dc.contributor.author | Chen, Xinying | |
dc.contributor.author | Zhao, Nan | |
dc.contributor.author | Chang, Zheng | |
dc.contributor.author | Hämäläinen, Timo | |
dc.contributor.author | Wang, Xianbin | |
dc.date.accessioned | 2023-02-21T07:56:01Z | |
dc.date.available | 2023-02-21T07:56:01Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Chen, X., Zhao, N., Chang, Z., Hämäläinen, T., & Wang, X. (2023). UAV-Aided Secure Short-Packet Data Collection and Transmission. <i>IEEE Transactions on Communications</i>, <i>71</i>(4), 2475-2486. <a href="https://doi.org/10.1109/TCOMM.2023.3244954" target="_blank">https://doi.org/10.1109/TCOMM.2023.3244954</a> | |
dc.identifier.other | CONVID_176985901 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85565 | |
dc.description.abstract | Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing the energy efficiency (EE). To solve the non-convex EE maximization problem, we adopt the first-order Taylor expansion to convert it into two convex subproblems, which are then solved via successive convex approximation. Furthermore, we consider the maximum rate of transmission in the UAV data transmission phase to achieve a maximum secrecy rate. The transmit power and the blocklength of UAV-to-BS transmission are jointly optimized subject to the constraints of eavesdropping rate and outage probability. Simulation results are provided to validate the effectiveness of the proposed scheme. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartofseries | IEEE Transactions on Communications | |
dc.rights | CC BY 4.0 | |
dc.subject.other | data collection | |
dc.subject.other | sensors | |
dc.subject.other | autonomous aerial vehicles | |
dc.subject.other | trajectory | |
dc.subject.other | Internet of Things | |
dc.subject.other | wireless sensor networks | |
dc.subject.other | eavesdropping | |
dc.subject.other | finite blocklength | |
dc.subject.other | resource allocation | |
dc.subject.other | secure transmission | |
dc.subject.other | short-packet transmission | |
dc.subject.other | unmanned aerial vehicle | |
dc.title | UAV-Aided Secure Short-Packet Data Collection and Transmission | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202302211824 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 2475-2486 | |
dc.relation.issn | 0090-6778 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 71 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Authors 2023 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | miehittämättömät ilma-alukset | |
dc.subject.yso | sensoriverkot | |
dc.subject.yso | esineiden internet | |
dc.subject.yso | langattomat verkot | |
dc.subject.yso | langaton tiedonsiirto | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24149 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24338 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p24221 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5445 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1109/TCOMM.2023.3244954 | |
dc.type.okm | A1 | |