Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1109/tvt.2019.2952525
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy Performance Analysis of UAV-Assisted Relaying Communication Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…A closed‐form SOP expression for the air‐to‐ground and air‐to‐air link is derived considering the ED to be randomly distributed. In Reference 170, the closed‐form approximation of the intercept probability and the ergodic SR for a UAV‐assisted relaying system with single ED in urban environments is derived. The secrecy performance of the ground link in the presence of randomly deployed non‐colluding unmanned EDs is investigated in Reference 171.…”
Section: Pls Classificationsmentioning
confidence: 99%
“…A closed‐form SOP expression for the air‐to‐ground and air‐to‐air link is derived considering the ED to be randomly distributed. In Reference 170, the closed‐form approximation of the intercept probability and the ergodic SR for a UAV‐assisted relaying system with single ED in urban environments is derived. The secrecy performance of the ground link in the presence of randomly deployed non‐colluding unmanned EDs is investigated in Reference 171.…”
Section: Pls Classificationsmentioning
confidence: 99%
“…It should be emphasized, that for more practical consideration, a UAV in general cannot be perfectly statically deployed. UAV hovering may cause shadowing effect [34], and inevitable UAV jitter may introduce new randomness to the channel [35]. These effects will be specifically highlighted when we introduce the A2G channels in Subsection II.B.…”
Section: Preliminariesmentioning
confidence: 99%
“…where R s is the achievable SR defined in (11), and R th is the target SR threshold. Some variant forms of the outage probability has been discussed, e.g., the hybrid outage probability (HOP) which jointly considers the outage occurred in the main link and the outage induced by eavesdropping [48], the intercept probability (IP) which describes the probability that the SNR of the legitimate link is less than that of the eavesdropping link [34], and the secrecy connection probability (SCP) which describes the probability of non-zero secrecy capacity [54]. In practice, outage analysis is usually followed by artificial noise (AN)aided jamming design, which has been shown to be a practical solution for secure transmission when explicit CSI is unknown.…”
Section: Pls Scenarios and Secrecy Performance Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…This probabilistic method can characterize the likelihood of a wireless network achieving a secrecy rate by considering the channel randomness [18]. For example, the closed-form approximation of the intercept probability of a UAV-assisted relaying communication system was studied in [19], [20], while the exact expression of the secrecy outage probability (SOP) between the ground device and UAV has been investigated in [21], [22]. The trajectories and transmit power of the UAV communication systems with the aid of a UAV jammer were optimized in [23] to maximize the minimum average secrecy rate over all the users and an alternating iterative algorithm utilized the successive convex approximation technique was proposed.…”
Section: Introductionmentioning
confidence: 99%