Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks
Abstract
:1. Introduction
- 1.
- The crux of our proposition involves an adaptive secrecy transmission policy, which is centered around the classic Wyner encoding scheme. Considering the instantaneous CSI of the Eve link is unknown, we derive an expression for confidentiality capacity under the connection outage probability (COP) and the secrecy outage probability (SOP) constraints.
- 2.
- We formulate the energy optimization problem of GSNs as a joint optimization problem that includes GSN scheduling and UAV trajectory. The optimization is subject to several constraints, including COP, SOP, minimum secure communication requirements, GSN scheduling, and UAV trajectory. By solving this problem, we aim to minimize energy consumption and maximize the secrecy rate as much as possible through trajectory optimization while satisfying the aforementioned constraints.
- 3.
- We put forward an iterative optimization algorithm based on the block coordinate descent (BCD) approach to transform the intractable optimization problem into two subproblems: GSN scheduling and the UAV trajectory. In the final stage, the optimization problem is solved by alternating iterative optimization of GSN scheduling and UAV trajectory. It is worth mentioning that our algorithm is ultimately convergent, a property that has been mathematically proven.
2. Related Work
2.1. The Application of UAVs in Secure WSNs
2.2. Security Performance in UAV-Enabled WSNs
2.3. Secrecy Energy Efficiency in UAV-Enabled WSN
3. System Model
4. Problem Formulation
5. Problem Solution
5.1. The Optimization of GSN Scheduling
5.2. UAV Trajectory Optimization
Algorithm 1 Successive convex optimization algorithm for Problem (23) |
|
5.3. Overall Iterative Algorithm and Convergence Analysis
Algorithm 2 Overall alternating iterative algorithm |
6. Simulation Results
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Amrallah, A.; Mohamed, E.M.; Tran, G.K.; Sakaguchi, K. Optimization of UAV 3D Trajectory in a Post-disaster Area Using Dual Energy-Aware Bandits. IEICE Commun. Express 2023, 12, 403–408. [Google Scholar] [CrossRef]
- Bao, T.; Yang, H.C.; Hasna, M.O. Secrecy Performance Analysis of UAV-Assisted Relaying Communication Systems. IEEE Trans. Veh. Technol. 2020, 69, 1122–1126. [Google Scholar] [CrossRef]
- Ye, J.; Zhang, C.; Lei, H.; Pan, G.; Ding, Z. Secure UAV-to-UAV Systems With Spatially Random UAVs. IEEE Wirel. Commun. Lett. 2019, 8, 564–567. [Google Scholar] [CrossRef]
- Ouyang, J.; Pan, Y.; Xu, B.; Lin, M.; Zhu, W.P. Achieving Secrecy Energy Efficiency Fairness in UAV-Enabled Multi-User Communication Systems. IEEE Wirel. Commun. Lett. 2022, 11, 918–922. [Google Scholar] [CrossRef]
- Yao, J.; Xu, J. Secrecy Transmission in Large-Scale UAV-Enabled Wireless Networks. IEEE Trans. Commun. 2019, 67, 7656–7671. [Google Scholar] [CrossRef]
- Wang, W.; Tian, H.; Ni, W. Secrecy Performance Analysis of IRS-Aided UAV Relay System. IEEE Wirel. Commun. Lett. 2021, 10, 2693–2697. [Google Scholar] [CrossRef]
- Wang, Y.; Chen, M.; Pan, C.; Wang, K.; Pan, Y. Joint Optimization of UAV Trajectory and Sensor Uploading Powers for UAV-Assisted Data Collection in Wireless Sensor Networks. IEEE Internet Things J. 2022, 9, 11214–11226. [Google Scholar] [CrossRef]
- Wang, Y.; Hu, Z.; Wen, X.; Lu, Z.; Miao, J. Minimizing Data Collection Time With Collaborative UAVs in Wireless Sensor Networks. IEEE Access. 2020, 8, 98659–98669. [Google Scholar] [CrossRef]
