Format

Send to

Choose Destination
Sensors (Basel). 2019 Oct 14;19(20). pii: E4440. doi: 10.3390/s19204440.

Aerial Cooperative Jamming for Cellular-Enabled UAV Secure Communication Network: Joint Trajectory and Power Control Design.

Author information

1
The Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China. 1149151@mail.dhu.end.cn.
2
College of Information Science & Technology, Chengdu University of Technology, Chengdu 610059, China. duobin@cdut.edu.cn.
3
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China. wangzq@cqupt.edu.cn.
4
School of Electronic Information Engineering, Shanghai Dianji University, Shanghai 201306, China. linxc@sdju.edu.cn.
5
The Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China. gcc369@dhu.edu.cn.

Abstract

To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically, a base station (BS) transmits confidential messages to a UAV and meanwhile another UAV performs the role of an aerial jammer by cooperatively sending jamming signals to oppose multiple suspicious eavesdroppers on the ground. As the UAVs have the advantage of the controllable mobility, the objective is to maximize the worst-case average secrecy rate by the joint optimization of the two UAVs' trajectories and the BS's/UAV jammer's transmit/jamming power over a given mission period. The objective function of the formulated problem is highly non-linear regarding the optimization variables and the problem has non-convex constraints, which is, in general, difficult to achieve a globally optimal solution. Thus, we divide the original problem into four subproblems and then solve them by applying the successive convex approximation (SCA) and block coordinate descent (BCD) methods. Numerical results demonstrate that the significantly better secrecy performance can be obtained by using the proposed algorithm in comparison with benchmark schemes.

KEYWORDS:

UAV secure communication; jamming; power control; secrecy rate maximization; trajectory design

Supplemental Content

Full text links

Icon for Multidisciplinary Digital Publishing Institute (MDPI) Icon for PubMed Central
Loading ...
Support Center