2019
DOI: 10.1109/access.2019.2948384
|View full text |Cite
|
Sign up to set email alerts
|

On the Performance of Low-Altitude UAV-Enabled Secure AF Relaying With Cooperative Jamming and SWIPT

Abstract: This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol, where a source (Alice) sends confidential information to a destination (Bob) via an energy-constrained UAV-mounted amplifyand-forward (AF) relay in the presence of a ground eavesdropper (Eve). We adopt destination-assisted cooperative jamming (CJ) as well as simultaneous wireless information and power transfer (SWIPT) at the UAV-mounted relay to enhance physical-layer security (PLS) and transmission reliab… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
45
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(54 citation statements)
references
References 42 publications
0
45
0
Order By: Relevance
“…M. Tatar Mamaghani et al propose a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol. In order to improve physical-layer security and transmission reliability, they adopt destinationassisted cooperative jamming as well as SWIPT at the UAVmounted relay [10]. Xiaobao Zhou et al introduced the energy sustaining strategy to enhance physical layer security of directional modulation (DM) system.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…M. Tatar Mamaghani et al propose a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission protocol. In order to improve physical-layer security and transmission reliability, they adopt destinationassisted cooperative jamming as well as SWIPT at the UAVmounted relay [10]. Xiaobao Zhou et al introduced the energy sustaining strategy to enhance physical layer security of directional modulation (DM) system.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…Citation information: DOI 10.1109/ACCESS.2020.3026359, IEEE Access Zhentao Hu et al: Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWPIT Secrecy Networks y e,k = h T re,k D βα h sr P s s+h T re,k D βα n a +h T re,k D β n c +n e,k (8) So, SINR of Rx and Eves is described as(9) and(10), respectively.…”
mentioning
confidence: 99%
“…In general terms, there is a relationship between P r and d through a power decay exponent or path loss exponent, γ, and hence a particular power decay law can be derived. This rate of power decay is usually † It is worth mentioning that the small-scale fading addressed in [3] is associated with an environment where there exists a set of random propagation paths produced by natural or artificial objects, and when there is a dominant path, the fading statistics follow a Rician distribution [4]. The random nature of this environment implies that the path loss attenuation is modeled in a probabilistic form instead of a deterministic approach.…”
Section: Power Decaymentioning
confidence: 99%
“…Nevertheless, non-line-of-sight (NLOS) communications can be present as well, particularly when UAVs fly at low altitude in hilly zones or urban and suburban areas (in other words, NLOS conditions implies that natural or artificial obstructions can be present in the propagation path between terminals). Moreover, Tatar Mamaghani and Hong [3] pointed out that at low-altitude the UAV propagation channel presents small-scale Rician fading with a probabilistic path loss attenuation † . See [3,[5][6][7] for LOS or NLOS approaches taken for different examples of UAVs implementations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation