TY - GEN
T1 - Secrecy Energy Efficiency Maximization in Space-Air-Ground Internet of Things Networks
AU - Mei, Yanbin
AU - Gao, Xiaozheng
AU - Shi, Minwei
AU - Wu, Zhigang
AU - Yang, Mei
N1 - Publisher Copyright:
© 2023 IEEE.
PY - 2023
Y1 - 2023
N2 - Traditional terrestrial communication technologies have struggled to keep up with the growing demands for communication in recent years. As a potential solution, the space-air-ground integrated network has received a lot of attention. However, it also faces many unprecedented security challenges. Compared to traditional key-based methods, physical layer security, which does not depend on upper layer encryption, has gained considerable interest. This paper aims to maximize the secrecy energy efficiency, and considers a space-air-ground Internet of Things network model in which the eavesdropper is an airship. To counter the eavesdropping threat, unmanned aerial vehicles send artificial noise signals to confuse eavesdroppers. The formulated problem is devided into two subproblems of power control and trajectory optimization. Dinkelbach algorithm, successive convex approximation algorithm, and the method of introducing slack variables are employed to transform the non-convex subproblems into convex forms. Simulation results show that our developed algorithm can converge within a few iterations.
AB - Traditional terrestrial communication technologies have struggled to keep up with the growing demands for communication in recent years. As a potential solution, the space-air-ground integrated network has received a lot of attention. However, it also faces many unprecedented security challenges. Compared to traditional key-based methods, physical layer security, which does not depend on upper layer encryption, has gained considerable interest. This paper aims to maximize the secrecy energy efficiency, and considers a space-air-ground Internet of Things network model in which the eavesdropper is an airship. To counter the eavesdropping threat, unmanned aerial vehicles send artificial noise signals to confuse eavesdroppers. The formulated problem is devided into two subproblems of power control and trajectory optimization. Dinkelbach algorithm, successive convex approximation algorithm, and the method of introducing slack variables are employed to transform the non-convex subproblems into convex forms. Simulation results show that our developed algorithm can converge within a few iterations.
KW - physical layer security
KW - resource allocation
KW - secrecy energy efficiency (SEE)
KW - space-air-ground integrated network (SAGIN)
KW - trajectory optimization
UR - http://www.scopus.com/inward/record.url?scp=85185869398&partnerID=8YFLogxK
U2 - 10.1109/WCSP58612.2023.10405014
DO - 10.1109/WCSP58612.2023.10405014
M3 - Conference contribution
AN - SCOPUS:85185869398
T3 - 2023 IEEE 15th International Conference on Wireless Communications and Signal Processing, WCSP 2023
SP - 886
EP - 891
BT - 2023 IEEE 15th International Conference on Wireless Communications and Signal Processing, WCSP 2023
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th IEEE International Conference on Wireless Communications and Signal Processing, WCSP 2023
Y2 - 2 November 2023 through 4 November 2023
ER -