Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks: History
Please note this is an old version of this entry, which may differ significantly from the current revision.
Subjects: Telecommunications
Contributor: , , ,

In wireless sensor networks (WSNs), unmanned aerial vehicles (UAVs) are considered an effective data collection tool. The UAV collected the information from all the wireless sensors at the scheduled time and forward it to the fusion center while Eve tries to eavesdrop on this confidential information from the UAV. 

  • unmanned aerial vehicle (UAV)
  • wireless sensor network (WSN)
  • data collection

1. Introduction

Wireless sensor networks (WSNs), owing to their decentralized control and freeform arrangement, have become prevalent across various applications, including intelligent living, weather monitoring, and health tracking [1,2]. While in regions with sturdy network infrastructure, WSNs can effortlessly link up to the internet and transmit data to the collector [3], in far-flung and inconvenient areas like deserts and plateaus where base stations are not readily deployable, WSNs confront insurmountable hurdles in direct communication with the fusion center [4]. Against this backdrop, unmanned aerial vehicles (UAVs) are emerging as a feasible choice for mobile data collectors for WSNs. Thanks to their pliable deployment and user-friendly control, UAVs can effectively overcome the communication gap and provide a reliable mechanism for WSNs in remote locations [5]. In summary, wireless sensor networks, despite their many merits, are limited in their application in regions where network infrastructure is weak or nonexistent. Fortunately, the deployment of UAVs as mobile data collection tools for WSNs offers a solution to this challenge [6].
WSNs typically consist of a plethora of economical wireless ground sensor nodes (GSNs). In most research on secure sensor networks, there are few studies on the lifespan of UAV-assisted sensor networks. Most papers focus on the energy consumption or communication rate issues of UAVs. However, the energy consumption of these sensors poses a potential threat to the WSN’s lifespan [7]. To combat this issue, researchers have proposed a flexible trajectory design of UAVs, which incorporates a sleep and wake-up mechanism to efficiently gather information and preserve GSNs’ energy consumption [8]. To further elucidate, the sleep and wake-up mechanism in WSNs implies that when the GSN is not engaged in any communication with the UAV, it goes into a state of dormancy to conserve energy. Conversely, when the UAV approaches the GSN, the GSN promptly awakens and begins transmitting information to the UAV. However, given the constant movement of the UAV, it is essential to consider the highly dynamic wireless channels between the UAV and the GSNs to avoid any unexpected packet loss [9]. Therefore, reasonable UAV trajectory planning is an indispensable factor that must be taken into account [10].
In addition, the advent of UAVs has made wireless communications a breeze, thanks to their superior information transmission rates [11] and reduced transmit delay [12]. However, their broadcast characteristics make them a susceptible target for illegal eavesdroppers (Eve) [13]. Fortunately, physical layer security, a promising secure communication technology that is extensively employed, plays a pivotal role in preventing the prying eyes of Eve [14]. But here is the catch: in practice, it is very ideal to assume that the channel state information (CSI) of Eve is completely known [15]. Therefore, it is meaningful to discuss UAV-assisted secure communication when the CSI of Eve is unknown.

2. The Application of UAVs in Secure WSNs

UAVs have a wide application space in WSNs, which cannot directly communicate with the data center. Ref. [16] discuss a UAV-powered WSN, where the UAV transmits energy to the ground sensor through the antenna, and the sensor will send the collected information to the UAV after receiving it. The author minimizes the time required for the UAV to collect information by jointly optimizing the height of the UAV and the antenna beamwidth. In [17], the authors proposed a task offloading mechanism learning algorithm, which can predict the queuing delay of all UAVs, reduce network overhead and increase user satisfaction. Ref. [18] considered a large-scale WSN where some GSN may not be able to upload information for a long time, resulting in insufficient storage capacity. The authors proposed a data collection strategy to minimize the data loss by jointly optimizing the sensor scheduling and the UAV’s trajectory. Refs. [19,20] investigated the energy consumption problem of the UAV-assisted WSN. Zhu et al. [19] proposed a novel optimization algorithm based on a deep reinforcement learning technique that can effectively reduce the UAV’s consumption. Beak et al. [20] model the UAV collecting ground sensor information as a non-convex problem, and optimize the trajectory by the Voronoi diagram to maximize the residual energy after the sensor transmits information.

3. Security Performance in UAV-Enabled WSNs

Since UAVs are more vulnerable to eavesdropping by illegal parties, some recent studies have considered the physical layer security of UAV-assisted WSNs. Ref. [21] investigate a UAV-assisted WSN with multiple eavesdroppers, and considered a downlink secure transmission scheme based on power splitting, where the transmission power of the UAV is divided into information transmission and noise generation. The authors proposed an optimization algorithm to maximize the minimum average secrecy rate. In [22], the authors considered how to improve the quality of service (QoS) of the wireless networks, joint optimization of the video levels selection, power allocation, and a UAV trajectory algorithm is proposed to maximize the ratio of power consumption to video quality. Refs. [23,24] discussed secrecy capacity maximum problem in cache-enabled UAV communications. Ref. [23] investigate a UAV-enabled network with D2D communications, where the UAV and D2D transmitter are equipped with caches that the users can directly obtain high-frequency communication requirements without communicating with the base station. In [24], the caching-equipped UAV is used to replace the small cell to communicate with the user, and the replaced cell is used as the interference source to send interference signals to Eve to improve the security performance of the system.

4. Secrecy Energy Efficiency in UAV-Enabled WSN

To realize the goal of energy-efficient communication while ensuring communication, secrecy energy efficiency (SEE) has increasingly become hot research in UAV-assisted WSNs. Li et al. [25] discuss two main challenges in a UAV-enabled WSN: the UAV’s energy consumption and secure transmission. The authors proposed a low-complexity iterative algorithm to maximize the secrecy energy efficiency. In [26], the authors discussed a multi-carrier multi-UAV enabled WSN, where the UAVs use Cooperative Rate-Splitting (CRS) technique to protect the communication between UAVs and the ground sensors, and proposed a secure resource allocation alternating iterative algorithm to maximize the UAV’s SEE by jointly optimizing the resource allocation and the ground sensors’ association matrix. Refs. [27,28] both introduced the simultaneous wireless information and power transfer (SWIPT) technology when considering the maximization of Secrecy Energy Efficiency, among which Ref. [27] assumed that the users divide the received signal into two parts, which are used for energy collection and information decoding, respectively. Ref. [28] assumed that only known the channel distribution information (CDI) of Eves. In addition, the dual-layer PS receiver architecture is introduced to solve the problem of energy harvesting (EH) circuits’ performance limitation.

This entry is adapted from the peer-reviewed paper 10.3390/s23239411

This entry is offline, you can click here to edit this entry!
Video Production Service