Next Article in Journal
Auditing Accessibility of Pavements and Points of Interest in Urban Areas: The ‘Seek & Go’ Tool
Previous Article in Journal
A Nonlinear Optimization Design Algorithm for Nearly Linear-Phase 2D IIR Digital Filters
Previous Article in Special Issue
Extracting Communication, Ranging and Test Waveforms with Regularized Timing from the Chaotic Lorenz System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resource Allocation of UAV-Assisted IoT Node Secure Communication System

1
School of Electronics and Information Engineering, South China University of Technology, Guangzhou 510640, China
2
School of Microelectronics, South China University of Technology, Guangzhou 511442, China
3
Institut d’Electronique et des Technologies duNumeRique(IETR), University of Nantes, 44306 Nantes, France
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Signals 2023, 4(3), 591-603; https://doi.org/10.3390/signals4030031
Submission received: 23 April 2023 / Revised: 11 August 2023 / Accepted: 17 August 2023 / Published: 21 August 2023
(This article belongs to the Special Issue Advances in Wireless Sensor Network Signal Processing)

Abstract

:
To balance the information security and energy harvest for massive internet-of-things (IoT) devices, an unmanned aerial vehicle (UAV)–assisted secure communication model is proposed in this paper. We extend the secure transmission model with physical layer security (PLS) to simultaneous wireless information and power transfer (SWIPT) technology and optimize the UAV trajectory, transmission power, and power splitting ratio (PSR). The nonconvex object function is decomposed into three subproblems. Then a robust iterative suboptimal algorithm based on the block coordinate descent (BCD) method is proposed to solve the subproblems. Numerical simulation results are provided to show the effectiveness of the proposed method. These results clearly illustrate that our resource allocation schemes surpass baseline schemes in terms of both transmit power and ratio of harvesting energy, while maintaining an approximately instantaneous secrecy rate.

1. Introduction

With the development of 5G, internet-of-things (IoT) devices are becoming more and more popular. Due to the limited battery energy of ground IoT devices [1] and the high mobility of the unmanned aerial vehicle (UAV), simultaneous wireless information and power transfer (SWIPT) technology is exploited in UAV-assisted wireless communication for IoT ground devices [2,3,4]. In [5], the authors propose to exploit the UAV as a mobile relay to solve the end-to-end cooperative throughput maximization problem with SWIPT. In [2], the authors consider the UAV-assisted SWIPT communication system with a nonlinear energy harvesting model, which proves that the power splitting (PS)–based system is superior to the time switching (TS)–based system.
On the other hand, the openness of air-to-ground wireless channels increases the security risk of information transmissions for a UAV-assisted system [4]. The traditional information encryption technology is complex and energy-consuming, which is not suitable for a UAV communication system. Therefore, the physical layer security (PLS) technology is introduced as an improvement technology [4,6]. The PLS technology uses the randomness of wireless media to protect information transmission from eavesdropping, which is considered to be a promising method to realize confidentiality in wireless communication [7]. At the same time, the technique inspired by the principles of blockchain for maintaining security in UAV communication networks under the context of surveillance is prompted [8], through corroborating information about events from different sources and using a secure asymmetric encryption with a preshared list of official UAVs to improve reliability effectively and efficiently.
Nowadays, many papers start to investigate the combination of the UAV-assisted communication, SWIPT and PLS. In [9], two collaborating UAVs with SWIPT technology are considered, one UAV transmits confidential information to the destination node, and the other sends jamming signals to prevent the other nodes from eavesdropping. By jointly optimizing the transmission power and trajectory of UAVs, and power splitting ratio (PSR), researchers formulate an average secrecy rate maximization problem. However, it is complex to safely transmit information to a node by two UAVs, and the system only cares about the confidentiality of one node by two UAVs. In order to avoid the inevitable eavesdroppers, in [10], the authors study the problem of secrecy rate maximum by jointly optimizing the trajectory and transmit power of a UAV with an energy receiver and information receiver, respectively, which is difficult to realize due to the limited size of IoT devices.
Though a lot of papers have studied UAV-assisted wireless energy transmission [9,11] and secure wireless communication [12] with different perspectives, UAV-assisted energy harvesting or secure wireless communication is studied independently. Therefore, a UAV-assisted secure communication system for IoT nodes is considered in this paper. There are two kinds of IoT nodes: one is the destination node, which can receive the information and energy by SWIPT, and the other is the energy node, which can only receive the energy. The information transmission security of the destination node is ensured by joint trajectory and resource allocation with a PLS technique. We extend the secure transmission model in [12] to SWIPT technology and optimize the PSR at the nodes. In order to enhance the information security [13], some restrictions are added on the information threshold and energy harvesting threshold of nodes. The challenge of the proposed model is to maximize the information security transmission capacity while balancing the energy storage capacity by optimizing the UAV trajectory, transmission power, and PSR. The object function is nonconvex due to the coupling of multiple variables. Consequently, the objective function is decomposed into three subproblems and solved by an iterative algorithm based on block coordinate descent (BCD) and successive convex approximation (SCA).
In this article, we will introduce the UAV-assisted system model and problem formulation in Section 2. The proposed optimization algorithm, including optimizing transmit power, trajectory, PSR, etc., is presented in Section 3. Then numerical simulation results are provided in Section 4 to show the effectiveness of our proposed method. Finally, we conclude this paper in Section 5.

