| With the rapid development of technology,the production cost of UAVs is gradually reduced.In the past,UAVs could only be seen on the battlefield,but now civilian equipment such as smart cities,smart construction sites,smart grids,and smart power stations are also using drones to perform work.UAVs quickly enter thousands of households from the military field.Because of the controllability of the flight trajectory and the openness of the line-of-sight link for interaction with ground users,UAVs have also become an important research object for scholars.However,as the number of drones increases,there may be many types of attacks against the network of drone systems.UAVs are flying in a constantly moving environment where the propagation link conditions are constantly changing,so the use of adaptive radios is necessary.However,adaptive radio parameters such as the lineof-sight link of UAV communication and the opening of wireless channels are likely to be broken,causing physical layer security problems,and UAV data is likely to be eavesdropped by ground or air equipment.This paper introduces physical layer security technology to eliminate the negative impact of eavesdroppers on UAV channels,and proposes an information security transmission scheme that introduces interferenceassisted UAVs when different scenarios are eavesdropped by different types of eavesdroppers.The innovations and main research points of this paper are as follows:For the scenario where the UAV is used as a relay,considering that the communication link between two users is destroyed and direct communication cannot be performed,the UAV is used to receive information from the source node and forward it to the destination user.There are multiple The eavesdropper in the air,the eavesdropper moves in the sphere in the air and the specific information position is incomplete.By sending a friendly jamming auxiliary UAV close to the eavesdropper,the quality of the eavesdropping channel is reduced,so as to maximize the secrecy rate of the system in the worst case.Use the time discrete method to decompose the continuous time into discrete time periods for mathematical modeling;use the convex optimization method to optimize the time scheduling of the system,the power and trajectory of the drone;use the S-program to eliminate the location of the eavesdropper with deficient problem and finally find the optimal solution of the objective function.In order to verify the impact of the eavesdropper’s range of motion on the trajectory and performance of the UAV,this paper explores two different eavesdroppers’ radii of motion;in order to verify the positive effect of additional jamming-assisted UAVs on the system’s confidentiality rate,this paper adopts the traditional single UAV to compare the perforce with it,and finally the simulation diagram is given to prove the effectiveness of the proposed design.For the scenario where the UAV is used as a mobile edge computing device,consider that there are multiple users on the ground who have offloading requirements for computing tasks.The user calculates part of the task data locally,and the remaining unfinished tasks are offloaded to the UAV for calculation.There are multiple users on the ground.Eavesdroppers with known locations steal data offloaded by users on the ground.By adding interference to assist the UAV to send artificial noise to reduce the amount of data eavesdropping,in order to achieve the dual goals of maximizing the system’s confidentiality rate and minimizing the total energy of the user,and secondly,the energy impact of the mission calculation UAV on the system is also considered.The impact of confidentiality,described as a joint optimization problem of UAV and ground user scheduling,user offload rate and power,and UAV trajectory.Adopt successive convex approximation method,simplify the non-convex objective function and constraints of the system into Taylor expansion form,find the local optimal solution,and then iterate alternately until convergence.Finally,the system’s secrecy rate and the total user energy value are obtained by simulation.Compared with other benchmark methods,the design of the joint optimization dual-UAV trajectory proposed in this paper has good performance in maximizing the system secrecy rate and minimizing the total user energy. |