2022
DOI: 10.1109/jsyst.2021.3111746
|View full text |Cite
|
Sign up to set email alerts
|

Securing Transmission for UAV Swarm-Enabled Communication Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…At present, UAV-aided wireless communication with PLS has gained substantial attention from the research community. In accordance with the different functions of UAVs in secure communication, UAVs can be classified as UAV-involved secure communications and UAV-enabled secure cooperation [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…At present, UAV-aided wireless communication with PLS has gained substantial attention from the research community. In accordance with the different functions of UAVs in secure communication, UAVs can be classified as UAV-involved secure communications and UAV-enabled secure cooperation [9], [10].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the limited resources and strong flexibility of the UAV, the traditional transmission method could not be directly used in the UAV-enabled communication. As an important supplement of encryption technologies, physical-layer security (PLS) realizes the secrecy transmission by increasing the channel capacity of legitimate users and reducing the channel capacity of eavesdropping users [15][16][17][18][19][20][21].…”
Section: Introduction 1background and Related Workmentioning
confidence: 99%
“…[20] considered a UAV swarm-enabled communication system, in which the PLS of the system is improved by beamforming and bandwidth allocation in the presence of an eavesdropper. The authors in [21] studied a UAV swarmenabled communication network, where several rotary-UAVs act as mobile relays to serve a legitimate UAV user in the presence of an eavesdropper UAV. Then, the power allocation coefficient, beamforming on UAV relays, and trajectory of the legitimate UAV are jointly optimizated to maximize the secrecy rate.…”
Section: Introduction 1background and Related Workmentioning
confidence: 99%
“…Therefore, the emerging intelligent reflecting surface (IRS) technology is introduced into the design of the secure UAV communication system. By integrating a large number of low-cost passive reflection components and controlling each amplitude and phase to reflect the incident signal independently, IRS can achieve a passive 3D beamforming, which can modify the wireless propagation environment and bring a higher degree of design freedom to secure wireless communications [ 13 , 14 ]. Wang et al deployed an IRS on the UAV as a trusted relay to maximize the ASR by jointly optimizing the beamforming vector, IRS phase shift matrix, and UAV’s trajectory [ 15 ].…”
Section: Introductionmentioning
confidence: 99%