2. System Model and Problem Formulation

2.1. System Model

As shown in Figure 1, three IoT nodes (one destination node, D N , and two energy nodes, E N 1 , E N 2 ) equipped with SWIPT technology are considered. The UAV flies from the initial position to the final position and transmits confidential information to D N by the main link ( S D ) . Meanwhile, all nodes could harvest energy. We maximize the information security transmission capacity by optimizing the trajectory and transmission power of the UAV, the PSR of the nodes. The power of the information and the harvested energy of E N 1 , E N 2 are constrained to improve the information security and balance energy collection.
The horizon coordinates of D N are given by w S D = x S D , y S D T R 2 × 1 , and E N is located at w S E , k = x S E , k , y S E , k T R 2 × 1 , k K = 1 , 2 . The UAV is assumed to fly at an allowable relatively fixed height H. Its flight time is T, so its time-varying coordinates are expressed as q [ t ] = [ x ( t ) , y ( t ) ] T R 2 × 1 . The take-off time and landing time are neglected. The initial position q 0 and final position q F are supposed to be known [4]. The flight time T is divided into N time slots; i.e., t = n δ t , n = 1 , , N , δ t is the duration of each time slot. The maximum flight distance of the UAV in each time slot is S m a x . Let the PSR be denoted by  ξ [ n ] , where 0 ξ [ n ] 1 [14]. The constraints are as follows:
q [ 1 ] = q 0 q [ N + 1 ] = q F q [ n + 1 ] q [ n ] 2 S max 2 , n = { 1 , , N }
Motivated by [9,10], we adopt a channel model in which both line-of-sight (LoS) and non-LoS propagations are considered. By averaging the surrounding environments and small-scale fading, the expected channel power of the UAV-ground (UG) link is [9]
h u g ( t ) = β ¯ d u g ( t ) α
where d u g ( t ) denotes the time-varying distance between the UAV and the ground node g. Additionally, u { S } , g { D , E } , α denotes the path-loss exponent ( 2 α 4 ) . Then β ¯ is the environmental constants following homogeneity. Let p [ n ] denote the UAV transmission power in the nth time slot, and the transmit power constraint is
1 N n = 1 N p [ n ] P ¯ 0 p [ n ] P max
where the average power is P ¯ and the maximum power is P max , P ¯ P max . The harvested energies of E N s and D N are denoted by E E H , k [ n ] and E S D [ n ] , respectively:
E E H , k [ n ] = ( 1 ξ [ n ] ) η h E H , k [ n ] p [ n ] = ( 1 ξ [ n ] ) η p [ n ] β ¯ q [ n ] w S E , k 2 + H 2 α 2 , k E S D [ n ] = ( 1 ξ [ n ] ) η h S D [ n ] p [ n ] = ( 1 ξ [ n ] ) η p [ n ] β ¯ q [ n ] w S D 2 + H 2 α 2
where 0 < η 1 represents the energy conversion efficiency of E N . The harvested information of E N s is denoted by
E I T , k [ n ] = ξ [ n ] η h E H , k [ n ] p [ n ] = ξ [ n ] η p [ n ] β ¯ q [ n ] w S E , k 2 + H 2 α 2 , k
Motivated by [10], the achievable information rates from the UAV to E N s and from the UAV to D N in bits/second/Hertz (bps/Hz) are denoted by R S E , k [ n ] and R S D [ n ] , respectively. Additionally, δ 2 represents the noise power.
R S E , k [ n ] = log 2 1 + ξ [ n ] β ¯ p [ n ] δ 2 q [ n ] w S E , k 2 + H 2 α 2 , k R S D [ n ] = log 2 1 + ξ [ n ] β ¯ p [ n ] δ 2 q [ n ] w S D 2 + H 2 α 2 ,
Hence, the secrecy rate [4] of D N is given as (7), where [ x ] + = Δ max { x , 0 } .
R sec [ n ] = R S D [ n ] max k K R S E , k [ n ] +

