ( l ) [ n ] are coefficients given in the following proof.
Proof. 
Firstly, we define the function form
f ( Z ) log 2 1 + λ A + Z ,
with constants λ > 0 and A. When Z > A , f ( Z ) is convex, i.e., f ( Z ) f ( Z 0 ) + f ( Z 0 ) ( Z Z 0 ) for any feasible Z 0 . The achievable rate of the S-R channel in the ( l + 1 ) th algorithm iteration is given as
R s ( l + 1 ) [ n ] = log 2 1 + p s h s r ( l + 1 ) [ n ] W N 0 = log 2 1 + p s C W N 0 h 2 + ( d x ( l + 1 ) [ n ] L s ) 2 + ( d y ( l + 1 ) [ n ] ) 2 ,
where d x ( l + 1 ) [ n ] = d x ( l ) [ n ] + η ( l ) [ n ] and d y ( l + 1 ) [ n ] = d y ( l ) [ n ] + ξ ( l ) [ n ] . Equation (16) can be fitted into the form of (15) with the coefficients given by
λ s = p s C W N 0 ,
A s = h 2 + ( d x ( l ) [ n ] L s ) 2 + ( d y ( l ) [ n ] ) 2 ,
Z s = ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 + 2 ( d x ( l ) [ n ] L s ) η ( l ) [ n ] + 2 d y ( l ) [ n ] ξ ( l ) [ n ] .
It is straightforward to show that Z s > A s for R s ( l + 1 ) [ n ] . Therefore, by convexity f ( Z ) f ( Z 0 ) + f ( Z 0 ) ( Z Z 0 ) . Let Z 0 = 0 , it can be shown that
f ( Z 0 ) = log 2 ( 1 + λ s A s ) ,
and
f ( Z 0 ) = λ s ln 2 ( A s + λ s ) A s .
As a result,
R s ( l + 1 ) [ n ] R s ( l ) [ n ] a s ( l ) [ n ] ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 b s ( l ) [ n ] η ( l ) [ n ] c s ( l ) [ n ] ξ ( l ) [ n ] ,
where
a s ( l ) [ n ] = λ s ln 2 ( A s + λ s ) A s ,
b s ( l ) [ n ] = 2 ( d x ( l ) [ n ] L s ) a s ( l ) [ n ] ,
c s ( l ) [ n ] = 2 d y ( l ) [ n ] a s ( l ) [ n ] .
Lower bound of the R-D channel rate R d ( l + 1 ) [ n ] in (14) can be obtained in the same way, with
a d ( l ) [ n ] = λ d ln 2 ( A d + λ d ) A d ,
b d ( l ) [ n ] = 2 ( d x ( l ) [ n ] L d ) a d ( l ) [ n ] ,
c d ( l ) [ n ] = 2 d y ( l ) [ n ] a d ( l ) [ n ] .
The coefficients λ d and A d in (19a) are given by
λ d = p r C W N 0 ,
A d = h 2 + ( d x ( l ) [ n ] L d ) 2 + ( d y ( l ) [ n ] ) 2 .
This completes the proof. □
Unlike the source and the destination, the location of the eavesdropper is assumed to be random and follows a uniform distribution. Lower bounding the eavesdropper rate therefore needs to be done in a slightly different way compared with R s and R d in Proposition 1. Instead, we give the following Proposition 2 about the ergodic eavesdropper rate that takes into consideration the distribution of the eavesdropper location.
Proposition 2.
The following inequality must hold for any trajectory increment ( η ( l ) [ n ] , ξ ( l ) [ n ] )
R e ( l + 1 ) [ n ] R e ( l + 1 ) l b [ n ] R s ( l ) [ n ] E a s ( l ) [ n ] ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 E b s ( l ) [ n ] η ( l ) [ n ] E c s ( l ) [ n ] ξ ( l ) [ n ] ,
where E a s ( l ) [ n ] , E b s ( l ) [ n ] , and E c s ( l ) [ n ] are coefficients given in the proof detailed in Appendix A.
Proof. 
Please see Appendix A. □

3.2. Convergence of the Iterative Trajectory Optimization Technique

In this subsection, we first show the accuracy of the lower bounds on the rate expressions obtained in Section 3.1, which is important to the validity of the proposed iterative optimization algorithm. To guarantee validity and accuracy of the lower bounding technique proposed in Section 3.1, the following two additional inequality constraints on the lower bounds are introduced to the optimization problem.
R d ( l + 1 ) l b [ n ] R d ( l + 1 ) [ n ] ,
R e ( l + 1 ) l b [ n ] R e ( l + 1 ) [ n ] .
Combining the above inequalities with Propositions 1 and 2, we have
R d ( l + 1 ) l b [ n ] R d ( l + 1 ) [ n ] R d ( l + 1 ) l b [ n ] ,
R e ( l + 1 ) l b [ n ] R e ( l + 1 ) [ n ] R e ( l + 1 ) l b [ n ] .
By the squeeze principle, it is straightforward that equalities must hold for any feasible solution to the optimization problem adopting the additional constraints. As a result,
R d ( l + 1 ) l b [ n ] = R d ( l + 1 ) [ n ] , R e ( l + 1 ) l b [ n ] = R e ( l + 1 ) [ n ] .
In the meantime, adding constraints (22a) and (22b) to the optimization problem with the above lower bounding technique can also guarantee convergence of the trajectory iteration. Next, we show through the following Proposition 3 convergence of the proposed iterative trajectory optimization technique.
Proposition 3.
The sum secrecy rate of the UAV relay system converges if the following inequalities must hold.
R d [ n ] R d ( l + 1 ) l b [ n ] , R e [ n ] R e ( l + 1 ) l b [ n ] .
Proof. 
For convenience, in the following proof the iteration index l and the time index n are omitted because the general results apply to all the trajectory points.
If the inequalities (22a) and (22b) must hold, then as in (23) there have R d R d l b R d and R e R e l b R e . By definition, the secrecy rate to be maximized is R * = R d R e + . Consequently, there must be R d l b R e l b R * R d l b R e l b .
In Section 3.1, it is assumed that the optimization variables are nonnegative, i.e., η 0 , ξ 0 . A positive pair ( η , ξ ) should always be found in an algorithm iteration, which leads to an improved secrecy rate until both η and ξ are zero. The secrecy rate is thus non-decreasing over the iterations.
Hence, R * is monotonically increasing and bounded with respect to the optimization variables η and ξ . The convergence of the proposed iterative optimization method is thus proved. □
Based on the above discussions, the original Problem P 1 can be accurately solved through an iterative procedure as described in Section 3.1 by solving the following constrained Problem P 2 ( l ) in each algorithm iteration until convergence.
P 2 ( l ) : maximize { ( ξ [ n ] , η [ n ] ) } n = 1 N , R d ( l + 1 ) [ n ] , R e ( l + 1 ) [ n ] n = 1 N n = 1 N R * ( l + 1 ) [ n ]
s . t . i = 1 n R * ( l + 1 ) [ i ] i = 1 n R s ( l + 1 ) l b [ i ] + B , n = 1 , , N ;
R d ( l + 1 ) [ n ] R d ( l + 1 ) l b [ n ] , n = 1 , , N ;
R e ( l + 1 ) [ n ] R e ( l + 1 ) l b [ n ] , n = 1 , , N ;
( d x ( l ) [ 1 ] + η ( l ) [ 1 ] ) 2 + ( d y ( l ) [ 1 ] + ξ ( l ) [ 1 ] ) 2 v 2 ;
( d x ( l ) [ n + 1 ] + η ( l ) [ n + 1 ] d x ( l ) [ n ] η ( l ) [ n ] ) 2
+ ( d y ( l ) [ n + 1 ] + ξ ( l ) [ n + 1 ] d y ( l ) [ n ] ξ ( l ) [ n ] ) 2 v 2 , n = 1 , , N 1 ;
( d x ( l ) [ N ] + η ( l ) [ N ] L ) 2 + ( d y ( l ) [ N ] + ξ ( l ) [ N ] ) 2 v 2 .
By combining Proposition 1 and Proposition 2, the information causality constraint (9a) in Problem P 1 becomes (24a). Constraints (24b)–(24c) and the additional variables R d ( l + 1 ) [ n ] , R e ( l + 1 ) [ n ] n = 1 N are added to the optimization problem to guarantee validity and convergence of the proposed lower bounding solution approach.
It can be shown that the support of the variables is a convex set and the second-order derivatives of all function and constraints are positive semidefinite. As a result, Problem P 2 ( l ) for the lth iteration is a convex problem, which can be readily solved by standard convex optimization solvers such as CVX [30].
The proposed iterative UAV trajectory optimization algorithm for secure UAV mobile relaying is summarized in Algorithm 1.
Algorithm 1 The iterative UAV trajectory optimization algorithm
1:
Initialize the UAV relay’s trajectory { ( d x [ n ] , d y [ n ] ) } n = 1 N + 1 , with fixed starting and ending points ( d x [ 1 ] , d y [ 1 ] ) = ( 0 , 0 ) and ( d x [ N + 1 ] , d y [ N + 1 ] ) = ( L , 0 ) . Let the initial iteration count l = 0 .
2:
repeat
3:
Find the optimal solution { η ( l ) [ n ] , ξ ( l ) [ n ] } n = 1 N to Problem P 2 ( l ) .
4:
Update the trajectory anchor points as d x ( l + 1 ) [ n ] = d x ( l ) [ n ] + η ( l ) [ n ] and d y ( l + 1 ) [ n ] = d y ( l ) [ n ] + ξ ( l ) [ n ] .
5:
Set l = l + 1 .
6:
Until terminate at convergence or a predefined maximum number of iterations is reached.

4. Numerical Results

In this section, simulation results are presented to verify the proposed iterative trajectory optimization technique for secure buffer-aided UAV mobile relaying. The UAV-assisted mobile relaying system model as shown in Figure 1 is adopted. The starting point SP and the end point EP of the trajectory are designated as the origin and ( 0 , L ) , respectively. The source and the destination are located at fixed points ( L s , 0 ) and ( L d , 0 ) on the horizontal axis. The eavesdropper location follows a uniform distribution between [ a , b ] on the horizontal axis. The UAV relay moves in the upper half-plane of the 2D space, i.e., d y > 0 , at height h above the terrestrial communication system. Simulation parameters are summarized in the following Table 1.
Among them, v , a , b are adjusted in the simulations to observe their impacts on the system performance.

4.1. Convergence of the Secrecy Rate Performance

First of all, we investigated how the average ergodic secrecy rate of the buffer-aided UAV mobile relaying system achieved by the proposed iterative optimization scheme changes with the number of trajectory iterations and the UAV relay’s maximum speed. The boundaries of the uniformly distributed eavesdropper location were a = 300 m and b = 500 m. The total flight time was set to 80 s. Several maximum UAV speed values v = 16 m/s, v = 18 m/s, and v = 20 m/s were examined. The simulation results (average secrecy rate versus iteration number) are shown in Figure 2. The average secrecy rate curve of a system without trajectory optimization is shown as the solid line without marks in the figure to provide a performance benchmark.
It can be observed from Figure 2 that as the proposed trajectory optimization algorithm iterates, the overall average secrecy rate increases. The performance achieved by the proposed algorithm converged very fast in the first two to three iterations, and became levelled off in less than 10 iterations for all the scenarios examined. The performance achieved by three algorithm iterations was over 99 % of that at convergence (10 iterations). Because the subproblem in each iteration is strictly convex, which can be readily solved by a classic convex optimization algorithm, the complexity of each algorithm iteration is almost fixed. The overall complexity of the proposed iterative optimization algorithm is mainly determined by how fast the iterative procedure converges. The proposed iterative algorithm is therefore practically desirable because the numerical study revealed that near optimal solutions can always be obtained in a small number of (around 3) iterations. The fast convergence property then indicates relatively low complexity of the proposed algorithm in practical implementations. This is desirable from both theoretic study and practical system design perspectives. It is also observed that higher maximum UAV speed is beneficial to the system’s overall secrecy rate. Increasing v from 16 m/s to 20 m/s resulted in over 9 % improvement to the average secrecy rate. This is because the greater the maximum UAV speed, the less constrained the trajectory. A more favorable trajectory that achieves greater secrecy rate can be obtained accordingly. Obviously, the greater the number of iterations, the closer the trajectory to the optimal. That means as the trajectory is updated in the proposed iterative procedure, it is gradually optimized and eventually converges to the optimal trajectory.
How the location of the eavesdropper impacts the overall average secrecy rate performance was studied by examining different boundary values a and b for the uniform distribution. Maximum UAV speed v = 20 m/s and total flight time T = 80 s were used in this part of simulation. Simulation results for 5 different [ a , b ] combinations are presented in Figure 3.
For all the scenarios examined, the overall average secrecy rate increases as the trajectory optimization algorithm iterates, and fast convergence as in Figure 2 can also be observed. The eavesdropper location further away from the destination (closer to the source) is shown to be beneficial to the overall average secrecy rate performance. This is mainly because when the first hop communication is completely obstructed on the ground, the forwarded signal from the UAV relay is the only source of information leakage to the eavesdropper. It is, therefore, not desirable to have an eavesdropper closer to the destination such that the R-D and R-E channels are more correlated, which violates the basic principle for PHY security design.

4.2. Trajectory Regarding Iteration Number and Eavesdropper Location Distribution

We next present the obtained UAV trajectory in the 2D space to show how the optimized trajectory is approached as the number of algorithm iterations increases. The impact of eavesdropper location on the optimized UAV trajectory was also investigated. In this part, the total flight time was set to T = 80 s, and the maximum UAV speed was v = 16 m/s. An eavesdropper uniformly distributed between [ 300 , 500 ] on the d x axis was considered to demonstrate the iterative update process of the UAV trajectory. It is observed in Figure 4 that as the proposed algorithm iterates, the UAV’s trajectory gradually converges. Convergence of the trajectory was achieved at about 10 iterations, which validates the effectiveness of the proposed algorithm in following an optimized trajectory.
In Figure 5, the optimized UAV trajectories obtained by 12 algorithm iterations are presented for three groups of eavesdropper locations. The selection of 12 iterations was based on the authors’ observations from the numerical studies (as shown in Figure 2 and Figure 3), which guaranteed to give the converged trajectory. It can be observed that when the eavesdropper location is further away from the destination (closer to the source), the UAV’s optimized trajectory has a shorter total flight distance. That means with fixed flight time, if the eavesdropper is expected to be closer to the destination, the UAV needs to fly faster to create a trajectory that can avoid potential eavesdropping as much as possible. As a result, having an eavesdropper far away from the destination is beneficial to both the sum secrecy rate performance and the energy efficiency.

5. Conclusions

The trajectory optimization problem for PHY security of a buffer-aided UAV mobile relaying system with a randomly located eavesdropper has been studied. The problem of optimizing the anchor points of the discretized piecewise linear trajectory for maximized sum secrecy rate under information causality and maximum UAV speed constraints has been formulated and shown to be non-convex. By changing the optimization variables to the iterative trajectory increments on each anchor point and invoking a lower bounding technique for the achievable rates, the problem has been reformulated and decomposed into a series of convex optimization subproblems through an iterative procedure. Based on the squeeze principle, convergence of the iterative optimization approach has been achieved by adding extra upper bound constraints to the achievable rates. This successive convex approximation procedure is shown to approach the optimal trajectory progressively with good convergence property. The optimality gap between the approximate convex problem and the original non-convex problem has been shown to be very small with only a few (about 3) iterations. The complexity of the proposed iterative optimization algorithm is thus practically low. The optimal PHY secure UAV relay trajectory has been obtained through the iterative procedure after a few iterations. It has been observed from the simulation results that higher maximum UAV speed would improve the sum secrecy rate performance because it gives higher flexibility to the trajectory. The simulation results have also revealed that an eavesdropper further away from the destination is beneficial to both the sum secrecy rate performance and the UAV relay’s energy efficiency.

Author Contributions

Conceptualization, N.W.; Formal analysis, L.S.; Funding acquisition, N.W.; Investigation, L.S.; Methodology, L.S., X.J., X.M. and L.C.; Project administration, X.J.; Supervision, N.W., X.M. and L.C.; Validation, X.J.;Writing–original draft, L.S. and N.W.; Writing–review and editing, N.W., X.J., X.M. and L.C.

Funding

This research was funded in part by the National Science Foundation of China under Grant no. 61771431, and by the National Science and Technology Major Project under grant No. 2017ZX03001001. The APC was funded by the National Science Foundation of China under Grant no. 61771431.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

In this Appendix, we prove that the ergodic eavesdropper rate is lower bounded as shown in Proposition 2.
Proof. 
By definition, the ergodic achievable rate of the R-E channel is given by
R e ( l + 1 ) [ n ] = E log 2 1 + p r h r e ( l + 1 ) [ n ] W N 0 = E log 2 1 + p r C W N 0 [ h 2 + ( d x ( l + 1 ) [ n ] L e ) 2 + ( d y ( l + 1 ) [ n ] ) 2 ] ,
where d x ( l + 1 ) [ n ] = d x ( l ) [ n ] + η ( l ) [ n ] and d y ( l + 1 ) [ n ] = d y ( l ) [ n ] + ξ ( l ) [ n ] according to the iterative trajectory update procedure. As in Proposition 1, the above Equation (A1) can be simplified into the form
R e ( l + 1 ) [ n ] = E log 2 1 + λ A + Z ,
where the coefficients are given as
λ e = p r C σ 2 ,
A e = h 2 + ( d x ( l ) [ n ] L e ) 2 + ( d y ( l ) [ n ] ) 2 ,
Z e = ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 + 2 ( d x ( l ) [ n ] L e ) η ( l ) [ n ] + 2 d y ( l ) [ n ] ξ ( l ) [ n ] .
Similar to Proposition 1, we have
R e ( l + 1 ) [ n ] R e ( l ) [ n ] E a e ( l ) [ n ] ( η ( l ) [ n ] ) 2 + ( ξ ( l ) [ n ] ) 2 E b e ( l ) [ n ] η ( l ) [ n ] E c e ( l ) [ n ] ξ ( l ) [ n ] .
Because of the expectation operation, the analytic forms of the coefficients E a e ( l ) [ n ] , E b e ( l ) [ n ] and E c e ( l ) [ n ] are complex but still can be obtained by commercial math tools such as Mathematica.
This completes the proof. □

References

  1. Pinkney, M.F.J.; Hampel, D.; DiPierro, S. Unmanned aerial vehicle (UAV) communications relay. In Proceedings of the IEEE Military Communications Conference (MILCOM), McLean, VA, USA, 24 October 1996; Volume 1, pp. 47–51. [Google Scholar]
  2. Fan, R.; Cui, J.; Jin, S.; Yang, K.; An, J. Optimal node placement and resource allocation for UAV relaying network. IEEE Commun. Lett. 2018, 22, 808–811. [Google Scholar] [CrossRef]
  3. Li, Y.; Feng, G.; Ghasemiahmadi, M.; Cai, L. Power allocation and 3-D placement for floating relay supporting indoor communications. IEEE Trans. Mob. Comput. 2019, 18, 618–631. [Google Scholar] [CrossRef]
  4. Wang, N.; Hossain, E.; Bhargava, V.K. Backhauling 5G small cells: A radio resource management perspective. IEEE Wirel. Commun. 2015, 22, 41–49. [Google Scholar] [CrossRef]
  5. Hu, L.; Wen, H.; Wu, B.; Tang, J.; Pan, F. Adaptive secure transmission for physical layer security in cooperative wireless networks. IEEE Commun. Lett. 2017, 21, 524–527. [Google Scholar] [CrossRef]
  6. Liu, Y.; Wang, Q.; Xu, J.; Yang, Y. Physical layer security transmission technology of relay broadcasting channel. In Proceedings of the IEEE International Symposium on Wireless Personal Multimedia Communications (WPMC), Shenzhen, China, 14–16 November 2016; pp. 406–410. [Google Scholar]
  7. Poor, H.V.; Schaefer, R.F. Wireless physical layer security. Proc. Natl. Acad. Sci. USA 2017, 114, 19–26. [Google Scholar] [CrossRef] [PubMed]
  8. Wyner, A.D. The wire-tap channel. Bell Labs Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  9. Benmimoune, A.; Kadoch, M. Relay technology for 5G networks and IoT applications. In Internet of Things: Novel Advances and Envisioned Applications; Springer International Publishing: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  10. Lai, L.; Gamal, H.E. The relay-eavesdropper channel: Cooperation for secrecy. IEEE Trans. Inf. Theory 2008, 54, 4005–4019. [Google Scholar] [CrossRef]
  11. Dong, L.; Han, Z.; Petropulu, A.P.; Poor, H.V. Improving wireless physical layer security via cooperating relays. IEEE Trans. Signal Process. 2010, 58, 1875–1888. [Google Scholar] [CrossRef]
  12. Wang, N.; Zhang, N.; Gulliver, T.A. Cooperative key agreement for wireless networking: Key rates and practical protocol design. IEEE Trans. Inf. Forensics Secur. 2014, 9, 272–284. [Google Scholar] [CrossRef]
  13. Azari, M.M.; Rosas, F.; Chen, K.-C.; Pollin, S. Joint sum-rate and power gain analysis of an aerial base station. In Proceedings of the IEEE GLOBECOM 2016 Workshops, Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  14. Zeng, Y.; Zhang, R.; Lim, T.J. Wireless communications with unmanned aerial vehicles: Opportunities and challenges. IEEE Commun. Mag. 2016, 54, 36–42. [Google Scholar] [CrossRef]
  15. Anazawa, K.; Li, P.; Miyazaki, T.; Guo, S. Trajectory and data planning for mobile relay to enable efficient Internet access after disasters. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  16. Wu, Q.; Mei, W.; Zhang, R. Safeguarding wireless networks with UAV: A physical layer security perspective. IEEE Wirel. Commun. 2019. submitted. Available online: https://arxiv.org/pdf/1902.02472.pdf (accessed on 1 August 2019).
  17. Zlatanov, N.; Ikhlef, A.; Islam, T.; Schober, R. Buffer-aided cooperative communications: Opportunities and challenges. IEEE Commun. Mag. 2014, 52, 146–153. [Google Scholar] [CrossRef]
  18. Wang, R.; Lau, V.K.N.; Huang, H. Opportunistic buffered decode-wait-and-forward (OBDWF) protocol for mobile wireless relay networks. IEEE Trans. Wirel. Commun. 2011, 10, 1224–1231. [Google Scholar] [CrossRef]
  19. Wang, N.; Gulliver, T.A. Queue-aware transmission scheduling for cooperative wireless communications. IEEE Trans. Wirel. Commun. 2015, 63, 1149–1161. [Google Scholar] [CrossRef]
  20. Wang, N.; Gulliver, T.A. Distributed queue-aware relay node selection for cooperative wireless networks via vickrey auction game. IEEE Wirel. Commun. Lett. 2015, 4, 257–260. [Google Scholar] [CrossRef]
  21. Pearre, B.; Brown, T.X. Model-free trajectory optimization for wireless data ferries among multiple sources. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Miami, FL, USA, 6–10 December 2010; pp. 1793–1798. [Google Scholar]
  22. Zeng, Y.; Zhang, R.; Lim, T.J. Throughput maximization for UAV-enabled mobile relaying systems. IEEE Trans. Commun. 2016, 64, 4983–4996. [Google Scholar] [CrossRef]
  23. Xie, L.; Xu, J.; Zhang, R. Throughput maximization for UAV-enabled wireless powered communication networks. In Proceedings of the IEEE 87th Vehicular Technology Conference, Porto, Portugal, 3–6 June 2018. [Google Scholar]
  24. Jiang, X.; Wu, Z.; Yin, Z.; Yang, Z. Power and trajectory optimization for UAV-enabled amplify-and-forward relay networks. IEEE Access 2018, 6, 48688–48696. [Google Scholar] [CrossRef]
  25. Wu, Q.; Zhang, R. Common throughput maximization in UAV-enabled OFDMA systems with delay consideration. IEEE Trans. Commun. 2018, 66, 6614–6627. [Google Scholar] [CrossRef]
  26. Wang, Q.; Chen, Z.; Mei, W.; Fang, J. Improving physical layer security using UAV-enabled mobile relaying. IEEE Wirel. Commun. Lett. 2017, 6, 310–313. [Google Scholar] [CrossRef]
  27. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV communications via trajectory optimization. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  28. Cui, M.; Zhang, G.; Wu, Q.; Ng, D.W.-K. Robust trajectory and transmit power design for secure UAV communications. IEEE Trans. Veh. Technol. 2018, 67, 9042–9046. [Google Scholar] [CrossRef]
  29. Gibson, D.J. The Communications Handbook; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
  30. Grant, M.; Boyd, S. CVX: MATLAB Software for Disciplined Convex Programming, Version 2.1. Available online: http://cvxr.com/cvx (accessed on 2 March 2016).
Figure 1. The UAV-enabled mobile relaying system model.
Figure 1. The UAV-enabled mobile relaying system model.
Sensors 19 03442 g001
Figure 2. Convergence of the average secrecy rate performance with different maximum UAV speed values. The total flight time is T = 80 s. The proposed algorithm exhibits fast convergence property in all the scenarios examined. Higher maximum UAV speed results in higher average secrecy rate performance.
Figure 2. Convergence of the average secrecy rate performance with different maximum UAV speed values. The total flight time is T = 80 s. The proposed algorithm exhibits fast convergence property in all the scenarios examined. Higher maximum UAV speed results in higher average secrecy rate performance.
Sensors 19 03442 g002
Figure 3. Average secrecy rate performance for different distribution boundaries of the eavesdropper location with maximum UAV speed v = 20 m/s and total flight time T = 80 s. The eavesdropper located further away from the destination is shown to be more favorable to the overall average secrecy rate performance.
Figure 3. Average secrecy rate performance for different distribution boundaries of the eavesdropper location with maximum UAV speed v = 20 m/s and total flight time T = 80 s. The eavesdropper located further away from the destination is shown to be more favorable to the overall average secrecy rate performance.
Sensors 19 03442 g003
Figure 4. The iterative updates of the UAV trajectory with maximum UAV speed v = 16 m/s and total flight time T = 80 s. The eavesdropper location is uniformly distributed between [ 300 , 500 ] on the d x axis. The UAV’s trajectory converges in about 10 iterations.
Figure 4. The iterative updates of the UAV trajectory with maximum UAV speed v = 16 m/s and total flight time T = 80 s. The eavesdropper location is uniformly distributed between [ 300 , 500 ] on the d x axis. The UAV’s trajectory converges in about 10 iterations.
Sensors 19 03442 g004
Figure 5. The optimized trajectories for different eavesdropper locations with maximum UAV speed v = 16 m/s and total flight T = 80 s. It is observed that when the eavesdropper location is further away from the destination, the UAV’s optimized trajectory has a shorter total flight distance, which is both spectrum-efficient and energy-efficient.
Figure 5. The optimized trajectories for different eavesdropper locations with maximum UAV speed v = 16 m/s and total flight T = 80 s. It is observed that when the eavesdropper location is further away from the destination, the UAV’s optimized trajectory has a shorter total flight distance, which is both spectrum-efficient and energy-efficient.
Sensors 19 03442 g005
Table 1. Values of the System Setting Parameters for Simulation.
Table 1. Values of the System Setting Parameters for Simulation.
ParameterValue
Height of UAV trajectory h100 m
SP-to-EP distance L100 m
Location of the source L s 100 m
Location of the destination L d 900 m
Transmit power of the source and the relay p s , p r 20 dBm
Power spectral density of AWGN−174 dBm/Hz
Bandwidth10 MHz
Total flight time T80 s
Adjustable parameters v , a , b

Share and Cite

MDPI and ACS Style

Shen, L.; Wang, N.; Ji, X.; Mu, X.; Cai, L. Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying. Sensors 2019, 19, 3442. https://doi.org/10.3390/s19153442

AMA Style

Shen L, Wang N, Ji X, Mu X, Cai L. Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying. Sensors. 2019; 19(15):3442. https://doi.org/10.3390/s19153442

Chicago/Turabian Style

Shen, Lingfeng, Ning Wang, Xiang Ji, Xiaomin Mu, and Lin Cai. 2019. "Iterative Trajectory Optimization for Physical-Layer Secure Buffer-Aided UAV Mobile Relaying" Sensors 19, no. 15: 3442. https://doi.org/10.3390/s19153442

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop