Loading [MathJax]/extensions/MathZoom.js
Physical Layer Security Performance Optimization of Unmanned Aerial Vehicle-Assisted Wireless Network | IEEE Conference Publication | IEEE Xplore

Physical Layer Security Performance Optimization of Unmanned Aerial Vehicle-Assisted Wireless Network


Abstract:

In the UAV-assisted wireless sensor network communication scenario, it is assumed that there is a UAV receiver, several ground sensors and a ground eavesdropper whose loc...Show More

Abstract:

In the UAV-assisted wireless sensor network communication scenario, it is assumed that there is a UAV receiver, several ground sensors and a ground eavesdropper whose location is unknown. In order to improve the total security rate of the network, a physical layer security performance scheme based on TD3 algorithm is proposed to jointly optimize the trajectory and transmission power of the UAV. First, the approximate location of the eavesdrover is estimated based on Bayesian ranging and iterative least squares RSS positioning algorithm, and then the optimal and efficient UAV trajectory and sensor transmission power are selected to maximize the security rate. According to the derived safe rate expression, an improved double delay depth deterministic gradient strategy algorithm based on DDPG is proposed. The simulation results show that using TD3 algorithm to optimize UAV trajectory can effectively improve the safety speed of the system.
Date of Conference: 01-03 March 2024
Date Added to IEEE Xplore: 18 June 2024
ISBN Information:
Conference Location: Shanghai, China
No metrics found for this document.

I. Introduction

Wireless Sensor network (WSN) [1] is widely used in different fields such as agricultural production, environmental monitoring, remote monitoring and intelligent transportation [2]. In recent years, WSN has been increasingly used to transmit private information [3]. Therefore, the realization of secure communication in WSN deserves attention. Physical layer security has become a complementary technology due to the large operational and storage overhead constraints imposed by OSI-based upper-layer solutions.

Contact IEEE to Subscribe

References

References is not available for this document.