- Ebrahimi, D.; Sharafeddine, S.; Ho, P.H.; Assi, C. UAV-Aided Projection-Based Compressive Data Gathering in Wireless Sensor Networks. IEEE Internet Things J. 2019, 6, 1893–1905. [Google Scholar] [CrossRef]
- Wei, Z.; Zhu, M.; Zhang, N.; Wang, L.; Zou, Y.; Meng, Z.; Wu, H.; Feng, Z. UAV-Assisted Data Collection for Internet of Things: A Survey. IEEE Internet Things J. 2022, 9, 15460–15483. [Google Scholar] [CrossRef]
- Abughalwa, M.; Hasna, M.O. A Secrecy Study of UAV Based Networks With Fountain Codes and FD Jamming. IEEE Commun. Lett. 2021, 25, 1796–1800. [Google Scholar] [CrossRef]
- Wu, H.; Li, H.; Wei, Z.; Zhang, N.; Tao, X. Secrecy Performance Analysis of Air-to-Ground Communication With UAV Jitter and Multiple Random Walking Eavesdroppers. IEEE Trans. Veh. Technol. 2021, 70, 572–584. [Google Scholar] [CrossRef]
- Pang, X.; Zhao, N.; Tang, J.; Wu, C.; Niyato, D.; Wong, K.K. IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design. IEEE Trans. Commun. 2022, 70, 1140–1152. [Google Scholar] [CrossRef]
- Sun, G.; Tao, X.; Li, N.; Xu, J. Intelligent Reflecting Surface and UAV Assisted Secrecy Communication in Millimeter-Wave Networks. IEEE Trans. Veh. Technol. 2021, 70, 11949–11961. [Google Scholar] [CrossRef]
- Zhou, Y.; Pan, C.; Yeoh, P.L.; Wang, K.; Elkashlan, M.; Vucetic, B.; Li, Y. Secure Communications for UAV-Enabled Mobile Edge Computing Systems. IEEE Trans. Commun. 2020, 68, 376–388. [Google Scholar] [CrossRef]
- Choi, H.H.; Lee, J.R. Joint Optimization of Altitude and Beamwidth for UAV-Powered Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2023, 72, 1279–1284. [Google Scholar] [CrossRef]
- Al-Share, R.; Shurman, M.; Alma’aitah, A. A Collaborative Learning-Based Algorithm for Task Offloading in UAV-Aided Wireless Sensor Networks. Comput. J. 2021, 64, 1575–1583. [Google Scholar] [CrossRef]
- Wang, X.; Liu, X.; Cheng, C.T.; Deng, L.; Chen, X.; Xiao, F. A Joint User Scheduling and Trajectory Planning Data Collection Strategy for the UAV-Assisted WSN. IEEE Commun. Lett. 2021, 25, 2333–2337. [Google Scholar] [CrossRef]
- Zhu, B.; Bedeer, E.; Nguyen, H.H.; Barton, R.; Henry, J. UAV Trajectory Planning in Wireless Sensor Networks for Energy Consumption Minimization by Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 2021, 70, 9540–9554. [Google Scholar] [CrossRef]
- Baek, J.; Han, S.I.; Han, Y. Energy-Efficient UAV Routing for Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 1741–1750. [Google Scholar] [CrossRef]
- Fu, H.; Sheng, Z.; Nasir, A.A.; Muqaibel, A.H.; Hanzo, L. Securing the UAV-Aided Non-Orthogonal Downlink in the Face of Colluding Eavesdroppers. IEEE Trans. Veh. Technol. 2022, 71, 6837–6842. [Google Scholar] [CrossRef]
- Zhang, Z.; Zhang, Q.; Miao, J.; Yu, F.R.; Fu, F.; Du, J.; Wu, T. Energy-Efficient Secure Video Streaming in UAV-Enabled Wireless Networks: A Safe-DQN Approach. IEEE Trans. Green Commun. Netw. 2021, 5, 1892–1905. [Google Scholar] [CrossRef]
- Ji, J.; Zhu, K.; Niyato, D.; Wang, R. Joint Trajectory Design and Resource Allocation for Secure Transmission in Cache-Enabled UAV-Relaying Networks With D2D Communications. IEEE Internet Things J. 2021, 8, 1557–1571. [Google Scholar] [CrossRef]
- Zhao, N.; Cheng, F.; Yu, F.R.; Tang, J.; Chen, Y.; Gui, G.; Sari, H. Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment. IEEE Trans. Commun. 2018, 66, 2281–2294. [Google Scholar] [CrossRef]
