Next Article in Journal
Modification of a Constitutive Model for Gassy Clay
Next Article in Special Issue
A Novel Region-Construction Method for Multi-USV Cooperative Target Allocation in Air–Ocean Integrated Environments
Previous Article in Journal
Numerical Simulation of the Interaction between Solitary Waves and Underwater Barriers Using a VPM–THINC/QQ-Coupled Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV’s Location Optimization

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
College of Information Science and Engineering, Jiaxing University, Jiaxing 314001, China
*
Authors to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2023, 11(5), 1012; https://doi.org/10.3390/jmse11051012
Submission received: 11 April 2023 / Revised: 28 April 2023 / Accepted: 7 May 2023 / Published: 9 May 2023

Abstract

:
This paper investigates the secure rate-splitting multiple access (RSMA) cooperation for the maritime cognitive unmanned aerial vehicle (UAV) network. Specifically, we first take into account the primary privacy information and the secondary maritime UAV’s quality of service. Then, we formulate an optimization problem to maximize UAV’s transmission rate according to the RSMA decoding principle and primary information security requirements. To solve this non-convex problem, we design a CPFS algorithm to allocate the transmit power and adjust the UAV’s location. In addition, the worst case is analyzed, which is the lower-bound secondary transmission rate. Finally, simulation results indicate that the proposed scheme improves the UAV’s transmission rate compared with the traditional schemes.

1. Introduction

The fifth generation mobile technique provides support for ultra-reliable low-latency services in order to facilitate global interconnections among space, ground, and maritime devices [1,2]. As a critical component of the global Internet of Things, maritime wireless networks can serve multiple functions, including ship navigation, unmanned underwater vehicle (UUV) control, as well as maritime real-time tracking and positioning [3,4]. As the global economy begins to recover after COVID-19, the marine wireless communication network is expected to support a significant number of devices for ocean activities. In addition to maritime satellites, shore-based maritime networks are an important approach to realize most maritime applications. Moreover, the terrestrial base state along the coastline is built to support maritime communications, which has been widely investigated in the current research [5].
Benefiting from their flexible deployment and low cost, unmanned aerial vehicles (UAVs) have been widely adopted in maritime networks. In the UAV-assisted networks, the power allocation and UAV’s position optimization have been widely discussed. In [6], the authors studied the power allocation for the transmit power and jamming power to securely transmit the privacy information. In [7], the power of the users was minimized by considering the UAV’s coverage. In addition, the downlink and uplink power allocation for the UAV networks was investigated in [8]. In addition to the power allocation, the position of a UAV will affect the network performance. In [9], the UAV’s location was optimized for the UAV relay networks. Then, this work was extended to the two-way networks with optimal UAV’s location [10]. Moreover, the joint UAV’s location and power allocation was studied in [11].
Due to the limited available spectrum, maritime wireless transmissions face considerable interference challenges [12,13]. The cognitive radio technique can alleviate the spectrum shortage situation by allowing the secondary users to utilize the primary spectrum and control the effect to the primary transmissions. In addition to cognitive radio techniques, rate-splitting multiple access (RSMA) is one of the most promising techniques with high spectral efficiency for the next generation networks. In RSMA systems, the messages are split into two or more parts and the receiver should recover all parts to successfully decode the message. Benefiting from the flexible management of each part, inter-user interference could be minimized [14]. In the cognitive radio network, the authors achieved the high ergodic rate of uplink cognitive transmissions [15]. In addition, in [16], the transmit power was optimally allocated, based on which the performance was compared with the non-orthogonal multiple access (NOMA) scheme. Considering the limited energy of the devices, the authors investigated the power allocation for the RSMA-based cognitive radio networks constrained by the energy harvesting and primary inference requirements [17].
The open transmission media of maritime wireless networks makes privacy information sensitive to eavesdropping. In addition to the encryption methods, physical-layer security techniques can protect the privacy of information by utilizing wiretap coding. Adopting a cooperative jamming scheme, the researchers in [18] designed a cooperation secure transmission strategy with considering multiple cognitive users and multiple carriers. In addition, the RSMA scheme was adopted to simultaneously communicate with the secondary user and jam the eavesdropper while controlling the inference to the primary users. Extending to the satellite networks, the authors in [19] proposed a secure and energy-efficient cognitive beamforming method for the satellite systems, where the analytical and asymptotic secrecy outage probability were derived under interfering and imperfect channel state information (CSI). Moreover, the above works were extended to the multiple eavesdropper’s scenarios, and a new secure-energy problem was formulated to optimally allocate the transmit power in cognitive satellite-terrestrial networks [20]. When the RSMA users were distrustful of each other, the outage probabilities were analyzed in [21]. Assisted by the intelligent reflecting surface, the secrecy rate was maximized in [22], where the transmit power and phase shifts were optimally designed.
The above works have enhanced the quality of services (QoS) of the RSMA-based networks. Nevertheless, there are some deficiencies to be addressed. In [14,15,16,17], the cognitive RSMA networks are investigated, based on which the power is allocated. However, the information security problem has not yet been investigated. In [18,19,20,21,22], the information security problem for the RSMA is studied, while ignoring the assistance from the secondary networks. Moreover, the above works have not considered the actual application requirements in maritime networks. For example, utilizing the UAV as a secondary transmitter (ST) is a promising approach for improving spectrum efficiency in maritime cognitive radio networks [23].
Motivated by the above discussions, this paper studied the cognitive secure RSMA transmission problem in maritime networks, where the cooperation between the primary and secondary networks is considered to support both networks’ QoS requirements. To the best of the authors’ knowledge, this is the first work that investigates the secure RSMA cooperation for the maritime cognitive networks. Specifically, in the proposed scheme, the secondary maritime UAV’s transmission can not only broadcast secondary information but also protect the primary transmission. Through the flexible allocation of the transmission resources, both users’ QoS can be provided. We formulate an optimization problem to maximize the UAV’s transmission rate under the RSMA decoding principle and primary information security requirements. We design a combined particle swarm optimization and fish swarm optimization (CPFS) algorithm to allocate the transmit power and design the UAV’s location. In addition, the worst case is analyzed, which is considered as the lower-bound to the UAV’s transmission. The main contributions are summarized as follows:
  • We design a novel secure RSMA strategy for the maritime cognitive to support both primary and maritime UAV’s transmissions. In the proposed strategy, the secondary maritime UAV’s transmission can not only broadcast secondary information but also protect the primary transmission. Through the flexible allocation of the transmission resources, both users’ QoS can be provided.
  • We formulate an optimization problem to maximize the UAV’s transmission rate under the RSMA decoding principle and primary information security requirements. To solve the above non-convex problem, we design a CPFS algorithm to allocate the transmit power and design the UAV’s location. In addition, the worst case is analyzed, which is considered as the lower-bound to the UAV’s transmission.

