Journal on Communications ›› 2024, Vol. 45 ›› Issue (2): 115-126.doi: 10.11959/j.issn.1000-436x.2024014

• Papers • Previous Articles    

Resource allocation algorithm for secure communication in UAV-assisted D2D communication network

Xiaowan ZENG1, Haijun WANG2, Lei HUANG2, Dongtang MA2   

  1. 1 Unit 92689 of the Chinese People’s Liberation Army, Zhanjiang 524000, China
    2 College of Electronic Science and Technology, National University of Defense Technology, Changsha 410073, China
  • Revised:2023-09-27 Online:2024-02-01 Published:2024-02-01
  • Supported by:
    The National Natural Science Foundation of China(61372099);The National Natural Science Foundation of China(61931020);The National Natural Science Foundation of China(62371462)

Abstract:

To solve the problems of energy limitation, spectrum shortage, and serious co-frequency interference in the unmanned aerial vehicle (UAV)-assisted D2D (device-to-device) communication network under passive eavesdropping, the concept of the network secrecy energy efficiency was introduced by taking into account the secrecy rate and transmit power constraints of each user.Based on the physical layer secure transmission theory, the joint optimization problem of spectrum multiplexing and power control strategies was investigated to maximize the network secrecy energy efficiency.The problem was a nonlinear nonconvex problem, a resource allocation algorithm combining Dinkelbach’s algorithm and the convex approximation algorithm was proposed to transform the nonconvex optimization problem into a geometric planning problem through the convex approximation algorithm and ensure that the original problem converges to the global optimal solution by Dinkelbach’s algorithm.Simulation results show that the proposed algorithm can effectively mitigate the co-channel interference, improve the network secrecy energy efficiency, and balance the relationship between the secure communication performance and power consumption of the network.

Key words: UAV, D2D communication, energy efficiency, resource allocation, physical layer security

CLC Number: 

No Suggested Reading articles found!