Skip to main content

Advertisement

Log in

Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

With the development of the unmanned aerial vehicle (UAV), UAV is widely used in various fields, such as Industrial IoT. Usually, the communication between UAV and the ground node is the line-of-sight (LoS) transmission. However, the performance of the UAV wireless communication system degrades greatly as the LoS links are prone to deteriorate in some complex communication scenarios. Fortunately, the quality of the communication link can be improved effectively by placing reconfigurable intelligent surfaces (RISs) into the ground nodes and UAV. Motivated by this, by optimizing the RIS passive beamforming, the ground user association, the UAV trajectory and transmit power synthetically, in this paper, we propose a secure RIS-assisted UAV wireless communication system based on multiple ground users to maximize the minimum average security rate among ground users. Also, we conduct an efficient algorithm based on the block coordinate descent (BCD) and successive convex approximation (SCA) methods to solution the no-convex optimization problem. Compared with the benchmark algorithm, the simulation results show that the proposed algorithm can improve the security performance of the RIS-assisted UAV wireless communication system effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42. https://doi.org/10.1109/MCOM.2016.7470933

    Article  Google Scholar 

  2. Wu Q, Zeng Y, Zhang R (2018) Joint trajectory and communication design for multi-UAV enabled wireless networks. IEEE Trans Wireless Commun 17(3):2109–2121. https://doi.org/10.1109/TWC.2017.2789293

    Article  Google Scholar 

  3. Almohamad A et al (2020) Smart and secure wireless communications via reflecting intelligent surfaces: a short survey. IEEE Open J Commun Soc 1:1442–1456. https://doi.org/10.1109/OJCOMS.2020.3023731

    Article  Google Scholar 

  4. Khan ABF, Anandharaj G (2020) A multi-layer security approach for DDoS detection in Internet of Things. Int J Intel Unmanned Syst. https://doi.org/10.1108/IJIUS-06-2019-0029

    Article  Google Scholar 

  5. Khan ABF, Anandharaj G (2021) A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT. Wirel Pers Commun. https://doi.org/10.1007/s11277-021-08391-6

    Article  Google Scholar 

  6. Khan ABF, Anandharaj G (2019) A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Appl Sci 1(12):1–7. https://doi.org/10.1016/j.eij.2020.05.004

    Article  Google Scholar 

  7. Khan ABF, Anandharaj G (2021) Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot. Egypt Inform J 22(2):119–124. https://doi.org/10.1007/s11277-021-08391-6

    Article  Google Scholar 

  8. Ferozkhan AB (2021) The embedded framework for securing the Internet of Things. J Eng Res. https://doi.org/10.36909/jer.v9i2.9823

    Article  Google Scholar 

  9. Zhang G, Wu Q, Cui M, Zhang R (2019) Securing UAV communications via joint trajectory and power control. IEEE Trans Wireless Commun 18(2):1376–1389. https://doi.org/10.1109/TWC.2019.2892461

    Article  Google Scholar 

  10. Li A, Wu Q, Zhang R (2019) UAV-enabled cooperative jamming for improving secrecy of ground wiretap channel. IEEE Wirel Commun Lett 8(1):181–184. https://doi.org/10.1109/LWC.2018.2865774

    Article  Google Scholar 

  11. Li Y, Zhang R, Zhang J, Yang L (2020) Cooperative jamming via spectrum sharing for secure UAV communications. IEEE Wirel Commun Lett 9(3):326–330. https://doi.org/10.1109/LWC.2019.2953725

    Article  Google Scholar 

  12. Cui M, Zhang G, Wu Q, Ng DWK (2018) Robust trajectory and transmit power design for secure UAV communications. IEEE Trans Veh Technol 67(9):9042–9046. https://doi.org/10.1109/TVT.2018.2849644

    Article  Google Scholar 

  13. Li S, Duo B, Yuan X, Liang Y, Di Renzo M (2020) Reconfigurable intelligent surface assisted UAV communication: joint trajectory design and passive beamforming. IEEE Wirel Commun Lett 9(5):716–720. https://doi.org/10.1109/LWC.2020.2966705

    Article  Google Scholar 

  14. Wu Q, Zhang R (2020) Towards smart and reconfigurable environment: intelligent reflecting surface aided wireless network. IEEE Commun Mag 58(1):106–112. https://doi.org/10.1109/MCOM.001.1900107

