Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head

IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS IEEE Transactions on Green Communications and Networking Pub Date : 2024-03-15 DOI:10.1109/TGCN.2024.3401107
Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu
{"title":"Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head","authors":"Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu","doi":"10.1109/TGCN.2024.3401107","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 4","pages":"1661-1675"},"PeriodicalIF":5.3000,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10531056/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
双簇头无人机辅助物联网的安全资源分配和轨迹设计
无人驾驶飞行器(UAV)能够在偏远地区灵活收集物联网(IoT)节点的数据,但物联网节点的数据面临安全威胁。在所提出的基于双簇头(CH)框架的数据收集策略中,我们利用上行非正交多址(NOMA)的用户间干扰(IUI)来提高物联网节点的安全性。具体来说,NOMA 中的用户间干扰被用作隐藏机密数据的干扰信号。然后,我们设计了一种 CH 选择方案,以缓解簇中成员节点之间能量消耗不平衡的问题。在 CH 选择方案的基础上,我们通过功率、时间调度和轨迹的联合优化,最大限度地提高了保密能效(SEE)。由于变量高度耦合且存在非凸约束,因此采用交替优化法将原始问题解耦为多个子问题,并对其进行迭代求解。在每次迭代中,都使用 Dinkelbach 方法来处理分数目标函数;使用连续凸近似技术将非凸子问题转化为凸形式。在数值模拟中,我们提出的数据收集策略在改善 SEE 和阻止窃听方面显示出了有效性。此外,所提出的 CH 选择方案还能有效延长能量受限的物联网节点的寿命。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Green Communications and Networking
IEEE Transactions on Green Communications and Networking Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
6.20%
发文量
181
期刊最新文献
2024 Index IEEE Transactions on Green Communications and Networking Vol. 8 Table of Contents Guest Editorial Special Issue on Rate-Splitting Multiple Access for Future Green Communication Networks IEEE Transactions on Green Communications and Networking IEEE Communications Society Information
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1