2019
DOI: 10.1109/access.2019.2932780
|View full text |Cite
|
Sign up to set email alerts
|

Power Allocation in UAV-Enabled Relaying Systems for Secure Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…From the perspective of physical layer security, [43,44] optimized the trajectory of UAV relay for ground point-to-point communication in the case of eavesdroppers to maximize the secrecy rate. Similarly, [45] analyzed the problem of maximizing the confidentiality rate with the goal of optimizing the transmission power. Aiming at the reliability, [46] analyzed the optimal altitude of the UAV relay driven by overall bit error rate, overall outage, and total power loss, respectively.…”
Section: Single Uav Relaying Networkmentioning
confidence: 99%
“…From the perspective of physical layer security, [43,44] optimized the trajectory of UAV relay for ground point-to-point communication in the case of eavesdroppers to maximize the secrecy rate. Similarly, [45] analyzed the problem of maximizing the confidentiality rate with the goal of optimizing the transmission power. Aiming at the reliability, [46] analyzed the optimal altitude of the UAV relay driven by overall bit error rate, overall outage, and total power loss, respectively.…”
Section: Single Uav Relaying Networkmentioning
confidence: 99%
“…optimization. For example, consider that the UAV relay flies along a fixed trajectory from the source to destination, and working in a "store-carry-forward" manner [36], [126]. In this case, the trajectory implicitly affects the information-causality of the system.…”
Section: Sopmentioning
confidence: 99%
“…Relay -Eve Fixed, known FSPL ASR Optimize UAV's transmit power [126] Air: UAV (1) Ground: Alice (1), Bob (1)…”
Section: Trajectory Optimizationmentioning
confidence: 99%
“…Owing to the attractive features such as high mobility, flexibility and on‐demand deployment, UAV can act as the aerial base station (BS) or relay node to help expand the coverage area and enhance the capacity of the network [12–16]. Moreover, recent research also reveals its potential in secure transmission [17–25]. For instance, [17] considered maximizing the average security rate of the UAV based network by properly adjusting the transmit power and trajectory of UAV.…”
Section: Introductionmentioning
confidence: 99%
“…An iterative algorithm is proposed in [18] to improve the security of the UAV based mobile relay system by optimizing the transmit powers of both relay and source node as well as the trajectory of UAV. The authors in [19] maximize the secrecy rate by optimizing the source/relay transmission power in UAV‐enabled relaying system, where the formulated non‐convex problem is solved by introducing difference‐of‐concave (DC) programming and a closed‐form solution is derived for reducing the complexity of the proposed algorithm under a special case. In [20], a suboptimal algorithm with respect to the UAV trajectory planning is proposed, where the secure throughput per propulsion energy cost is maximized.…”
Section: Introductionmentioning
confidence: 99%