2. System Model and Problem Formulation

The maritime network is shown in Figure 1, where the primary maritime ship (PT) broadcasts the privacy signal to the base station (BS), threatened by an eavesdropper (Eve). To protect PT’s transmission, a cognitive UAV (ST) is deployed to protect PT’s secure communication, and access the spectrum for the secondary transmission. In addition, the RSMA technique is adopted to process PT’s privacy signal and the UAV’s signal, and provide the primary and secondary users’ requirements. This system can capture the application of the maritime sensor networks, where the maritime cognitive UAV collects the sensing data by occupying the limited spectrum, while the primary maritime user securely forwards it information to the BS. In order to clearly show the performance of the two systems, we assume that all users have only one antenna.
In the proposed system, the locations of PT , BS , ST , and  Eve are denoted as x p , y p , x b , y b , x s , y s , and  x e , y e , respectively. The altitude of UAV is fixed at h. The flat fading model is adopted for the links of PT BS and PT Eve . We denote the channel variables of PT BS and PT Eve as h p b and h p e , respectively. In addition, their channel power gains are denoted as g p b = h p b 2 and g p e = h p e 2 , which follow exponential distributions with parameters 1 λ p b and 1 λ p e , respectively. Since there are no obstacles during the transmission links ST BS and ST Eve , the line-of-sight links are dominant. Therefore, the channel variables of links ST BS and ST Eve are derived as
h s b = β 0 d s b β 1 2 , h s e = β 0 d s e β 1 2 ,
where β 0 is the path loss with distance 1 m, d s b is the distance between the ST and BS with d s b = x s x b 2 + y s y b 2 + h 2 , d s e is the distance between the ST and Eve with d s e = x s x e 2 + y s y e 2 + h 2 , and  β 1 is the path fading factor. In addition, the channel power gain of g s b and g s e are derived as g s b = h s b 2 and g s e = h s e 2 , respectively. The instantaneous CSI of g p b is available. However, for practical consideration, the wiretap CSI g p e cannot be acquired and the channel distribution information is available. PT’s transmit power and ST’s transmit power are denoted as P p and P s , respectively. In addition, we assume that all noises are cyclic white Gaussian noise with CN 0 , N 0 . In the following, we will illustrate the information transmission process.
In the considered system, the RSMA is adopted for cooperative transmissions. Specifically, ST’s signal is divided into two parts: x s 1 and x s 2 , with  E { x s 1 2 } = 1 and E { x s 2 2 } = 1 , respectively, where E denotes the expectation operation. In addition, x s 1 and x s 2 are transmitted with power α P s and 1 α P s , respectively, where α is the power allocation parameter. The primary system adopts the fixed rate R b to transmit PT’s information, which is denoted as x p with E { x p 2 } = 1 . Therefore, the received signals at the BS are derived as
y b = P p h p b x p + α P s h s b x s 1 + 1 α P s h s b x s 2 + n b ,
where α is the secondary power allocation parameter, and  n b is the noise at the BS. Eve tries to eavesdrop the signals as
y e = P p h p e x p + α P s h s e x s 1 + 1 α P s h s e x s 2 + n e ,
where n e is the received noise at Eve.
According to the RSMA strategy, the BS first decodes x s 1 with rate R s 1 b as
R s 1 b = log 2 1 + α P s g s b P p g p b + 1 α P s g s b + N 0 .
Then, the BS cancels x s 1 and decodes x p with rate R p b as
R p b = log 2 1 + P p g p b 1 α P s g s b + N 0 .
When x p is successfully decoded, the BS cancels x p and decodes x s 2 with rate R s 2 b as
R s 2 b = log 2 1 + 1 α P s g s b N 0 .
Then, the total secondary transmission rate is derived as R s 1 b + R s 2 b .
Similarly, the Eve also decodes the received signal to eavesdrop on the primary information. According to the RSMA strategy, Eve first decodes x s 1 with rate as
R s 1 e = log 2 1 + α P s g s e P p g p e + 1 α P s g s e + N 0 .
In order to successfully decode the secondary information, R s 1 e should be larger than R s , where R s is the secondary target rate. Under this condition, Eve will cancel x s 1 and decode x p with rate as
R p e , 2 = log 2 1 + P p g p e 1 α P s g s e + N 0 .
However, if  R s 1 e < R s , Eve will decode PT’s signal by trading the other signals as interference with the rate as
R p e , 1 = log 2 1 + P p g p e α P s g s e + 1 α P s g s e + N 0 .
We denote R s 1 e < R s as Case 1 and denote R s 1 e R s as Case 2. Therefore, the probability of Case 1 is derived as
P c a s e 1 = Pr R s 1 e < R s = Pr log 2 1 + α P s g s e P p g p e + 1 α P s g s e + N 0 < R e = Pr α P s g s e P p g p e + 1 α P s g s e + N 0 < 2 R e 1 = Pr g p e > α P s g s e 2 R e 1 1 α P s g s e + N 0 2 R e 1 P p = exp P s g s e 1 α P s g s e 2 R e 2 R e 1 N 0 λ p e 2 R e 1 P p .
The probability of Case 2 is 1 P c a s e 1 .
Since the instantaneous CSI of the wiretap channel is unavailable, we will adopt the secrecy outage probability to denote the security requirement. Since the primary user will transmit with the fixed rate, the secrecy outage probability is derived as
P s e c , o 1 = Pr R b R p e , 1 < R sec = Pr R p e , 1 > R b R sec = Pr log 2 1 + P p g p e α P s g s e + 1 α P s g s e + N 0 > R e = Pr P p g p e α P s g s e + 1 α P s g s e + N 0 > 2 R e 1 = Pr g p e > 2 R e 1 P s g s e + N 0 P p = 2 R e 1 P s g s e + N 0 λ p e P p ,
where R e = R b R s e c and R s e c is the target secrecy rate. For Case 2, the secrecy outage probability is derived as
P s e c , o 2 = Pr R b R p e , 2 < R sec = Pr R p e , 2 > R b R sec = Pr log 2 1 + P p g p e 1 α P s g s e + N 0 > R e = Pr P p g p e 1 α P s g s e + N 0 > 2 R e 1 = Pr g p e > 2 R e 1 1 α P s g s e + N 0 P p = 2 R e 1 1 α P s g s e + N 0 λ p e P p .
Then, PT’s average secrecy outage probability is given by
P s e c , o = P c a s e 1 P s e c , o 1 + P c a s e 2 P s e c , o 2 .
In the next section, we will allocate ST’s power and optimize UAV’s location to maximize the UAV’s rate while satisfying the PT’s privacy requirement.

3. RSMA-Based Cognitive Maritime Transmission Strategy

In order to maximize the secondary transmission rate and protect the primary transmission rate, we formulate the optimization problem as
P 1 : max α , X R s 1 b + R s 2 b
s . t . R s 1 b R s ,
R p b R p ,
P c a s e 1 P s e c , o 1 + P c a s e 2 P s e c , o 2 ξ ,
0 α 1 ,
where (14a) is the secondary transmission rate, (14b) indicates that the signal x s 1 can be successfully decoded and the secondary information x s 1 is successfully transmitted, (14c) indicates that the signal x p can be successfully decoded and the primary information x p is successfully transmitted, and (14d) is the primary secure transmission requirement. For P 1 , since the optimal variables are coupled with each other and the (14d) is non-convex, it is difficult to directly derive the power allocation parameter α and UAV’s location. In the following, an iterative algorithm is designed to solve P1.

3.1. Power Allocation

Lemma 1.
R s t o t is a monotonically increasing function of α.
Proof. 
For R s 1 b , its first-order derivation is derived as shown in (15).
d R s 1 b d α = P s g s b P p g p b + 1 α P s g s b + N 0 + α P s g s b 2 P p g p b + 1 α P s g s b + N 0 P p g p b + P s g s b + N 0 ln 2 = P s g s b P p g p b + P s g s b + N 0 ln 2
+ α P s g s b 2 P p g p b + 1 α P s g s b + N 0 P p g p b + P s g s b + N 0 ln 2
For R s 2 b , its first-order derivation is derived as
d R s 2 b d α = P s g s b N 0 + 1 α P s g s b ln 2 .
Therefore, the first-order derivation of R s t o t is derived as shown in (18).
d R s t o t d α = P s g s b P p g p b + P s g s b + N 0 ln 2 + α P s g s b 2 P p g p b + 1 α P s g s b + N 0 P p g p b + P s g s b + N 0 ln 2 + P s g s b N 0 + 1 α P s g s b ln 2 = P s g s b ln 2 N 0 + 1 α P s g s b P p g p b + P s g s b + N 0 N 0 + 1 α P s g s b P p g p b + P s g s b + N 0 + α P s g s b P p g p b + 1 α P s g s b + N 0 P p g p b + P s g s b + N 0 = P s g s b P p g p b + P s g s b + N 0 ln 2 α P s g s b P p g p b N 0 + 1 α P s g s b + α P s g s b P p g p b + 1 α P s g s b + N 0
Since α P s g s b P p g p b N 0 + 1 α P s g s b is less than α P s g s b P p g p b + 1 α P s g s b + N 0 , d R s t o t d α < 0 . Therefore, R s t o t is a monotonically increasing function with respect to α .    □
In addition, for (14b), we can derive
R s 1 b = log 2 1 + α P s g s b P p g p b + 1 α P s g s b + N 0 R s 2 R s α P s g s b 2 R s 1 P p g p b + P s g s b + N 0 α 2 R s 1 P p g p b + P s g s b + N 0 2 R s P s g s b = α 1 .
For (14c), we can derive
R s 2 b = log 2 1 + 1 α P s g s b N 0 R p α 1 2 R p 1 N 0 P s g s b = α 2 .
For (14d), we denote f α = P c a s e 1 P s e c , o 1 + P c a s e 2 P s e c , o 2 , and  f α can be rewritten as (21). We can observe that (21) is a monotonically decreasing function of α . Therefore, α 3 satisfies that f α 3 < ξ when α > α 3 .
f α = exp P s g s e 1 α P s g s e 2 R e 2 R e 1 N 0 λ p e 2 R e 1 P p 2 R e 1 P s g s e + N 0 λ p e P p + 1 exp P s g s e 1 α P s g s e 2 R e 2 R e 1 N 0 λ p e 2 R e 1 P p 2 R e 1 1 α P s g s e + N 0 λ p e P p = 2 R e 1 1 α P s g s e + N 0 λ p e P p + exp P s g s e 1 α P s g s e 2 R e 2 R e 1 N 0 λ p e 2 R e 1 P p × 2 R e 1 P s g s e + N 0 2 R e 1 1 α P s g s e + N 0 λ p e P p = 2 R e 1 1 α P s g s e + N 0 λ p e P p + 2 R e 1 α P s g s e λ p e P p exp P s g s e 1 α P s g s e 2 R e 2 R e 1 N 0 λ p e 2 R e 1 P p .
Therefore, the sub-optimal α * is derived as α * = max α 1 , α 3 under the condition of 0 max α 1 , α 3 α 2 1 .

