Daehan Ha, Seongah Jeong, Jinkyu Kang, Joonhyuk Kang
{"title":"Secrecy Energy Efficiency Maximization for Secure Unmanned-Aerial-Vehicle-Assisted Simultaneous Wireless Information and Power Transfer Systems","authors":"Daehan Ha, Seongah Jeong, Jinkyu Kang, Joonhyuk Kang","doi":"10.3390/drones7110672","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicle (UAV)-assisted simultaneous wireless information and power transfer (SWIPT) systems have recently gained significant attraction in internet-of-things (IoT) applications that have limited or no infrastructure. Specifically, the free mobility of UAVs in three-dimensional (3D) space allows us good-quality channel links, thereby enhancing the communication environment and improving performance in terms of achievable rates, latency, and energy efficiency. Meanwhile, IoT devices can extend their battery life by harvesting the energy following the SWIPT protocol, which leads to an increase in the overall system lifespan. In this paper, we propose a secure UAV-assisted SWIPT system designed to optimize the secrecy energy efficiency (SEE) of a ground network, wherein a base station (BS) transmits confidential messages to an energy-constrained device in the presence of a passive eavesdropper. Here, we employ a UAV acting as a helper node to improve the SEE of the system and to aid in the energy harvesting (EH) of the battery-limited ground device following the SWIPT protocol. To this end, we formulate the SEE maximization problem by jointly optimizing the transmit powers of the BS and UAV, the power-splitting ratio for EH operations, and the UAV’s flight path. The solution is obtained via a proposed algorithm that leverages successive convex approximation (SCA) and Dinkelbach’s method. Through simulations, we corroborate the feasibility and effectiveness of the proposed algorithm compared to conventional partial optimization approaches.","PeriodicalId":36448,"journal":{"name":"Drones","volume":"26 4","pages":"0"},"PeriodicalIF":4.4000,"publicationDate":"2023-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Drones","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/drones7110672","RegionNum":2,"RegionCategory":"地球科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"REMOTE SENSING","Score":null,"Total":0}
引用次数: 0
Abstract
Unmanned aerial vehicle (UAV)-assisted simultaneous wireless information and power transfer (SWIPT) systems have recently gained significant attraction in internet-of-things (IoT) applications that have limited or no infrastructure. Specifically, the free mobility of UAVs in three-dimensional (3D) space allows us good-quality channel links, thereby enhancing the communication environment and improving performance in terms of achievable rates, latency, and energy efficiency. Meanwhile, IoT devices can extend their battery life by harvesting the energy following the SWIPT protocol, which leads to an increase in the overall system lifespan. In this paper, we propose a secure UAV-assisted SWIPT system designed to optimize the secrecy energy efficiency (SEE) of a ground network, wherein a base station (BS) transmits confidential messages to an energy-constrained device in the presence of a passive eavesdropper. Here, we employ a UAV acting as a helper node to improve the SEE of the system and to aid in the energy harvesting (EH) of the battery-limited ground device following the SWIPT protocol. To this end, we formulate the SEE maximization problem by jointly optimizing the transmit powers of the BS and UAV, the power-splitting ratio for EH operations, and the UAV’s flight path. The solution is obtained via a proposed algorithm that leverages successive convex approximation (SCA) and Dinkelbach’s method. Through simulations, we corroborate the feasibility and effectiveness of the proposed algorithm compared to conventional partial optimization approaches.