2018
DOI: 10.1109/jsac.2018.2864424
|View full text |Cite
|
Sign up to set email alerts
|

Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
128
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 186 publications
(129 citation statements)
references
References 38 publications
1
128
0
Order By: Relevance
“…Proof. Similar to Appendix C, with interchanging z f with z n * , we can obtain the desired result in (20), and the proof can is complete.…”
Section: Proof Please Refer To Appendix Amentioning
confidence: 70%
“…Proof. Similar to Appendix C, with interchanging z f with z n * , we can obtain the desired result in (20), and the proof can is complete.…”
Section: Proof Please Refer To Appendix Amentioning
confidence: 70%
“…Proof: By applying the idea of the proof for Lemma 1 in [14], we can always set e k [n] to be zero if R k [n] − R e,k [n] is negative. Now, we turn our attention to tackle the binary variables in problem (7). Instead of simply relaxing E into a continuous one, a variational approach is introduced.…”
Section: Problem Formulation and Proposed Designmentioning
confidence: 99%
“…Some preliminary works have been devoted to secure UAV-aided communications by leveraging physical-layer security (PLS). Specifically, the research in [7] focused on improving the worst-case secrecy rate among mobile users by generating a jamming signal in order to confound Eves. The work in [6] studied secrecy energy efficiency in multiple UAV-aided wireless networks by leveraging cooperation.…”
Section: Introductionmentioning
confidence: 99%
“…In each iteration, the closed-form expressions of the user scheduling binary integer variables were obtained given fixed transmit powers and trajectories of dual UAVs, and then SCA methods were exploited to deal with the non-convexity of other sub-problems. In [15], a similar idea was investigated in the presence of multiple external ground eavesdroppers. Given the constant transmit power, the collision avoidance constraint was further taken into consideration for the safety of dual UAVs.…”
Section: Uav-enabled Hybrid Secure Transmission Schemementioning
confidence: 99%