3.2. UAV’s Location Optimization

For the UAV’s location, we adopt the CPFS algorithm to solve P1 with respect to X . Particle swarm optimization (PSO) imitates the foraging behavior of birds by utilizing information exchange methods and strategies employed by birds during the process of searching for food, which is widely adopted to derive the UAV’s location [24,25]. The PSO algorithm searches the global optimum by following the currently searched optimum, which is easy to implement and fast to converge. Although the PSO algorithm has good convergence performance, it falls into the local optimum with high probability [26]. The fish swarm optimization (FSO) can achieve a global optimization algorithm [27]. Combining PSO and FSO will take advantage of both algorithms to quickly derive the optimal target. Therefore, we combine PSO and FSO to optimize UAV’s position and design a CPFS algorithm. In the CPFS algorithm, the updates of the speed and position are shown as
V i t + 1 = ω V i t + C 1 r a n d o m 0 , 1 P i b e s t t X i t + C 2 r a n d o m 0 , 1 G i b e s t t X i t ,
and
X i t + 1 = X i t + V i t + 1 ,
where ω is the weight in each iteration, V i t + 1 is the velocity of particle i at time t + 1 , X i t is the particle i’s position at time t, P i b e s t t is particle i’s best position experienced at time t, G i b e s t t is all particles’ best position at time t, and  C 1 and C 2 are the acceleration coefficients, which are always set to 2.
According to the above discussion, the CPFS algorithm can be shown in Algorithm 1, where
X i t = ξ i t
P i b e s t t = max X i t R s 1 b ξ i t + R s 2 b ξ i t
G i b e s t t = max i max X i t R s 1 b ξ i t + R s 2 b ξ i t .
Algorithm 1 The proposed CPFS algorithm.
1:
Initialization
2:
Set the initial value X , ω , C 1 , C 2 , and the maximum number of iterations K.
3:
Set the initial positions and velocities X 1 , V 1 of the PSO algorithm and the position X 2 of the FSO algorithm.
4:
Calculate the secondary transmission rate Y 1 with maximum value f; calculate the secondary transmission rate Y 2 with maximum value a at the positions X 2 .
5:
Consider Y 1 and Y 2 , and denote the better position P b e s t in to the bulletin board.
6:
Compare f and a, and denote the better position G b e s t into the bulletin board.
7:
for  k = 1 K do
8:
     Derive the particle velocity V 1 n and position X 1 n based on (22) and (23), respectively.
9:
     Calculate the secondary rate Y 1 n based on position X 1 n .
10:
   Compare Y 1 n with the data in the bulletin board term-wise and update P b e s t if the former is bigger.
11:
   Denote the maximum value of Y 1 n with the data in the bulletin board term-wise and update G b e s t if the former is bigger.
12:
   Observe the following position of fish swarm X 2 , 1 , X 2 , 2 based on the FSO algorithm, and calculate the secondary transmission rate Y 2 , 1 n , Y 2 , 2 n .
13:
   According to Y 2 , 1 n , Y 2 , 2 n with that in the bulletin board, update G b e s t with the bigger one.
14:
end for
15:
Derive the sub-optimal positions of the UAV.

4. RSMA-Based Cognitive Maritime Transmission with Powerful Eve

In this section, we will study the proposed scheme of the special case where Eve always can cancel x s 1 with Case 1 as
P 2 : max α , X R s 1 b + R s 2 b
s . t . R s 1 b R s ,
R p b R p ,
P c a s e 1 P s e c , o 1 ξ ,
0 α 1 ,
where (27d) is the security requirement. Due to the non-convex (27d), we design an iterative algorithm to solve this problem.

4.1. Power Allocation

Given the UAV’s location, according to (27e), we can derive
α = 1 ln ξ 2 R e 1 P s g s e + N 0 λ p e P p × λ p e 2 R e 1 P p P s g s e 2 R e + P s g s e 2 R e 1 N 0 P s g s e 2 R e = α 4 .
Since the optimal target is decrease with α , the sub-optimal α * is derived as
α * = max α 1 , α 4 ,
where 0 max α 1 , α 4 α 2 1 .

4.2. UAV’s Location Optimization

The UAV’s location will affect the channels of g s b and g s e , which can be rewritten as g s b X and g s e X . According to the derived α 8 , P2 can be reformulated as
P 3 : max X R s 1 b X + R s 2 b X
s . t . R s 1 b X R s ,
R p b X R p ,
P c a s e 1 X P s e c , o 1 X ξ .
We can observe that P3 is a convex problem and we can derive the sub-optimal location through the convex algorithm.
Then, the algorithm is summarized in Algorithm 2.
Algorithm 2 The proposed iterative algorithm.
1:
Initialization
2:
Set the initial value X .
3:
repeat
4:
   Calculate the power allocation parameter according to (29).
5:
   Calculate the position in P3.
6:
until
7:
The difference of the optimal target in two consecutive iterations is less than 10 5 .

5. Simulation Results

We conduct simulations to evaluate the UAV’s rate in the considered system compared with the current algorithms: the NOMA scheme [16] and the underlay scheme [28]. In the NOMA scheme, the secondary UAV adopts the NOMA scheme to protect PT’s information and broadcasts UAV’s information. For the underlay scheme, ST will broadcast its information under the interference threshold to the primary transmitter. In the simulations, we adopt the topology as shown in Figure 2. The main simulation parameters are shown in Table 1 [29,30].
In Figure 3, we demonstrate the secondary transmit power versus the UAV’s power P s . From Figure 3, we can observe that the proposed scheme achieves the best performance compared with the scheme, since the transmission resources are flexibly managed. When the power is low, more of the power is allocated for the transmission of x 1 , and the α will be almost 1, which is almost equal to the NOMA scheme. When the power is high, there will be more power for the transmission of x 2 . Therefore, the transmission rate of the RSMA scheme will increase. In the worst case, the cooperation is conducted under strict security constraints, which will lead to a decrease in the UAV’s rate. In addition, the flexible power control at the UAV is ignored which leads to a secondary transmission rate decrease. Since the cooperation between the UAV and PT is ignored, the secondary transmission rate for the underlay scheme is the lowest among all the schemes.
In Figure 4, we simulate UAV’s rate with respect to ξ under different UAV’s altitudes, i.e., h with P s = 2 Watts. In this figure, we can observe that the UAV’s rate will increase with respect to ξ . When ξ is large, it is easy to satisfy the primary security requirement and there will be more transmission opportunities. Therefore, the UAV’s rate will increase. In addition, with the increase of the UAV’s altitudes, there will be more power to overcome fading, which results in less power for cooperation. Similarly, we can obverse that the transmit power of the NOMA strategy is lower than the proposed scheme.
In Figure 5, we demonstrate the UAV’s rate with respect to P p under different UAV altitudes. We can observe that the UAV’s rate will decrease with respect to P p . When P p is increased, the secondary system will interfere with large power and there will be fewer transmission opportunities. Therefore, the UAV’s rate will decrease. In addition, with the increase in the UAV’s altitudes, there will be more power to overcome fading, which results in less power for the secondary transmission. Similarly, we can obverse that the transmit power of the NOMA scheme is lower.
Figure 6a illustrates the average running time of the three algorithms. Figure 6b shows the secondary rate comparison of the three algorithms, where P p = 1 Watt. From Figure 6a, we can know that the PSO algorithm has the lowest running time, and the FSO algorithm has the highest running time. By contrast, the running time of our proposed CPFS algorithm is close to that of the PSO algorithm, and much lower than that of the FSO algorithm. However, according to Figure 6b, it is observed that the CPFS algorithm is far superior to the PSO algorithm in terms of the secondary rate.

6. Conclusions

In this paper, we proposed a novel cooperative secure RSMA scheme for cognitive maritime applications to support both primary and secondary transmissions. In this scheme, the secondary transmission could not only broadcast secondary information but also protect the primary transmission. In order to satisfy both users’ QoS, we formulated the optimization problem to maximize the UAV’s rate under the RSMA decoding principle and primary information security requirements. We designed a CPFS algorithm to allocate the transmit power and adjust the UAV’s location. In addition, the worst case was analyzed. The simulation results indicated the performance improvement in terms of the secondary transmission rate compared with the traditional schemes. Our proposed solution can not only be applied to maritime networks, but also to UAV communications, information security and other fields. Inspired by the works [31,32] on UAVs, we will further study the feasibility of using the RSMA-enhanced UAV network to provide timely information services.

Author Contributions

L.M.: Conceptualization, Methodology, Software, Writing-Original Draft Preparation, and Visualization. J.L.: Conceptualization, Resources, Methodology, Software, and Writing-Review. Y.H.: Conceptualization, Resources, Writing-Review and Editing, Supervision, Project Administration, and Funding Acquisition. W.W.: Conceptualization, Resources, Methodology, Software, and Writing-Review. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62206221, and in part by the Fundamental Research Funds for the Central Universities.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest for publishing in this journal.

References

  1. Arienzo, L. Green RF/FSO Communications in Cognitive Relay-Based Space Information Networks for Maritime Surveillance. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 1182–1193. [Google Scholar] [CrossRef]
  2. Wang, D.; He, T.; Zhou, F.; Cheng, J.; Zhang, R.; Wu, Q. Outage-driven link selection for secure buffer-aided networks. Sci. China Inf. Sci. 2022, 65, 182303. [Google Scholar] [CrossRef]
  3. Su, X.; Meng, L.; Huang, J. Intelligent Maritime Networking With Edge Services and Computing Capability. IEEE Trans. Veh. Technol. 2020, 69, 13606–13620. [Google Scholar] [CrossRef]
  4. Arguedas, V.F.; Pallotta, G.; Vespe, M. Maritime traffic networks: From historical positioning data to unsupervised maritime traffic monitoring. IEEE Trans. Intell. Transp. Syst. 2017, 19, 722–732. [Google Scholar] [CrossRef]
  5. Tang, R.; Feng, W.; Chen, Y.; Ge, N. NOMA-based UAV communications for maritime coverage enhancement. China Commun. 2021, 18, 230–243. [Google Scholar] [CrossRef]
  6. Xu, K.; Zhao, M.-M.; Cai, Y.; Hanzo, L. Low-Complexity Joint Power Allocation and Trajectory Design for UAV-Enabled Secure Communications with Power Splitting. IEEE Trans. Commun. 2021, 69, 1896–1911. [Google Scholar] [CrossRef]
  7. Wang, D.; Wu, M.; He, Y.; Pang, L.; Xu, Q.; Zhang, R. An HAP and UAVs collaboration framework for uplink secure rate maximization in NOMA-enabled IoT networks. Remote Sens. 2022, 14, 4501. [Google Scholar] [CrossRef]
  8. Zhang, G.; Wu, Q.; Cui, M.; Zhang, R. Securing UAV Communications via Joint Trajectory and Power Control. IEEE Trans. Wirel. Commun. 2019, 18, 1376–1389. [Google Scholar] [CrossRef]
  9. Wang, L.; Zhang, H.; Guo, S.; Yuan, D. Deployment and Association of Multiple UAVs in UAV-Assisted Cellular Networks With the Knowledge of Statistical User Position. IEEE Trans. Wirel. Commun. 2022, 21, 6553–6567. [Google Scholar] [CrossRef]
  10. Li, L.; Chang, T.-H.; Cai, S. UAV Positioning and Power Control for Two-Way Wireless Relaying. IEEE Trans. Wirel. Commun. 2020, 19, 1008–1024. [Google Scholar] [CrossRef]
  11. Jiang, M.; Li, Y.; Zhang, Q.; Qin, J. Joint Position and Time Allocation Optimization of UAV Enabled Time Allocation Optimization Networks. IEEE Trans. Commun. 2019, 67, 3806–3816. [Google Scholar] [CrossRef]
  12. Wang, J.-B.; Zeng, C.; Ding, C.; Zhang, H.; Lin, M.; Wang, J. Unmanned Surface Vessel Assisted Maritime Wireless Communication Toward 6G: Opportunities and Challenges. IEEE Wirel. Commun. 2022, 29, 72–79. [Google Scholar] [CrossRef]
  13. Zeng, C.; Wang, J.-B.; Ding, C.; Zhang, H.; Lin, M.; Cheng, J. Joint Optimization of Trajectory and Communication Resource Allocation for Unmanned Surface Vehicle Enabled Maritime Wireless Networks. IEEE Trans. Commun. 2021, 69, 8100–8115. [Google Scholar] [CrossRef]
  14. Clerckx, B.; Mao, Y.; Jorswieck, E.A.; Yuan, J.; Love, D.J.; Erkip, E.; Niyato, D. A Primer on Rate-Splitting Multiple Access: Tutorial, Myths, and Frequently Asked Questions. IEEE J. Sel. Areas Commun. 2023, accepted.
  15. Xiao, Y.; Tegos, S.A.; Diamantoulakis, P.D.; Ma, Z.; Karagiannidis, G.K. On the Ergodic Rate of Cognitive Radio Inspired Uplink Multiple Access. IEEE Commun. Lett. 2023, 27, 95–99. [Google Scholar] [CrossRef]
  16. Gamal, S.; Rihan, M.; Hussin, S.; Zaghloul, A.; Salem, A.A. Multiple Access in Cognitive Radio Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting. IEEE Access 2021, 9, 95569–95584. [Google Scholar] [CrossRef]
  17. Acosta, M.R.C.; Moreta, C.E.G.; Koo, I. Joint Power Allocation and Power Splitting for MISO-RSMA Cognitive Radio Systems With SWIPT and Information Decoder Users. IEEE Syst. J. 2021, 15, 5289–5300. [Google Scholar] [CrossRef]
  18. Dizdar, O.; Clerckx, B. Rate-Splitting Multiple Access for Communications and Jamming in Multi-Antenna Multi-Carrier Cognitive Radio Systems. IEEE Trans. Inf. Forensics Secur. 2022, 17, 628–643. [Google Scholar] [CrossRef]
  19. Li, X.; Fan, Y.; Yao, R.; Wang, P.; Qi, N.; Miridakis, N.I.; Tsiftsis, T.A. Rate-Splitting Multiple Access-Enabled Security Analysis in Cognitive Satellite Terrestrial Networks. IEEE Trans. Veh. Tech. 2022, 71, 11756–11771. [Google Scholar] [CrossRef]
  20. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secure and Energy Efficient Transmission for RSMA-Based Cognitive Satellite-Terrestrial Networks. IEEE Wirel. Commun. Lett. 2021, 10, 251–255. [Google Scholar] [CrossRef]
  21. Tong, Y.; Li, D.; Yang, Z.; Xiong, Z.; Zhao, N.; Li, Y. Outage Analysis of Rate Splitting Networks with an Untrusted User. IEEE Trans. Veh. Tech. 2023, 72, 2626–2631. [Google Scholar] [CrossRef]
