2023
DOI: 10.1109/tgcn.2023.3235887
|View full text |Cite
|
Sign up to set email alerts
|

A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 37 publications
0
7
0
Order By: Relevance
“…At the terminal level, various scenarios, including intelligent vehicle networks, intelligent manufacturing, airborne networks, and seaborne networks, seamlessly join sensing communication and computation. 31 These scenarios enable data communication and transmission. The data is collected at this level and then transmitted to the edge level, where a base station employs beamforming (BF) to gather the data.…”
Section: Components For Uav-aided Isacmentioning
confidence: 99%
“…At the terminal level, various scenarios, including intelligent vehicle networks, intelligent manufacturing, airborne networks, and seaborne networks, seamlessly join sensing communication and computation. 31 These scenarios enable data communication and transmission. The data is collected at this level and then transmitted to the edge level, where a base station employs beamforming (BF) to gather the data.…”
Section: Components For Uav-aided Isacmentioning
confidence: 99%
“…Although the maximal secure rate is achieved, the secure EE was not investigated for such deployment in the work of Ji et al 19 Similarly, we see that in this work of Ji et al, 19 the UAV acts as a relay when the request content is not cached in the UAV. While the aforementioned works considered the case where the UAV acts as a mobile relay or BS, [8][9][10][11][12][13][14][15][16][17][19][20][21] the works of Chen et al and Xiong et al [20][21][22] investigated the UAV data collection paradigm. In practice, the UAV-assisted wireless data collection model can be regarded as the same type as the case where the UAV acts as relay or BS.…”
Section: Related Workmentioning
confidence: 99%
“…While the aforementioned works that considered the case where the UAV is used as a mobile relay or BS, [8][9][10][11][12][13][14][15][16][17][19][20][21][22][23] the works of Li et al [24][25][26][27] regarded the UAV as a mobile and friendly jammer to enhance the PL security by injecting the jamming signals over wiretap channels, which is also a promising application direction of UAVs. Specially, the work of Li et al 24 considered the case where two UAVs transmit confidential messages to their special ground destinations in the presence of a ground Eve.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations