2019 IEEE/CIC International Conference on Communications in China (ICCC) 2019
DOI: 10.1109/iccchina.2019.8855970
|View full text |Cite
|
Sign up to set email alerts
|

On Secure UAV Communication Systems with Randomly Located Eavesdroppers

Abstract: Unmanned aerial vehicles (UAVs) play an essential role in future wireless communication networks due to their high mobility, low cost, and on-demand deployment. In air-toground links, UAVs are widely used to enhance the performance of wireless communication systems due to the presence of highprobability line-of-sight (LoS) links. However, the high probability of LoS links also increases the risk of being eavesdropped, posing a significant challenge to the security of wireless communications. In this work, the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Analysis has been extended for different roles of UAV, e.g., receiver [104]- [106], relay [51], [107], or jammer [54]. Among these research works, the general methodologies adopted are similar, i.e., describing the inter-node distance distribution according to their location distribution, and further relating the distance to secrecy performance metrics.…”
Section: Random Positions Via Stochastic Geometrymentioning
confidence: 99%
“…Analysis has been extended for different roles of UAV, e.g., receiver [104]- [106], relay [51], [107], or jammer [54]. Among these research works, the general methodologies adopted are similar, i.e., describing the inter-node distance distribution according to their location distribution, and further relating the distance to secrecy performance metrics.…”
Section: Random Positions Via Stochastic Geometrymentioning
confidence: 99%
“…Proposed a power allocation scheme for circular orbit NOMA-UAV network, which maximizes the total rate of ordinary users while ensuring the security of specific users. Considering the energy limitation of UAV, the UAV system with NOMA was also studied in [18,19,20,21,22,23,24]. In reference X Sun et al [18], the closed expressions of security outage probability and effective security throughput in simultaneous wireless information and power transmission (SWIPT) UAV network with directional modulation scheme are derived.…”
Section: Introductionmentioning
confidence: 99%
“…Considering that the legal UAV receiver and eavesdropping UAV are randomly distributed, the analytical expressions of SOP and average confidentiality rate of UAV Communication system are derived in [21]. The author in [22] studied the security performance of NOMA-UAV network under three different eavesdropping situations, such as one eavesdropper, noncollusive eavesdropper and collusive eavesdropper. A new cooperative jamming scheme is proposed in [23], which is based on SWIPT UAV auxiliary NOMA system with multiple ground passive receivers to enhance the security performance.…”
Section: Introductionmentioning
confidence: 99%