IRS-Enhanced UAV Communication Networks: Securing Data With Hybrid Genetic and Gradient Descent Algorithms

Chkirbene, Zina, Gouissem, Ala, Hamila, Ridha, Unal, Devrim, Al-Dweik, Arafat and Kuru, Kaya orcid iconORCID: 0000-0002-4279-4166 (2025) IRS-Enhanced UAV Communication Networks: Securing Data With Hybrid Genetic and Gradient Descent Algorithms. In: 2025 IEEE Wireless Communications and Networking Conference (WCNC): 6G Horizons: Bridging Beyond Wireless - Emerging Technologies, Network Architectures, and Applications, 24–27 March 2025, Milan, Italy.

Full text not available from this repository.

Official URL: https://wcnc2025.ieee-wcnc.org/

Abstract

In the rapidly advancing field of wireless communication, Unmanned Aerial Vehicles (UAVs) have become indispensable due to their extensive coverage capabilities and ability to access remote locations. Whether deployed as mobile base stations (BSs) or relays, UAVs significantly enhance network throughput and reliability. Alongside UAVs, Intelligent Reflecting Surfaces (IRS) have emerged as a cost-effective solution for improving communication quality through passive modulation arrays. Despite these advancements, the potential misuse of UAVs poses serious security risks, particularly in the form of communication eavesdropping. To address these challenges, this paper introduces a novel communication framework that integrates a UAV equipped with an adaptive IRS. The primary aim is to boost communication secrecy between BSs and multiple users, even in the presence of several UAV eavesdroppers. This objective is formulated as an optimization problem focused on maximizing the secrecy rate while considering UAV mobility constraints. To solve this non-convex problem, we propose a hybrid strategy that combines Genetic Algorithms and Gradient Descent techniques. This innovative approach efficiently determines suboptimal reflection angles and UAV trajectories for IRS-equipped UAVs, thereby enhancing the security of the communication network. This method not only addresses the complexity of the optimization but also provides a practical pathway to secure communications in environments with high eavesdropping risks.


Repository Staff Only: item control page