{"title":"双簇头无人机辅助物联网的安全资源分配和轨迹设计","authors":"Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu","doi":"10.1109/TGCN.2024.3401107","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 4","pages":"1661-1675"},"PeriodicalIF":5.3000,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head\",\"authors\":\"Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu\",\"doi\":\"10.1109/TGCN.2024.3401107\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.\",\"PeriodicalId\":13052,\"journal\":{\"name\":\"IEEE Transactions on Green Communications and Networking\",\"volume\":\"8 4\",\"pages\":\"1661-1675\"},\"PeriodicalIF\":5.3000,\"publicationDate\":\"2024-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Green Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10531056/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10531056/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head
Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.