Abstract

With the flexible mobility and deployment, Unmanned Aerial Vehicles (UAVs) have created a new dimension to provide data collection services for a large number of distributed wireless sensory devices. Unfortunately, the broadcast nature of wireless channels make it hard to guarantee the security of data transmission in Internet of Things (IoTs). In this paper, focusing on the scenario where potential eavesdroppers intend to intercept the data uploading of legitimate nodes, we take the advantages of the UAV technology and the physical-layer security approach to study the Secure Data Collection Problem (SDCP). We first explore the flight scheduling and task allocation, that is, determining which areas to be visited and who to be served by UAVs, to establish favorable communication channels. Then we set up the utility function with secrecy rates and non-negative budget constraints. Due to the coupling between the UAV scheduling and task allocation optimization variables in the SDCP, we construct a surrogate function to achieve decoupling and reformulate SDCP into the SDCP-m problem, which is analyzed and proved to be a nonnegative monotone submodular function subject to a general constraint. Finally, an efficient Cost–Benefit Greedy (CBG) algorithm, which is theoretically analyzed to seek the quantitative value of approximation ratio, is proposed. The simulation results show that the CBG algorithm not only outperforms benchmark algorithms in terms of the average secrecy rate and the iteration number, but also generates a nearly optimal trajectory.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.