Author
Listed:
- Lingfeng Shen
(School of Software, Henan University, Kaifeng 475004, China
Henan International Joint Laboratory of Intelligent Network Theory and Key Technology, Kaifeng 475004, China)
- Jiangtao Nie
(School of Software, Henan University, Kaifeng 475004, China)
- Ming Li
(School of Software, Henan University, Kaifeng 475004, China)
- Guanghui Wang
(School of Software, Henan University, Kaifeng 475004, China
Henan International Joint Laboratory of Intelligent Network Theory and Key Technology, Kaifeng 475004, China)
- Qiankun Zhang
(China Information Technology Designing and Consulting Institute Co., Ltd., Beijing 100048, China)
- Xin He
(School of Software, Henan University, Kaifeng 475004, China)
Abstract
This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with multiple eavesdroppers, formulating the optimal UAV trajectory poses a non-convex and non-differentiable optimization challenge. The paper utilizes the successive convex approximation (SCA) method in conjunction with hypograph theory to address this challenge. First, a set of trajectory increment variables is introduced to replace the original UAV trajectory coordinates, thereby converting the original non-convex problem into a sequence of convex subproblems. Subsequently, hypograph theory is employed to convert these non-differentiable subproblems into standard convex forms, which can be solved using the CVX toolbox. Simulation results demonstrate the UAV’s trajectory fluctuations under different parameters, affirming that trajectory optimization significantly improves PLS performance in IoT systems.
Suggested Citation
Lingfeng Shen & Jiangtao Nie & Ming Li & Guanghui Wang & Qiankun Zhang & Xin He, 2025.
"Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers,"
Future Internet, MDPI, vol. 17(5), pages 1-13, May.
Handle:
RePEc:gam:jftint:v:17:y:2025:i:5:p:225-:d:1658862
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:5:p:225-:d:1658862. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.