Multi-UAV Trajectory Design for Fair and Secure Communication

IF 7 1区 计算机科学 Q1 TELECOMMUNICATIONS IEEE Transactions on Cognitive Communications and Networking Pub Date : 2024-10-28 DOI:10.1109/TCCN.2024.3487142
Hongjiang Lei;Dongyang Meng;Haoxiang Ran;Ki-Hong Park;Gaofeng Pan;Mohamed-Slim Alouini
{"title":"Multi-UAV Trajectory Design for Fair and Secure Communication","authors":"Hongjiang Lei;Dongyang Meng;Haoxiang Ran;Ki-Hong Park;Gaofeng Pan;Mohamed-Slim Alouini","doi":"10.1109/TCCN.2024.3487142","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-to-ground links, UAVs are widely used to enhance the performance of wireless communication systems due to the presence of high-probability line-of-sight (LoS) links. However, the high probability of LoS links also increases the risk of being eavesdropped, posing a significant challenge to the security of wireless communications. In this work, the secure problem in a multi-UAV-assisted communication system is investigated in a moving airborne eavesdropping scenario. To improve the secrecy performance of the considered communication system, aerial eavesdropping capability is suppressed by sending jamming signals from a friendly UAV. An optimization problem under flight conditions, fairness, and limited energy consumption constraints of multiple UAVs is formulated to maximize the fair sum secrecy throughput. Given the complexity and non-convex nature of the problem, we propose a two-step-based optimization approach. The first step employs the K-means algorithm to cluster users and associate them with multiple communication UAVs. Then, a heterogeneous multi-agent deep deterministic policy gradient based algorithm is introduced to solve this optimization problem. The effectiveness of this proposed algorithm is not only theoretically but also rigorously verified by simulation results.","PeriodicalId":13069,"journal":{"name":"IEEE Transactions on Cognitive Communications and Networking","volume":"11 3","pages":"1966-1980"},"PeriodicalIF":7.0000,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cognitive Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10737094/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-to-ground links, UAVs are widely used to enhance the performance of wireless communication systems due to the presence of high-probability line-of-sight (LoS) links. However, the high probability of LoS links also increases the risk of being eavesdropped, posing a significant challenge to the security of wireless communications. In this work, the secure problem in a multi-UAV-assisted communication system is investigated in a moving airborne eavesdropping scenario. To improve the secrecy performance of the considered communication system, aerial eavesdropping capability is suppressed by sending jamming signals from a friendly UAV. An optimization problem under flight conditions, fairness, and limited energy consumption constraints of multiple UAVs is formulated to maximize the fair sum secrecy throughput. Given the complexity and non-convex nature of the problem, we propose a two-step-based optimization approach. The first step employs the K-means algorithm to cluster users and associate them with multiple communication UAVs. Then, a heterogeneous multi-agent deep deterministic policy gradient based algorithm is introduced to solve this optimization problem. The effectiveness of this proposed algorithm is not only theoretically but also rigorously verified by simulation results.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
公平安全通信的多无人飞行器轨迹设计
无人机(uav)由于其高移动性、低成本和按需部署,在未来的无线通信网络中发挥着至关重要的作用。在空对地链路中,由于存在高概率视距(LoS)链路,无人机被广泛用于增强无线通信系统的性能。但是,LoS链路的高概率也增加了被窃听的风险,对无线通信的安全性提出了重大挑战。本文研究了移动机载窃听场景下多无人机辅助通信系统的安全问题。为了提高所考虑的通信系统的保密性能,通过从友方无人机发送干扰信号来抑制空中窃听能力。为了最大限度地提高公平和保密吞吐量,提出了多无人机在飞行条件、公平性和有限能耗约束下的优化问题。考虑到问题的复杂性和非凸性,我们提出了一种基于两步的优化方法。第一步采用K-means算法对用户进行聚类,并将其与多架通信无人机关联。然后,引入了一种基于异构多智能体深度确定性策略梯度的算法来解决这一优化问题。该算法的有效性不仅在理论上得到了验证,而且通过仿真结果得到了严格的验证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Cognitive Communications and Networking
IEEE Transactions on Cognitive Communications and Networking Computer Science-Artificial Intelligence
CiteScore
15.50
自引率
7.00%
发文量
108
期刊介绍: The IEEE Transactions on Cognitive Communications and Networking (TCCN) aims to publish high-quality manuscripts that push the boundaries of cognitive communications and networking research. Cognitive, in this context, refers to the application of perception, learning, reasoning, memory, and adaptive approaches in communication system design. The transactions welcome submissions that explore various aspects of cognitive communications and networks, focusing on innovative and holistic approaches to complex system design. Key topics covered include architecture, protocols, cross-layer design, and cognition cycle design for cognitive networks. Additionally, research on machine learning, artificial intelligence, end-to-end and distributed intelligence, software-defined networking, cognitive radios, spectrum sharing, and security and privacy issues in cognitive networks are of interest. The publication also encourages papers addressing novel services and applications enabled by these cognitive concepts.
期刊最新文献
Coverage Optimization in RIS-enabled Satellite-Terrestrial Networks: A Digital Twin-based Spatial-Temporal Approach Confidence-guided Prototypical Contrastive Domain Adaptation for Cross-domain Automatic Modulation Classification Curated Collaborative AI Edge with Network Data Analytics for B5G/6G Radio Access Networks Convolutional Autoencoder-Enhanced Semantic Communication in Optical Fiber Systems Two-Phase Cell Switching in 6G vHetNets: Sleeping-Cell Load Estimation and Renewable-Aware Switching Toward NES
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1