The Internet-of-Things (IoT) will significantly change both industrial manufacturing and our daily lives. Data collection and three-dimensional (3D) positioning of IoT devices are two indispensable services of such networks. However, in conventional networks, only terrestrial base stations (BSs) are used to provide these two services. On the one hand, this leads to high energy consumption for devices transmitting at cell edges. On the other hand, terrestrial BSs are relatively close in height, resulting in poor performance of device positioning in elevation. Due to their high maneuverability and flexible deployment, unmanned aerial vehicles (UAVs) could be a promising technology to overcome the above shortcomings. In this paper, we propose a novel UAV-assisted IoT network, in which a low-altitude UAV platform is employed as both a mobile data collector and an aerial anchor node to assist terrestrial BSs in data collection and device positioning. We aim to minimize the maximum energy consumption of all devices by jointly optimizing the UAV trajectory and devices' transmission schedule over time, while ensuring the reliability of data collection and required 3D positioning performance. This formulation is a mixed-integer non-convex optimization problem, and an efficient differential evolution (DE) based method is proposed for solving it. Numerical results demonstrate that the proposed network and optimization method achieve significant performance gains in both energy efficient data collection and 3D device positioning, as compared with a conventional terrestrial IoT network.
This paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The spatial locations of legitimate users (LUs) and eavesdroppers are modeled by invoking stochastic geometry. To characterize the security performance, new exact and asymptotic expressions of secrecy outage probability (SOP) are derived for both code-domain NOMA (CD-NOMA) and power-domain NOMA (PD-NOMA), in which imperfect successive interference cancellation (ipSIC) and perfect SIC (pSIC) are taken into account. For the external eavesdropping scenario, the secrecy diversity orders by a pair of LUs (the n-th user and m-th user) for CD/PD-NOMA are obtained. Analytical results make known that the diversity orders of the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA are equal to zero/K and zero/one, respectively. The diversity orders of the m-th user are equal to K/one for CD/PD-NOMA. For the internal eavesdropping scenario, we examine the analysis of secrecy diversity order and observe that the m-th user to wiretap the n-th user with ipSIC/pSIC for CD-NOMA and PD-NOMA provide the diversity orders of zero/K and zero/one, respectively, which is consistent with external eavesdropping scenario. Numerical results are present to confirm the accuracy of the analytical results developed and show that: i) The secrecy outage behavior of the n-th user is superior to that of the m-th user; ii) By increasing the number of subcarriers, CD-NOMA is capable of achieving a larger secrecy diversity gain compared to PD-NOMA.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.