2022
DOI: 10.1109/tcomm.2021.3136563
|View full text |Cite
|
Sign up to set email alerts
|

IRS-Assisted Secure UAV Transmission via Joint Trajectory and Beamforming Design

Abstract: Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible to eavesdropping due to air-ground line-of-sight channels. Intelligent reflecting surface (IRS) is capable of reconfiguring the propagation environment, and thus is an attractive solution for integrating with UAV to facilitate the security in wireless networks. In this paper, we investigate the secure transmission design for an IRSassisted UAV network in the presence of an eavesdropper. With the aim at maximizin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

1
58
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 190 publications
(85 citation statements)
references
References 39 publications
1
58
0
Order By: Relevance
“…Thanks to the appealing advantages, IRS has been exploited as a promising choice for improving the performance of UAV communication for combating security threats. In [10], the average secrecy rate was maximized by jointly optimizing the UAV trajectory, the transmit beamforming and the phase shift of IRS. In [11] and [12], the UAV equipped with one IRS serves as a passive relay is proposed to maximize the secrecy rate of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Thanks to the appealing advantages, IRS has been exploited as a promising choice for improving the performance of UAV communication for combating security threats. In [10], the average secrecy rate was maximized by jointly optimizing the UAV trajectory, the transmit beamforming and the phase shift of IRS. In [11] and [12], the UAV equipped with one IRS serves as a passive relay is proposed to maximize the secrecy rate of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Physical layer security (PLS) has been proposed in recent years as a way to overcome many of the aforementioned challenges, which can be categorised as key-less PLS [ 8 , 9 ] and physical layer secret key generation (PL-SKG) [ 10 , 11 , 12 ]. Key-less PLS leverages the superiority of legitimate channels over wiretap ones, and tries to maximise the secrecy rate or signal to interference plus noise ratio (SINR) by steering the variables, e.g., beamforming vectors [ 13 ], trajectory of autonomous system [ 14 ], and even the phases of a reconfigurable intelligent surface (RIS) [ 15 ]. One challenge lies in that the superiority of the legitimate channel may not be always satisfied.…”
Section: Introductionmentioning
confidence: 99%
“…By properly adjusting the reflection properties of the metamaterial elements, RISs can constructively strengthen/destructively weaken the desired/undesired signals at the target receiver(s). This ability of RISs has been exploited in various promising communication systems, such as multi-user Multiple-Input Multiple-Outputs (MIMOs) communications [7], [8], simultaneous wireless information and power transfer systems [9], [10], and physical-layer security [11],…”
Section: Introductionmentioning
confidence: 99%