Secrecy Enhancement for UAV-enabled Integrated Sensing and Communication System
Abstract: In this correspondence, we propose an unmanned aerial vehicle (UAV)-enabled integrated sensing and communication (ISAC) system, where a full-duplex UAV equipped with uniform planar array (UPA) is adopted as a base station for the multiuser downlink communications, while sensing and jamming a passive ground eavesdropper. The goal of this work is to maximize the sum secrecy rate of ground users subject to the constraints of sensing accuracy and UAV's operational capability by jointly optimizing the transceiver beamforming and UAV's trajectory. To this end, we develop the algorithmic solution based on block coordinate descent (BCD) and semidefinite programming (SDP) relaxation techniques, whose performance is verified via simulations indicating its efficacy in improving communication security with the sufficient mission period.
- G. Zhang, Q. Wu, M. Cui, and R. Zhang, “Securing UAV communications via joint trajectory and power control,” IEEE Transactions on Wireless Communications, vol. 18, no. 2, pp. 1376–1389, 2019.
- P. Liu, Z. Fei, X. Wang, J. A. Zhang, Z. Zheng, and Q. Zhang, “Securing multi-user uplink communications against mobile aerial eavesdropper via sensing,” IEEE Transactions on Vehicular Technology, 2023.
- K. Meng, Q. Wu, S. Ma, W. Chen, K. Wang, and J. Li, “Throughput maximization for UAV-enabled integrated periodic sensing and communication,” IEEE Transactions on Wireless Communications, vol. 22, no. 1, pp. 671–687, 2022.
- Z. Wei, F. Liu, D. W. K. Ng, and R. Schober, “Safeguarding UAV networks through integrated sensing, jamming, and communications,” in ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022, pp. 8737–8741.
- J. Wu, W. Yuan, and L. Hanzo, “When UAVs meet ISAC: real-time trajectory design for secure communications,” IEEE Transactions on Vehicular Technology, 2023.
- Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zhang, “Semidefinite relaxation of quadratic optimization problems,” IEEE Signal Processing Magazine, vol. 27, no. 3, pp. 20–34, 2010.
- S. Jeong, O. Simeone, and J. Kang, “Mobile edge computing via a UAV-mounted cloudlet: Optimization of bit allocation and path planning,” IEEE Transactions on Vehicular Technology, vol. 67, no. 3, pp. 2049–2063, 2017.
- A. S. Abdalla, K. Powell, V. Marojevic, and G. Geraci, “UAV-assisted attack prevention, detection, and recovery of 5G networks,” IEEE Wireless Communications, vol. 27, no. 4, pp. 40–47, 2020.
- S. Yoo, S. Jeong, J. Kim, and J. Kang, “Cache-assisted mobile edge computing over space-air-ground integrated networks for extended reality applications,” arXiv preprint arXiv:2309.03357, 2023.
- A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp. 1355–1387, 1975.
- P. Tseng, “Convergence of a block coordinate descent method for nondifferentiable minimization,” Journal of optimization theory and applications, vol. 109, pp. 475–494, 2001.
- M. Grant, S. Boyd, and Y. Ye, “CVX: Matlab software for disciplined convex programming,” 2009.
- M. Razaviyayn, M. Hong, and Z.-Q. Luo, “A unified convergence analysis of block successive minimization methods for nonsmooth optimization,” SIAM Journal on Optimization, vol. 23, no. 2, pp. 1126–1153, 2013.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.