Energy-Efficient Resource Allocation for Secure UAV Communication Systems

Yuanxin Cai, Zhiqiang Wei, Ruide Li, Derrick Wing Kwan Ng, Jinhong Yuan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

36 Citations (Scopus)

Abstract

In this paper, we study the resource allocation and trajectory design for energy-efficient secure unmanned aerial vehicle (UAV) communication systems where a UAV base station serves multiple legitimate ground users in the existence of a potential eavesdropper. We aim to maximize the energy efficiency of the UAV by jointly optimizing its transmit power, user scheduling, trajectory, and velocity. The design is formulated as a non-convex optimization problem taking into account the maximum tolerable signal-to-noise ratio (SNR) leakage, the minimum data rate requirement of each user, and the location uncertainty of the eavesdropper. An iterative algorithm is proposed to obtain an efficient suboptimal solution. Simulation results demonstrate that the proposed algorithm can achieve a significant improvement of the system energy efficiency while satisfying communication security constraint, compared to some simple scheme adopting straight flight trajectory with a constant speed.

Original languageEnglish
Title of host publication2019 IEEE Wireless Communications and Networking Conference, WCNC 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538676462
DOIs
Publication statusPublished - Apr 2019
Event2019 IEEE Wireless Communications and Networking Conference, WCNC 2019 - Marrakesh, Morocco
Duration: 15 Apr 201919 Apr 2019

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2019-April
ISSN (Print)1525-3511

Conference

Conference2019 IEEE Wireless Communications and Networking Conference, WCNC 2019
Country/TerritoryMorocco
CityMarrakesh
Period15/04/1919/04/19

Fingerprint

Dive into the research topics of 'Energy-Efficient Resource Allocation for Secure UAV Communication Systems'. Together they form a unique fingerprint.

Cite this