    Article  Google Scholar 

  15. Khaleel A, Basar E (2020) Reconfigurable intelligent surface-empowered MIMO systems. IEEE Syst J. https://doi.org/10.1109/JSYST.2020.3011987

    Article  Google Scholar 

  16. Yang L, Yang J, Xie W, Hasna MO, Tsiftsis T, Renzo MD (2020) Secrecy performance analysis of RIS-aided wireless communication systems. IEEE Trans Veh Technol 69(10):12296–12300. https://doi.org/10.1109/TVT.2020.3007521

    Article  Google Scholar 

  17. Hou T, Liu Y, Song Z, Sun X, Chen Y, Hanzo L (2020) Reconfigurable intelligent surface aided NOMA networks. IEEE J Sel Areas Commun 38(11):2575–2588. https://doi.org/10.1109/JSAC.2020.3007039

    Article  Google Scholar 

  18. Sixian L, Bin D, Di Renzo M, Meixia T, Xiaojun Y (2020) Robust secure UAV communications with the aid of reconfigurable intelligent surfaces. arXiv preprint arXiv: 2008.09404

  19. Zhang G, Wu Q, Cui M et al (2019) Securing UAV communications via joint trajectory and power control. IEEE Trans Wireless Commun 18(2):1376–1389

    Article  Google Scholar 

  20. Cui M, Zhang G, Wu Q et al (2018) Robust trajectory and transmit power design for secure UAV communications. IEEE Trans Veh Technol 67(9):9042–9046

    Article  Google Scholar 

  21. Li Z, Chen M, Pan C et al (2019) Joint trajectory and communication design for secure UAV networks. IEEE Commun Lett 23(4):636–639

    Article  Google Scholar 

  22. Li A, Zhang W (2018) Mobile jammer-aided secure UAV communications via trajectory design and power control. China Commun 15(8):141–151

    Article  Google Scholar 

  23. Li Y, Zhang R, Zhang J et al (2019) Cooperative jamming via spectrum sharing for secure UAV communications. IEEE Wirel Commun Lett 9(3):326–330

    Article  Google Scholar 

  24. Duo B, Wu Q, Yuan X et al (2020) Energy efficiency maximization for full-duplex UAV secrecy communication. IEEE Trans Veh Technol 69(4):4590–4595

    Article  Google Scholar 

  25. Ge L, Dong P, Zhang H et al (2020) Joint beamforming and trajectory optimization for intelligent reflecting surfaces-assisted UAV communications. IEEE Access 8:78702–78712

    Article  Google Scholar 

  26. Fang S, Chen G, Li Y (2020) Joint optimization for secure intelligent reflecting surface assisted UAV networks. IEEE Wireless Commun Lett 10:276–280

    Article  Google Scholar 

  27. Sixian L, Bin D, Di Renzo M, et al. (2020) Robust secure UAV communications with the aid of reconfigurable intelligent surfaces. arXiv preprint arXiv: 2 008.09404

  28. Cui M, Zhang G, Zhang R (2019) Secure wireless communication via intelligent reflecting surface. IEEE Wirel Commun Lett 8(5):1410–1414. https://doi.org/10.1109/LWC.2019.2919685

    Article  Google Scholar 

  29. Long H, Chen M, Yang Z, et al. (2020) Reflections in the sky: joint trajectory and passive beamforming design for secure UAV networks with reconfigurable intelligent surface. arXiv preprint https://arxiv.org/abs/2005.10559

  30. S. Fang, G. Chen and Y. Li, "Joint Optimization for Secure Intelligent Reflecting Surface Assisted UAV Networks," in IEEE Wireless Communications Letters, doi: https://doi.org/10.1109/LWC.2020.3027969.

  31. Zhu L, Zhang J, Xiao Z, Cao X, Wu DO, Xia X (2019) 3-D Beamforming for Flexible Coverage in Millimeter-Wave UAV Communications. IEEE Wireless Communications Letters 8(3):837–840. https://doi.org/10.1109/LWC.2019.2895597

    Article  Google Scholar 

  32. Grant, Michael, and Stephen Boyd. "CVX: Matlab software for disciplined convex programming, version 2.1." (2014).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenwu Xie.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Xie, C., Xie, W. et al. Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT. J Supercomput 78, 5957–5973 (2022). https://doi.org/10.1007/s11227-021-04095-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-04095-7

Keywords

Navigation