2022
DOI: 10.1109/tvt.2022.3175181
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Reliability and Security of UAV-Enabled NOMA Communications With Power Allocation and Aerial Jamming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…A dynamic power allocation and an aerial jamming technique for UAV-assisted NOMA communication networks have been studied by the authors in [178] to enhance the reliability and security in the presence of a terrestrial eavesdropper. Whereas the authors in [179] have considered an ultra-dense heterogeneous network of cache-aided UAVs employing power domain NOMA protocol and IoT-mobile devices.…”
Section: Uav-aided Noma and Beamforming Methodsmentioning
confidence: 99%
“…A dynamic power allocation and an aerial jamming technique for UAV-assisted NOMA communication networks have been studied by the authors in [178] to enhance the reliability and security in the presence of a terrestrial eavesdropper. Whereas the authors in [179] have considered an ultra-dense heterogeneous network of cache-aided UAVs employing power domain NOMA protocol and IoT-mobile devices.…”
Section: Uav-aided Noma and Beamforming Methodsmentioning
confidence: 99%
“…In [133] and [134], optimization problems were formulated to maximize the average secrecy rates of the integrated aerial-terrestrial transmissions, by jointly optimizing the UAV's trajectory, and the transmit power. Most recently, authors in [135], formulated a joint power allocation and aerial jamming problem to achieve reliable and secure communications for the UAV-enabled NOMA communication system in the presence of a malicious eavesdropper. Specifically, the main idea of secure beamforming is to compute the optimal beamforming vector for achieving some performance metrics of physical layer security by enhancing the signal quality at the destination node and decreasing the signal quality at the eavesdropper while optimizing the 3D path planning of aerial nodes.…”
Section: • Joint Secure Communication and Control Designmentioning
confidence: 99%
“…COP mainly describes the likelihood that the legitimate receiver (Bob) cannot decode transmitted codewords, and SOP gives the possibility that the eavesdropper (Eve) cannot be confused by secrecy redundancy after the k-th transmission. They indicate the reliability and security, respectively, while secrecy rate shows the overall secure performance [ 14 , 15 ]. For example, Yang et al developed a closed-form solution of SOP and identified a corresponding asymptotic value in an IRS-assisted communication system using CLT [ 16 ].…”
Section: Introductionmentioning
confidence: 99%