  22. Gao, Y.; Wu, Q.; Chen, W.; Ng, D.W.K. Rate-Splitting Multiple Access for Intelligent Reflecting Surface-Aided Secure Transmission. IEEE Commun. Lett. 2023, 27, 482–486. [Google Scholar] [CrossRef]
  23. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Gu, X.; Pan, J. A V2I and V2V collaboration framework to support emergency communications in ABS-aided Internet of Vehicles. IEEE Trans. Green Commun. Netw. 2023, to be published. [CrossRef]
  24. Zhang, W.; Zhang, W. An Efficient UAV Localization Technique Based on Particle Swarm Optimization. IEEE Trans. Veh. Technol. 2022, 71, 9544–9557. [Google Scholar] [CrossRef]
  25. Wang, D.; Zhou, F.; Lin, W.; Ding, Z.; Al-Dhahir, N. Cooperative hybrid nonorthogonal multiple access-based mobile-edge computing in cognitive radio networks. IEEE Trans. Cognit. Commun. Netw. 2022, 8, 1104–1117. [Google Scholar] [CrossRef]
  26. Yu, Z.; Si, Z.; Li, X.; Wang, D.; Song, H. A Novel Hybrid Particle Swarm Optimization Algorithm for Path Planning of UAVs. IEEE Internet Things J. 2022, 9, 22547–22558. [Google Scholar] [CrossRef]
  27. Khan, S.U.; Yang, S.; Wang, L.; Liu, L. A Modified Particle Swarm Optimization Algorithm for Global Op-timizations of Inverse Problems. IEEE Trans. Magn. 2016, 52, 1–4. [Google Scholar]
  28. Nobar, S.K.; Ahmed, M.H.; Morgan, Y.; Mahmoud, S.A. Resource Allocation in Cognitive Radio-Enabled UAV Communication. IEEE Trans. Cogn. Commun. Netw. 2022, 8, 296–310. [Google Scholar] [CrossRef]
  29. Lu, X.; Yang, W.; Yan, S.; Li, Z.; Ng, D.W.K. Covertness and Timeliness of Data Collection in UAV-Aided Wireless-Powered IoT. IEEE Internet Things J. 2021, 9, 12573–12587. [Google Scholar] [CrossRef]
  30. Hadzi-Velkov, Z.; Pejoski, S.; Zlatanov, N.; Schober, R. UAV-Assisted Wireless Powered Relay Networks With Cyclical NOMA-TDMA. IEEE Wirel. Commun. Lett. 2020, 9, 2088–2092. [Google Scholar] [CrossRef]
  31. He, Y.; Wang, D.; Huang, F.; Zhang, R.; Pan, J. Trajectory optimization and channel allocation for delay sensitive secure transmission in UAV-relayed VANETs. IEEE Trans. Veh. Technol. 2022, 71, 4512–4517. [Google Scholar] [CrossRef]
  32. Liu, A.; Lau, V.K.N. Optimization of Multi-UAV-Aided Wireless Networking Over a Ray-Tracing Channel Model. IEEE Trans. Wirel. Commun. 2019, 18, 4518–4530. [Google Scholar] [CrossRef]
Figure 1. The cognitive RSMA system.
Figure 1. The cognitive RSMA system.
Jmse 11 01012 g001
Figure 2. The topology of the proposed system.
Figure 2. The topology of the proposed system.
Jmse 11 01012 g002
Figure 3. The secondary transmission rate versus the secondary transmit power.
Figure 3. The secondary transmission rate versus the secondary transmit power.
Jmse 11 01012 g003
Figure 4. The secondary transmission rate versus the secrecy outage probability constraint.
Figure 4. The secondary transmission rate versus the secrecy outage probability constraint.
Jmse 11 01012 g004
Figure 5. The secondary transmission rate versus the primary transmit power.
Figure 5. The secondary transmission rate versus the primary transmit power.
Jmse 11 01012 g005
Figure 6. The improvement archived by combining PSO and FSO. (a) Complexity comparison. (b) Secondary rate comparison.
Figure 6. The improvement archived by combining PSO and FSO. (a) Complexity comparison. (b) Secondary rate comparison.
Jmse 11 01012 g006
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
UAV’s altitude, h200 m, 300 m
Maximum transmission power of UAV, P s 2 Watt
Maximum transmission power of PT, P p 2 Watt
Security outage threshold, ξ 0.09
Secondary decoding threshold, R s 1.5 Mbps
Secondary decoding threshold, R p 2 Mbps
Noise power, σ 2 −174 dBm/Hz
Communication frequency5.9 GHz
Number of simulations runs1000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Min, L.; Li, J.; He, Y.; Wang, W. Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV’s Location Optimization. J. Mar. Sci. Eng. 2023, 11, 1012. https://doi.org/10.3390/jmse11051012

AMA Style

Min L, Li J, He Y, Wang W. Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV’s Location Optimization. Journal of Marine Science and Engineering. 2023; 11(5):1012. https://doi.org/10.3390/jmse11051012

Chicago/Turabian Style

Min, Lingtong, Jiawei Li, Yixin He, and Weiguang Wang. 2023. "Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV’s Location Optimization" Journal of Marine Science and Engineering 11, no. 5: 1012. https://doi.org/10.3390/jmse11051012

APA Style

Min, L., Li, J., He, Y., & Wang, W. (2023). Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV’s Location Optimization. Journal of Marine Science and Engineering, 11(5), 1012. https://doi.org/10.3390/jmse11051012

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop