Secure rate maximization for ISAC-UAV assisted communication amidst multiple eavesdroppers

Yuemin Liu, Xin Liu, Zechen Liu, Yingfeng Yu, Min Jia, Zhenyu Na, Tariq S Durrani

Research output: Contribution to journalArticlepeer-review

42 Citations (Scopus)
30 Downloads (Pure)

Abstract

Unmanned aerial vehicles (UAVs) equipped with integrated sensing and communication (ISAC) technology have been employed in the field of communication. In this paper, we propose an ISAC-UAV assisted secure communication system amidst multiple eavesdroppers. In each time slot, we implement ISAC and communication functions. Since there are multiple eavesdroppers in the system, jammer UAV is required to send jamming signals to the eavesdroppers. During the ISAC process, the source UAV identifies multiple eavesdroppers, relaying their position information to a jammer UAV. During the communication process, multiple eavesdroppers attempt to intercept the communication link between source UAV and users. We use the center of all users as the horizontal location of the jammer UAV. To maximize the secure data transmit rate, we propose a joint optimization problem involving user scheduling, transmit power, and source UAV trajectory. We break down the non-convex optimization problem into three subproblems, and then achieve the suboptimal solution to the original problem through iteratively optimizing these subproblems. Simulation results indicate that the proposed solution can achieve significant secure transmit rate even in the presence of multiple eavesdroppers.
Original languageEnglish
Pages (from-to)15843-15847
Number of pages5
JournalIEEE Transactions on Vehicular Technology
Volume73
Issue number10
Early online date20 Jun 2024
DOIs
Publication statusPublished - 1 Oct 2024

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 62231012, and in part by the Xi'an Key Laboratory of Network Convergence Communication under Grant 2022NCC-K101.

Keywords

  • UAV
  • secure rate
  • ISAC
  • resource optimization
  • multiple eavesdroppers

Fingerprint

Dive into the research topics of 'Secure rate maximization for ISAC-UAV assisted communication amidst multiple eavesdroppers'. Together they form a unique fingerprint.

Cite this