Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head

IF 5.3 2区 计算机科学 Q1 TELECOMMUNICATIONS
Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu
{"title":"Secure Resource Allocation and Trajectory Design for UAV-Assisted IoT With Double Cluster Head","authors":"Xiangyun Meng;Xuanli Wu;Ziyi Xie;Tingting Zhang;Tao Xu","doi":"10.1109/TGCN.2024.3401107","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.","PeriodicalId":13052,"journal":{"name":"IEEE Transactions on Green Communications and Networking","volume":"8 4","pages":"1661-1675"},"PeriodicalIF":5.3000,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Green Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10531056/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Unmanned aerial vehicles (UAVs) enable flexible data collection from Internet of Things (IoT) nodes in remote areas, but the data of IoT nodes face security threats. In the proposed data collection strategy based on a double cluster head (CH) framework, we exploit the inter-user interference (IUI) of uplink non-orthogonal multiple access (NOMA) to improve the security of IoT nodes. Specifically, inter-CH interference in NOMA is used as jamming signals to hide confidential data. Then a CH selection scheme is designed to alleviate the unbalanced energy consumption among member nodes in a cluster. Based on the CH selection scheme, we maximize the secrecy energy efficiency (SEE) via joint optimization of power, time scheduling, and trajectory. Due to the highly coupled variables and non-convex constraints, an alternating optimization method is used to decouple the original problem into subproblems and they are solved iteratively. In each iteration, Dinkelbach’s method is used to tackle the fractional objective function; the successive convex approximation technique is used to transform the non-convex subproblems into convex forms. In numerical simulations, our proposed data collection strategy shows effectiveness in improving SEE and hindering wiretapping. Furthermore, the proposed CH selection scheme efficiently extends the lifetime of energy-constrained IoT nodes.
双簇头无人机辅助物联网的安全资源分配和轨迹设计
无人驾驶飞行器(UAV)能够在偏远地区灵活收集物联网(IoT)节点的数据,但物联网节点的数据面临安全威胁。在所提出的基于双簇头(CH)框架的数据收集策略中,我们利用上行非正交多址(NOMA)的用户间干扰(IUI)来提高物联网节点的安全性。具体来说,NOMA 中的用户间干扰被用作隐藏机密数据的干扰信号。然后,我们设计了一种 CH 选择方案,以缓解簇中成员节点之间能量消耗不平衡的问题。在 CH 选择方案的基础上,我们通过功率、时间调度和轨迹的联合优化,最大限度地提高了保密能效(SEE)。由于变量高度耦合且存在非凸约束,因此采用交替优化法将原始问题解耦为多个子问题,并对其进行迭代求解。在每次迭代中,都使用 Dinkelbach 方法来处理分数目标函数;使用连续凸近似技术将非凸子问题转化为凸形式。在数值模拟中,我们提出的数据收集策略在改善 SEE 和阻止窃听方面显示出了有效性。此外,所提出的 CH 选择方案还能有效延长能量受限的物联网节点的寿命。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Green Communications and Networking
IEEE Transactions on Green Communications and Networking Computer Science-Computer Networks and Communications
CiteScore
9.30
自引率
6.20%
发文量
181
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信