{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:57:59Z","timestamp":1775667479981,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["92467103"],"award-info":[{"award-number":["92467103"]}]},{"name":"National Natural Science Foundation of China","award":["92367302"],"award-info":[{"award-number":["92367302"]}]},{"name":"National Natural Science Foundation of China","award":["2023-3-2"],"award-info":[{"award-number":["2023-3-2"]}]},{"name":"National Natural Science Foundation of China","award":["252102210176"],"award-info":[{"award-number":["252102210176"]}]},{"name":"National Natural Science Foundation of China","award":["252102210232"],"award-info":[{"award-number":["252102210232"]}]},{"name":"National Natural Science Foundation of China","award":["25A510015"],"award-info":[{"award-number":["25A510015"]}]},{"name":"National Natural Science Foundation of China","award":["25A520008"],"award-info":[{"award-number":["25A520008"]}]},{"name":"Henan Provincial Department of Transportation","award":["92467103"],"award-info":[{"award-number":["92467103"]}]},{"name":"Henan Provincial Department of Transportation","award":["92367302"],"award-info":[{"award-number":["92367302"]}]},{"name":"Henan Provincial Department of Transportation","award":["2023-3-2"],"award-info":[{"award-number":["2023-3-2"]}]},{"name":"Henan Provincial Department of Transportation","award":["252102210176"],"award-info":[{"award-number":["252102210176"]}]},{"name":"Henan Provincial Department of Transportation","award":["252102210232"],"award-info":[{"award-number":["252102210232"]}]},{"name":"Henan Provincial Department of Transportation","award":["25A510015"],"award-info":[{"award-number":["25A510015"]}]},{"name":"Henan Provincial Department of Transportation","award":["25A520008"],"award-info":[{"award-number":["25A520008"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["92467103"],"award-info":[{"award-number":["92467103"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["92367302"],"award-info":[{"award-number":["92367302"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["2023-3-2"],"award-info":[{"award-number":["2023-3-2"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["252102210176"],"award-info":[{"award-number":["252102210176"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["252102210232"],"award-info":[{"award-number":["252102210232"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["25A510015"],"award-info":[{"award-number":["25A510015"]}]},{"name":"Henan Provincial Science and Technology Research Project","award":["25A520008"],"award-info":[{"award-number":["25A520008"]}]},{"name":"Foundation of Henan Educational Committee","award":["92467103"],"award-info":[{"award-number":["92467103"]}]},{"name":"Foundation of Henan Educational Committee","award":["92367302"],"award-info":[{"award-number":["92367302"]}]},{"name":"Foundation of Henan Educational Committee","award":["2023-3-2"],"award-info":[{"award-number":["2023-3-2"]}]},{"name":"Foundation of Henan Educational Committee","award":["252102210176"],"award-info":[{"award-number":["252102210176"]}]},{"name":"Foundation of Henan Educational Committee","award":["252102210232"],"award-info":[{"award-number":["252102210232"]}]},{"name":"Foundation of Henan Educational Committee","award":["25A510015"],"award-info":[{"award-number":["25A510015"]}]},{"name":"Foundation of Henan Educational Committee","award":["25A520008"],"award-info":[{"award-number":["25A520008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with multiple eavesdroppers, formulating the optimal UAV trajectory poses a non-convex and non-differentiable optimization challenge. The paper utilizes the successive convex approximation (SCA) method in conjunction with hypograph theory to address this challenge. First, a set of trajectory increment variables is introduced to replace the original UAV trajectory coordinates, thereby converting the original non-convex problem into a sequence of convex subproblems. Subsequently, hypograph theory is employed to convert these non-differentiable subproblems into standard convex forms, which can be solved using the CVX toolbox. Simulation results demonstrate the UAV\u2019s trajectory fluctuations under different parameters, affirming that trajectory optimization significantly improves PLS performance in IoT systems.<\/jats:p>","DOI":"10.3390\/fi17050225","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T05:37:13Z","timestamp":1747633033000},"page":"225","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers"],"prefix":"10.3390","volume":"17","author":[{"given":"Lingfeng","family":"Shen","sequence":"first","affiliation":[{"name":"School of Software, Henan University, Kaifeng 475004, China"},{"name":"Henan International Joint Laboratory of Intelligent Network Theory and Key Technology, Kaifeng 475004, China"}]},{"given":"Jiangtao","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng 475004, China"}]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng 475004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9275-8323","authenticated-orcid":false,"given":"Guanghui","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng 475004, China"},{"name":"Henan International Joint Laboratory of Intelligent Network Theory and Key Technology, Kaifeng 475004, China"}]},{"given":"Qiankun","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Information Technology Designing and Consulting Institute Co., Ltd., Beijing 100048, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0755-0964","authenticated-orcid":false,"given":"Xin","family":"He","sequence":"additional","affiliation":[{"name":"School of Software, Henan University, Kaifeng 475004, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Subrahmanyam, V., Sagar, M., Balram, G., Ramana, J.V., Tejaswi, S., and Mohammad, H.P. (2024, January 3\u20134). An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). Proceedings of the 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT), Vellore, India.","DOI":"10.1109\/AIIoT58432.2024.10574604"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.comcom.2023.05.013","article-title":"A Survey on UAV-Assisted Wireless Communications: Recent Advances and Future Trends","volume":"208","author":"Gu","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"223","DOI":"10.23919\/JCN.2022.000014","article-title":"Improved Genetic Algorithm Based 3-D Deployment of UAVs","volume":"24","author":"Wen","year":"2022","journal-title":"J. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3009","DOI":"10.1109\/LCOMM.2022.3205722","article-title":"3-D Deployment of Multiple UAV-Mounted Mobile Base Stations for Full Coverage of IoT Ground Users with Different QoS Requirements","volume":"26","author":"Luo","year":"2022","journal-title":"IEEE Commun. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Safwat, N.E.-D., Hafez, I.M., and Newagy, F. (2022). 3D Placement of a New Tethered UAV to UAV Relay System for Coverage Maximization. Electronics, 11.","DOI":"10.3390\/electronics11030385"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TWC.2021.3105821","article-title":"UAV Relay-Assisted Emergency Communications in IoT Networks: Resource Allocation and Trajectory Optimization","volume":"21","author":"Tran","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7711","DOI":"10.1109\/TWC.2022.3160517","article-title":"Deep Learning for Channel Tracking in IRS-Assisted UAV Communication Systems","volume":"21","author":"Yu","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"109626","DOI":"10.1016\/j.comnet.2023.109626","article-title":"A Survey on Security and Privacy Issues of UAVs","volume":"224","author":"Mekdad","year":"2023","journal-title":"Comput. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"892","DOI":"10.1109\/TNSM.2024.3487265","article-title":"Security and Privacy Issues and Solutions for UAVs in B5G Networks: A Review","volume":"22","author":"Khan","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"20457","DOI":"10.1109\/JIOT.2024.3371101","article-title":"Authentication and Key Agreement Based on Three Factors and PUF for UAV-Assisted Post-Disaster Emergency Communication","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1049\/cmu2.12295","article-title":"A PUF-based Lightweight Authentication and Key Agreement Protocol for Smart UAV Networks","volume":"16","author":"Zhang","year":"2021","journal-title":"IET Commun."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10061","DOI":"10.1109\/JIOT.2021.3118079","article-title":"Energy-Efficient and Secure Communication Toward UAV Networks","volume":"9","author":"Li","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5267","DOI":"10.1109\/TNSE.2023.3324639","article-title":"Blockchain-Aided Secure Access Control for UAV Computing Networks","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","article-title":"Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks","volume":"26","author":"Illi","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"101717","DOI":"10.1016\/j.jksuci.2023.101717","article-title":"Beyond Encryption: Exploring the Potential of Physical Layer Security in UAV Networks","volume":"35","author":"Xu","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MWC.001.2200125","article-title":"Opportunities for Physical Layer Security in UAV Communication Enhanced with Intelligent Reflective Surfaces","volume":"29","author":"Khan","year":"2022","journal-title":"IEEE Wirel. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7423","DOI":"10.1109\/TII.2022.3158612","article-title":"Energy-Efficient Beamforming for Heterogeneous Industrial IoT Networks With Phase and Distortion Noises","volume":"18","author":"Xu","year":"2022","journal-title":"IEEE Trans. Ind. Informat."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"16284","DOI":"10.1109\/JIOT.2022.3151105","article-title":"Joint Optimization of Trajectory and Resource Allocation in Secure UAV Relaying Communications for Internet of Things","volume":"9","author":"Na","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"7034","DOI":"10.1109\/TVT.2023.3337154","article-title":"Improving Physical Layer Security for Multi-UAV Systems Against Hybrid Wireless Attacks","volume":"73","author":"Chen","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.23919\/JCN.2021.000044","article-title":"Robust Secure UAV Relay-Assisted Cognitive Communications with Resource Allocation and Cooperative Jamming","volume":"24","author":"Wang","year":"2022","journal-title":"J. Commun. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"7276","DOI":"10.1109\/TVT.2023.3347769","article-title":"UAV-Aided Secure Communication With Imperfect Eavesdropper Location: Robust Design for Jamming Power and Trajectory","volume":"73","author":"Liu","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1109\/TWC.2020.3028068","article-title":"Throughput Maximization of Mixed FSO\/RF UAV-Aided Mobile Relaying with a Buffer","volume":"20","author":"Lee","year":"2021","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"104626","DOI":"10.1016\/j.dsp.2024.104626","article-title":"Joint Resource and Trajectory Optimization for Secure UAV-Based Two-Way Relay System. Digital Signal Process","volume":"153","author":"Nguyen","year":"2024","journal-title":"Digit. Signal Process."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"7802","DOI":"10.1109\/TWC.2023.3344802","article-title":"Secure Short-Packet Communications via UAV-Enabled Mobile Relaying: Joint Resource Optimization and 3D Trajectory Design","volume":"23","author":"Mamaghani","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"10570","DOI":"10.1109\/TVT.2022.3184804","article-title":"Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization","volume":"71","author":"Kang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Lei, H., Meng, D., Ran, H., Park, K.H., Pan, G., and Alouini, M.S. (2024). Multi-UAV Trajectory Design for Fair and Secure Communication. IEEE Trans. Cognit. Commun. Netw.","DOI":"10.1109\/TCCN.2024.3487142"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"25596","DOI":"10.1109\/JIOT.2022.3197975","article-title":"Secure Swarm UAV-Assisted Communications with Cooperative Friendly Jamming","volume":"9","author":"DangNgoc","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1902","DOI":"10.1109\/TNET.2023.3234324","article-title":"Multi-Objective Optimization Approaches for Physical Layer Secure Communications Based on Collaborative Beamforming in UAV Networks","volume":"31","author":"Li","year":"2023","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Zhang, H., Shen, L., Wang, N., and Mu, X. (2022, January 14\u201316). UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers. Proceedings of the 2022 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Suzhou, China.","DOI":"10.1109\/CyberC55534.2022.00055"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/5\/225\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:35:00Z","timestamp":1760031300000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/5\/225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["fi17050225"],"URL":"https:\/\/doi.org\/10.3390\/fi17050225","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]}}}