2.2. Problem Formulation

In this work, a conjoint optimization of the UAV trajectory, transmission power allocations, and PSR is adopted to maximize the secrecy rate within a limited flight time T. We assume that the average and maximum power constraints, mobility constraints, initial and final position constraints of the UAV, and energy harvesting constraints of each EN are satisfied. Let P = Δ [ p [ 1 ] , p [ N ] ] T , Q = Δ [ q [ 1 ] , q [ N ] ] T , Ξ = Δ [ ξ [ 1 ] , ξ [ N ] ] T . Thus, the maximum of the secret rate of D N can be expressed as
P 1 : max P , Q , Ξ n = 1 N R S D [ n ] max k K R S E , k [ n ] + s . t . C 1 : 1 N n = 1 N E E H , k [ n ] E min , n C 2 : 0 ξ [ n ] 1 C 3 : q [ 1 ] = q 0 , q [ N + 1 ] = q F C 4 : 1 N n = 1 N p [ n ] P ¯ , n C 5 : 0 p [ n ] P max , n C 6 : 1 N n = 1 N E S D [ n ] E min , n C 7 : q [ n + 1 ] q [ n ] S max , n = { 1 , , N } C 8 : 1 N n = 1 N E I T , k [ n ] E s e n
Here, the constant E m i n is the minimum average harvested energy. C 1 and C 6 have imposed basic constraints on Emin, which enable all nodes to collect energy. The constant E s e n is the minimum energy required for decoding. C 8 prevents E N s from decoding the information transmitted to the main link ( S D ). The information threshold E s e n is smaller than the power threshold E m i n . C2–C5 and C7 are the formulations defined in Section 2.1.

3. Proposed Optimization Algorithm

The objective function in P 1 is nonsmooth at zero due to [ . ] + . Therefore, Lemma 1 is proposed to solve it.
Lemma 1.
P 1 is equivalent to P 1.1 [15] given by
P 1.1 : max P , Q , Ξ n = 1 N R S D [ n ] max k K R S E , k [ n ] s . t . C 1 C 8
However, P 1.1 is still a nonconvex problem due to the coupling of multiple variables. Hence, a three-stage alternating optimization algorithm is proposed to solve it. The details are as follows.

3.1. Optimal Transmit Power of UAV

With the given feasible UAV trajectory Q and PSR, the UAV transmit power optimization problem P 1.1 is given as
P 2 : max P n = 1 N R S D [ n ] max k K R S E , k [ n ] s . t . C 1 , C 4 , C 5 , C 6 a n d C 8
Let a n = ξ [ n ] β ¯ δ 2 q [ n ] w S D 2 + H 2 α 2 , b n , k = ξ [ n ] β ¯ δ 2 q [ n ] w S E , k 2 + H 2 α 2 . Then, the objective function is simplified to
R sec [ n ] = log 2 1 + a n p [ n ] log 2 1 + b n , k * p [ n ]
where b n , k * = arg max k K b n , k . Obviously, if b n , k * > a n , it is necessary to let the optimized power p o p t [ n ] = 0 to prevent information leakage. Additionally, if b n , k * a n , the information sent by the UAV to D N will not be decoded. Therefore, P 2 becomes a convex optimization problem, which satisfies Slater’s condition and could be solved by the Lagrange duality method. Then the solution of P 2 is given as
p opt [ n ] = min p * [ n ] , P max a n b n , k *     0 a n < b n , k *
The closed-form expression of the optimized power is
p * [ n ] = 1 2 b n , k * 1 2 a n 2 + 1 ln 2 r n , k * 1 b n , k * 1 a n 1 2 b n , k * + 1 2 a n
where r n , k * = η N ξ [ n ] ( 1 ξ [ n ] ) δ 2 ω n a n + f n , k * b n , k * μ n N + λ n , k * η b n , k * δ 2 N , and μ n 0 , ω n 0 , λ n , k * 0 , f n , k * 0 are the the Lagrange multipliers associated with the constraints C 5 , C 6 , C 8 , and C 1 , respectively. Finally, we update the Lagrange multipliers with the subgradient method as follows: y
λ k ( i ) = λ k ( i 1 ) τ 1 E s e n 1 N n = 1 N E I T , k [ n ] + , k μ ( i ) = μ ( i 1 ) τ 2 P ¯ 1 N n = 1 N p [ n ] + ω ( i ) = ω ( i 1 ) τ 3 1 N n = 1 N E S D [ n ] E min + f ( i ) k = f k ( i 1 ) τ 4 1 N n = 1 N E E H , k [ n ] E min + , k

3.2. Optimal UAV Trajectory

For a given UAV power allocation and PSR, the UAV trajectory optimization problem P 1.1 is given as
P 3 : max Q n = 1 N R S D [ n ] max k K R S E , k [ n ] s . t . C 1 , C 3 , C 6 , C 7 , a n d C 8
In C 1 and C 6 , we note that the energy function is a convex function for q [ n ] w S E , k 2 and q [ n ] w S D 2 . Let q r [ n ] , n denote the given UAV trajectory in the rth iteration; by a first-order Taylor expansion of E E H , k [ n ] and E S D [ n ] at q r [ n ] w S E , k 2 and q r [ n ] w S D 2 , respectively, we can have the minimum value E E H , k l b [ n ] and E S D l b [ n ] for E E H , k [ n ] and E S D [ n ] , respectively. Similarly, we expand R S D at q r [ n ] w S D 2 to obtain the minimum value R S D l b .
Then, we introduce a slack variable τ [ n ] 0 and R S E , k [ n ] 0 to the objective function and the minimum value of q [ n ] w S E , k 2 , respectively. Finally, P 3 is transformed into a convex optimization problem P 3.1 , which can be solved by standard convex optimization tools, such as CVX.
P 3.1 : max Q , τ [ n ] n = 1 N τ [ n ] s . t . C 3 , C 7 , E s e n 1 N n = 1 N ξ [ n ] η p [ n ] β ¯ S S E , k [ n ] + H 2 α 2 , n , k 1 N n = 1 N E E H , k l b [ n ] E m i n , 1 N n = 1 N E S D l b [ n ] E m i n R S D l b [ n ] log 2 1 + ξ [ n ] β ¯ p [ n ] δ 2 S S E , k [ n ] + H 2 α 2 τ [ n ] , n S S E , k [ n ] 2 q r [ n ] w S E , k T q [ n ] q r [ n ] + q r [ n ] w S E , k 2 , n

3.3. Optimal Power Splitting Ratio

To optimize the PSR with the given workable transmit power and trajectory of the UAV, the problem P 1.1 becomes
P 4 : max Ξ n = 1 N R S D [ n ] max k K R S E , k [ n ] s . t . C 1 , C 2 , C 6 , C 8
Let c n = p [ n ] β ¯ δ 2 q [ n ] w S D 2 + H 2 α 2 , d n , k = p [ n ] β ¯ δ 2 q [ n ] w S E , k 2 + H 2 α 2 .
Then the objective function is given by
R sec [ n ] = log 2 1 + c n ξ [ n ] log 2 1 + d n , k * ξ [ n ]
where d n , k * = arg max k K d n , k . Similarly, with P 2 , only if d n , k * c n , the confidential information cannot be decoded. Then P 4 can be solved by a Lagrangian dual method. While d n , k * > c n , we set ξ [ n ] = 0 to prevent E N s decoding. Therefore, the solution of P 4 is given as  
ξ opt [ n ] = min ξ * [ n ] , 1 c n d n , k *     0 c n < d n , k *
  By the same method as P 2 , we can have
ξ * [ n ] = 1 2 d n , k * 1 2 c n 2 + N η T δ 2 ln 2 1 d n , k * 1 c n 1 2 d n , k * + 1 2 c n
where T = l n , k * + m n , k * d n , k * + v n c n and l n , k * 0 , v n 0 , m n , k * 0 are the dual variables associated with the constraints C 8 , C 6 , and C 1 , respectively. Then, l n , k * , v n , and m n , k * can be updated by the subgradient method:
l k ( i ) = l k ( i 1 ) τ 5 E s e n 1 N n = 1 N E I T , k [ n ] + , k v ( i ) = v ( i 1 ) τ 6 1 N n = 1 N E S D [ n ] E min + , k m k ( i ) = m k ( i 1 ) τ 7 1 N n = 1 N E S E , k [ n ] E m i n + , k

3.4. Overall Algorithm

P 1.1 is solved by the BCD and SCA method with the overall iterative solution in Algorithm 1. The convergence analysis of the proposed iterative algorithm is carried out as below. Let R ( P , Ξ , Q ) , R p ( P , Ξ , Q ) , R ξ ( P , Ξ , Q ) , and R q ( P , Ξ , Q ) denote the objective value of P 1.1 , P 2 , P 3 , and P 4 for given conditions, respectively.
R ( P m , Ξ m , Q m ) R p ( P m + 1 , Ξ m , Q m ) = R ( P m + 1 , Ξ m , Q m )
Algorithm 1 Alternative optimization algorithm for P1.1
1. Setting:
T, N, E m i n , E s e n , V m a x , P m a x , q 0 , q F , and the tolerance error ϵ
2. Initialization:
The iteration index m = 1 , q m [ n ] .
3. Repeat:
3.1. Calculate p o p t [ n ] according to (12) with the given q m [ n ] , ξ [ n ] . Update μ , ω , f k , λ k by the subgradient algorithm
3.2. Calculate ξ o p t [ n ] according to (19) with the given q m [ n ] , p o p t [ n ] . Update l k , v and m k by the subgradient algorithm
3.3. Solve P3 by CVX with given p o p t [ n ] and ξ o p t [ n ]
if m m 1 ϵ       where m = n = 1 N τ [ n ]
      Break;
else
      Update the iterative number m = m + 1;
    End if
Until m m 1 ϵ
4. Obtain solutions: p o p t [ n ] , ξ o p t [ n ] and q o p t [ n ]
Similarly, with the given P m + 1 and Q m , we obtain the optimal solution for Ξ by (17), then
R ( P m + 1 , Ξ m , Q m ) R ξ ( P m + 1 , Ξ m , Q m ) R ξ ( P m + 1 , Ξ m + 1 , Q m ) = R ( P m + 1 , Ξ m + 1 , Q m )
where Ξ m + 1 is the optimal PSR of D N and E N s by (19). Since Taylor expansion is tight, it follows
R ( P m + 1 , Ξ m + 1 , Q m ) = R q ( P m + 1 , Ξ m + 1 , Q m )
Then for the given feasible P m + 1 , Ξ m + 1 , it follows
R q ( P m + 1 , Ξ m + 1 , Q m ) ( a ) R q ( P m + 1 , Ξ m + 1 , Q m + 1 ) ( b ) R ( P m + 1 , Ξ m + 1 , Q m + 1 )
where (a) holds since problem P4 is solved optimally with solution P m + 1 , Ξ m + 1 , and (b) holds since the objective value of P 4 is the lower bound of the original problem. Based on (22)–(25), we can obtain that
R ( p m , ξ m , q m ) R ( p m + 1 , ξ m + 1 , q m + 1 )
Equation (26) indicates that the objective value of P 1.1 does not decrease after each iteration, which guarantees the convergence of the algorithm. Let L 1 and L 2 denote the number of iterations required for the outer loop and the inner loop of the proposed algorithm, respectively, and the total complexity of ours is O L 1 L 2 N 3 . Compared with the algorithm complexity O L 1 N + 1 ε 2 + L 2 N 3 provided by the baseline [10], the complexity of our proposed method is much lower.

4. Simulation Results and Numerical Analysis

In this paper, we adopt the information transmission model in [10] and set it as the baseline scheme. We compare it with our optimized scheme. In our study, we employed the SDP3 solver from CVX MATLAB and made 592 calls to CVX within the algorithm. The experimental setup involved the utilization of an Intel 64 Family 6 Model 142 Stepping 10 GenuineIntel 1401 MHz processor. The convergence time of the algorithm, under these hardware conditions, was observed to be approximately 269.02 s. The simulation parameters are given in Table 1.
Figure 2 illustrates the optimal UAV’s trajectory with the proposed algorithm considering conjoint optimization of different E N s at the same time. We obtain the different UAV trajectories for different E N positions compared with the fixed trajectory. The UAV flies to D N with maximum speed, then it hovers close to D N to facilitate the transmission of information and energy. Finally, the UAV flies to q F with the fastest possible speed. In Figure 2, the peak coordinate of the green trajectory is (10, 16.75), the red one is (10, 16.43), the blue one is (11.03, 17.06), while the peak coordinate of the purple trajectory is (8.977, 17.05). These observations suggest that as E N s are positioned either closer or farther away, or deviate to the left or right of D N , the flight trajectory exhibits similar trends in response.
Figure 3 shows the UAV’s transmit power over time slots. The optimized power first increases when the UAV is close to D N , and then it remains constant while the UAV hovers at a certain position. The value of the baseline in the middle constant part is 0.5984 W, which is smaller than the optimized scheme of 0.6207 W. Finally, it decreases to zero when the UAV flies away from D N . The optimized power decreases with decreasing P m a x . The closer E N s are to D N , the higher the optimized power will be. Compared with the separated receiver mode, we sacrifice some power to obtain the desired secrecy rate due to a PS mode. In a separated receiver mode, the energy received by each antenna does not need to be split. However, in an in vivo case, the separated receiver mode is difficult to implement.
Figure 4 shows the energy collected by D N and E N s over time slots. The energy collection increases gradually as the UAV approaches D N , and it remains unchanged when the UAV hovers over D N . After flying away from D N , the harvesting energy gradually decreases to zero. Similarly, the harvesting energy is higher than the baseline solution because the optimization of the PSR is not considered in [10]. Compared with the harvesting energy ratio of D N and E N s , the value of the baseline is 1.8547, which is smaller than the optimized scheme of 1.9612. This indicates that the destination node receives more energy in the proposed method.
Figure 5 shows the variation of the PSR with time. When the PSR is low, the IoT device is mainly used as energy nodes; otherwise, it is mainly used as information nodes. When the UAV is far away from D N , the PSR is low to let energy nodes collect energy. If not, the PSR rises to let the D N node decode information. In order to meet the energy harvesting threshold requirement, the PSR increases with decreasing P m a x . However, the PSR decreases when E N s are located close to D N to reach the information decoding threshold. From the simulation results, it can be observed that under the same P m a x , as the distance between E N and D N continues to increase, the corresponding maximum PSR will decrease. The values of three points mentioned in the scheme from near to far are 0.3375, 0.3346, and 0.2787, respectively. Considering height factors, as the flight height of the UAV increases, the stable value of the PSR increases, from low to high height, 0.3068, 0.3375, and 0.3557, respectively.
Figure 6 shows the variation of the instantaneous secrecy rate over time slots. They all have the same trend as that of the transmit power, PSR. When the UAV is hovering over D N , the channel quality of the main link and the transmission efficiency are the best. Additionally, the closer E N is to D N , the smaller the optimal secrecy rate is. The transmit power has little effect on the optimal secrecy rate. Meanwhile, the baseline and the optimal scheme have limited numerical differences (4.747 bits/s/Hz and 4.292 bits/s/Hz, respectively, less than 0.5 bit/s/Hz) due to the existence of the PSR, which can be neglected in applications.
Figure 7 shows the curve of the average secrecy rate in terms of the number of iterations. All schemes converge to terminate at a threshold, which validate that the subproblem approximates to the convex problem. Additionally, the proposed algorithm converges very fast when we vary the location and the magnitude of the power of E N s . It is an efficient solution for UAV applications. Considering height factors, as the flight height of the UAV increases, the stable value of the average secrecy rate decreases, from low to high height, 3.640 bits/s/Hz, 3.489 bits/s/Hz, and 3.408 bits/s/Hz, respectively.
Based on the aforementioned results, we will proceed to summarize and compare the performances of the baseline [10] and the values obtained through the proposed optimal method. The selected environmental conditions include the coordinates of E N s (5, 9), (15, 9), D N (10, 15), and P m a x = 2 W, H = 5.0 m. A comparative analysis data table is presented in Table 2 below.
The comparative analysis reveals that our proposed methodology excels in terms of optimal power allocation, the energy harvesting ratio for D N and E N s . Furthermore, the instantaneous secrecy rate exhibits a close proximity. Our approach comprehensively considers various factors, including power, security, and transmission efficiency, leading to a superior overall performance, which demonstrates the superiority of our resource allocation schemes over the baseline scheme.

5. Conclusions

In this paper, we have considered a wireless communication system consisting of a UAV and three IoT nodes equipped with SWIPT technology. The UAV transmits confidential information to the destination node. All nodes could collect energy. The secure transmission of confidential information to the destination node is also considered. Therefore, we apply the PLS method with limitation on the harvested energy and information threshold of the energy nodes to prevent it from decoding information and help it to collect energy.
The objective function is achieved by the joint optimization of the UAV’s trajectory, transmit power, and PSR. Then it is solved by an iterative algorithm based on the BCD and SCA. Numerical simulation results are provided to show the effectiveness of our method. Compared with the baseline mode, the PS mode is more meaningful in an in vivo case, which not only meets the security rate but also optimizes the effective energy distribution of the node.
The current study focuses on a fixed number of IoT nodes equipped with SWIPT technology and a relatively low height range of UAVs. However, in practical scenarios, the number of IoT nodes and the flight altitude may vary dynamically. Therefore, our future work will further explore the scalability of our system. A variable number of nodes and a wider range of flight altitudes will be taken into consideration. More developing algorithms and protocols that can adapt to the dynamic network topology and optimize resource allocation accordingly will be investigated.

Author Contributions

Conceptualization, methodology, and software, B.M. and D.X.; formal analysis, X.R.; validation, J.L.; data curation, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Guangdong Province under Grant Nos. 2023A1515011420, 2022A1515011830, 2021A1515011842.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, Y.; Liang, W.; Xu, W.; Xu, Z.; Jia, X.; Xu, Y.; Kan, H. Data collection maximization in IoT-sensor networks via an energy-constrained UAV. IEEE Trans. Mob. Comput. 2021, 22, 159–174. [Google Scholar] [CrossRef]
  2. Jiang, R.; Xiong, K.; Yang, H.C.; Fan, P.; Zhong, Z.; Letaief, K.B. On the coverage of UAV-assisted SWIPT networks with nonlinear EH model. IEEE Trans. Wirel. Commun. 2021, 21, 4464–4481. [Google Scholar] [CrossRef]
  3. Kim, K.W.; Lee, H.S.; Lee, J.W. Waveform design for fair wireless power transfer with multiple energy harvesting devices. IEEE J. Sel. Areas Commun. 2018, 37, 34–47. [Google Scholar] [CrossRef]
  4. Sun, X.; Ng, D.W.K.; Ding, Z.; Xu, Y.; Zhong, Z. Physical layer security in UAV systems: Challenges and opportunities. IEEE Wirel. Commun. 2019, 26, 40–47. [Google Scholar] [CrossRef]
  5. Yin, S.; Zhao, Y.; Li, L.; Yu, F.R. UAV-assisted cooperative communications with power-splitting information and power transfer. IEEE Trans. Green Commun. Netw. 2019, 3, 1044–1057. [Google Scholar] [CrossRef]
  6. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of physical layer security in multiuser wireless networks: A survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef]
  7. Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
  8. Garcia-Magarino, I.; Lacuest, R.; Rajarajan, M.; Lloret, J. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain. Ad Hoc Netw. 2019, 86, 72–82. [Google Scholar] [CrossRef]
  9. Mamaghani, M.T.; Hong, Y. Improving PHY-security of UAV-enabled transmission with wireless energy harvesting: Robust trajectory design and communications resource allocation. IEEE Trans. Veh. Technol. 2020, 69, 8586–8600. [Google Scholar] [CrossRef]
  10. Hong, X.; Liu, P.; Zhou, F.; Guo, S.; Chu, Z. Resource allocation for secure UAV-assisted SWIPT systems. IEEE Access 2019, 7, 24248–24257. [Google Scholar] [CrossRef]
  11. Hua, M.; Wang, Y.; Zhang, Z.; Li, C.; Huang, Y.; Yang, L. Energy-efficient optimisation for UAV-aided wireless sensor networks. IET Commun. 2019, 13, 972–980. [Google Scholar] [CrossRef]
  12. Shengnan, C.; Xiangdong, J.; Yixuan, G.; Yuhua, Z. Physical layer security communication of cognitive UAV mobile relay network. In Proceedings of the 2021 7th International Symposium on Mechatronics and Industrial Informatics (ISMII), Zhuhai, China, 22–24 January 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 267–271. [Google Scholar]
  13. Tegos, S.A.; Diamantoulakis, P.D.; Pappi, K.; Karagiannidis, G.K. Optimal simultaneous wireless information and power transfer with low-complexity receivers. In Proceedings of the 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Kalamata, Greece, 25–28 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar]
  14. Choi, K.W.; Hwang, S.I.; Aziz, A.A.; Jang, H.H.; Kim, J.S.; Kang, D.S.; Kim, D.I. Simultaneous wireless information and power transfer (SWIPT) for Internet of Things: Novel receiver design and experimental validation. IEEE Internet Things J. 2020, 7, 2996–3012. [Google Scholar] [CrossRef]
  15. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV communications via joint trajectory and power control. IEEE Trans. Wirel. Commun. 2019, 18, 1376–1389. [Google Scholar] [CrossRef]
Figure 1. System model of UAV-assisted IoT node secure communication system.
Figure 1. System model of UAV-assisted IoT node secure communication system.
Signals 04 00031 g001
Figure 2. Trajectories of a UAV with a different location of E N s . H = 5.0 m, P m a x = 2 W. The coordinates of the UAV’s initial and final location are set as q i = (0, 10) and q F = (20, 10).
Figure 2. Trajectories of a UAV with a different location of E N s . H = 5.0 m, P m a x = 2 W. The coordinates of the UAV’s initial and final location are set as q i = (0, 10) and q F = (20, 10).
Signals 04 00031 g002
Figure 3. Optimized transmit power versus the time slot. H = 5.0 m.
Figure 3. Optimized transmit power versus the time slot. H = 5.0 m.
Signals 04 00031 g003
Figure 4. The harvesting energy versus the time slot. H = 5.0 m. The coordinates for E N 1 , E N 2 , and D N are (5, 9), (15, 9), and (10, 15), respectively.
Figure 4. The harvesting energy versus the time slot. H = 5.0 m. The coordinates for E N 1 , E N 2 , and D N are (5, 9), (15, 9), and (10, 15), respectively.
Signals 04 00031 g004
Figure 5. Optimized power splitting ratio versus the time slot.
Figure 5. Optimized power splitting ratio versus the time slot.
Signals 04 00031 g005
Figure 6. Instantaneous secrecy rate versus the time slot. H = 5.0 m.
Figure 6. Instantaneous secrecy rate versus the time slot. H = 5.0 m.
Signals 04 00031 g006
Figure 7. Average secrecy rate versus iteration.
Figure 7. Average secrecy rate versus iteration.
Signals 04 00031 g007
Table 1. Simulation parameter.
Table 1. Simulation parameter.
ParametersValues [10]
Mission time T20 s
Time slots N40
Maximum transmit power P max 2 W
Average transmission power P ¯ 0.5 W
Noise power δ 2 −50 dBm
Channel power gain β ¯ −30 dBm
Power conversion efficiency factor η 0.5
Collecting energy threshold E min 70 μ W
Information coding threshold E s e n 50 μ W
Maximum speed of UAV V max 5 m/s
Table 2. Performance comparison.
Table 2. Performance comparison.
IndicesBaseline [10]Proposed Optimal Method
Maximum transmit power W0.59840.6207
Stable harvesting energy of D N (W)1.176 × 10 5 7.322 × 10 6
Stable harvesting energy of E N 1 , E N 2 (W)3.171 × 10 6 1.867 × 10 6
Maximum D N and E N s receive energy ratio1.85471.9612
Maximum instantaneous secrecy rate (bits/s/Hz)4.2924.747
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ma, B.; Xu, D.; Ren, X.; Wang, Y.; Liu, J. Resource Allocation of UAV-Assisted IoT Node Secure Communication System. Signals 2023, 4, 591-603. https://doi.org/10.3390/signals4030031

AMA Style

Ma B, Xu D, Ren X, Wang Y, Liu J. Resource Allocation of UAV-Assisted IoT Node Secure Communication System. Signals. 2023; 4(3):591-603. https://doi.org/10.3390/signals4030031

Chicago/Turabian Style

Ma, Biyun, Diyuan Xu, Xinyu Ren, Yide Wang, and Jiaojiao Liu. 2023. "Resource Allocation of UAV-Assisted IoT Node Secure Communication System" Signals 4, no. 3: 591-603. https://doi.org/10.3390/signals4030031

Article Metrics

Back to TopTop