- Li, M.; Tao, X.; Li, N.; Wu, H.; Xu, J. Secrecy Energy Efficiency Maximization in UAV-Enabled Wireless Sensor Networks Without Eavesdropper’s CSI. IEEE Internet Things J. 2022, 9, 3346–3358. [Google Scholar] [CrossRef]
- Bastami, H.; Moradikia, M.; Abdelhadi, A.; Behroozi, H.; Clerckx, B.; Hanzo, L. Maximizing the Secrecy Energy Efficiency of the Cooperative Rate-Splitting Aided Downlink in Multi-Carrier UAV Networks. IEEE Trans. Veh. Technol. 2022, 71, 11803–11819. [Google Scholar] [CrossRef]
- Yu, H.; Guo, S.; Yang, Y.; Ji, L.; Yang, Y. Secrecy Energy Efficiency Optimization for Downlink Two-User OFDMA Networks with SWIPT. IEEE Syst. J. 2019, 13, 324–335. [Google Scholar] [CrossRef]
- Lu, Y.; Xiong, K.; Fan, P.; Ding, Z.; Zhong, Z.; Letaief, K.B. Secrecy Energy Efficiency in Multi-Antenna SWIPT Networks with Dual-Layer PS Receivers. IEEE Trans. Wirel. Commun. 2020, 19, 4290–4306. [Google Scholar] [CrossRef]
- Lin, X.; Yajnanarayana, V.; Muruganathan, S.D.; Gao, S.; Asplund, H.; Maattanen, H.L.; Bergstrom, M.; Euler, S.; Wang, Y.P.E. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles. IEEE Commun. Mag. 2018, 56, 204–210. [Google Scholar] [CrossRef]
- You, C.; Zhang, R. Hybrid Offline-Online Design for UAV-Enabled Data Harvesting in Probabilistic LoS Channels. IEEE Trans. Wirel. Commun. 2020, 19, 3753–3768. [Google Scholar] [CrossRef]
- Wyner, A.D. The wire-tap channel. Bell Syst. Tech. J. 1975, 54, 1355–1387. [Google Scholar] [CrossRef]
- Wu, Q.; Zeng, Y.; Zhang, R. Joint Trajectory and Communication Design for Multi-UAV Enabled Wireless Networks. IEEE Trans. Wirel. Commun. 2018, 17, 2109–2121. [Google Scholar] [CrossRef]
- Fazel, F.; Abouei, J.; Jaseemuddin, M.; Anpalagan, A.; Plataniotis, K.N. Secure Throughput Optimization for Cache-Enabled Multi-UAVs Networks. IEEE Internet Things J. 2022, 9, 7783–7801. [Google Scholar] [CrossRef]
- Zhou, X.; Yan, S.; Shu, F.; Chen, R.; Li, J. UAV-Enabled Covert Wireless Data Collection. IEEE J. Sel. Areas Commun. 2021, 39, 3348–3362. [Google Scholar] [CrossRef]
- Zhu, M.; Wei, Z.; Qiu, C.; Jiang, W.; Wu, H.; Feng, Z. Joint Data Collection and Sensor Positioning in Multi-UAV-Assisted Wireless Sensor Network. IEEE Sens. J. 2023, 23, 23664–23675. [Google Scholar] [CrossRef]
- Xiao, L.; Xu, Y.; Yang, D.; Zeng, Y. Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying. IEEE Trans. Green Commun. Netw. 2020, 4, 180–193. [Google Scholar] [CrossRef]
Parameters | Values |
---|---|
The altitude of the UAV [32], H | 100 m |
The reference channel power gain [32], | −60 dB |
The level of the UAV’s self-inference [15], | −120 dB |
The noise power [26], | −110 dB |
The maximum speed of the UAV [32], | 50 m/s |
The length of each time slot [26], | 0.5 s |
The minimum tolerable data received [23], , | 100 Kbit |
The power of the UAV and ground nodes [33], , | 10 dBm |
The maximum SOP\COP constraint [34], , | 0.05 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ding, X.; Tian, W.; Liu, G.; Ji, X. Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks. Sensors 2023, 23, 9411. https://doi.org/10.3390/s23239411
Ding X, Tian W, Liu G, Ji X. Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks. Sensors. 2023; 23(23):9411. https://doi.org/10.3390/s23239411
Chicago/Turabian StyleDing, Xufei, Wen Tian, Guangjie Liu, and Xiaopeng Ji. 2023. "Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks" Sensors 23, no. 23: 9411. https://doi.org/10.3390/s23239411