2021
DOI: 10.1007/s11227-021-04095-7
|View full text |Cite
|
Sign up to set email alerts
|

Security performance analysis of RIS-assisted UAV wireless communication in industrial IoT

Abstract: With the development of the unmanned aerial vehicle (UAV), UAV is widely used in various fields, such as Industrial IoT. Usually, the communication between UAV and the ground node is the line-of-sight (LoS) transmission. However, the performance of the UAV wireless communication system degrades greatly as the LoS links are prone to deteriorate in some complex communication scenarios. Fortunately, the quality of the communication link can be improved effectively by placing reconfigurable intelligent surfaces (R… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Other factors were also studied in the aforementioned papers, including the impact of increasing the number of transmitting antennas or the transmit power at the ABS. Liu et al [148] considered a more involved TRIS-assisted system in which multiple legitimate GUs are served by the ABS through the TDMA mode in the presence of one eavesdropper. Under this setting, the authors investigated the maximization of the minimum average secrecy rate among users with respect to the users' scheduling scheme, the reflecting beamforming, the UAV's trajectory, and the transmit power.…”
Section: F Physical Layer Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Other factors were also studied in the aforementioned papers, including the impact of increasing the number of transmitting antennas or the transmit power at the ABS. Liu et al [148] considered a more involved TRIS-assisted system in which multiple legitimate GUs are served by the ABS through the TDMA mode in the presence of one eavesdropper. Under this setting, the authors investigated the maximization of the minimum average secrecy rate among users with respect to the users' scheduling scheme, the reflecting beamforming, the UAV's trajectory, and the transmit power.…”
Section: F Physical Layer Securitymentioning
confidence: 99%
“…Depending on the considered objectives and their associated constraints, researchers propose to adopt different algorithms for solving optimization problems with particular forms. 1) SCA: The SCA algorithm acts as one of the most popular methods for solving nonconvex optimization problem such as power control [54], [148], [154], RIS configuration [54], [98], [113], [147], [149], [151], and position/trajectory optimization of aerial platforms [49], [51], [54], [76], [83], [98], [100], [122], [133]- [135], [138], [144]- [150], [152], [153], [158]. Specifically, at each iteration, the original nonconvex functions are approximated by some convex upper bounds of them with the same first order behavior.…”
Section: A Alternating Optimization Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT has invented a variety of sensor devices to collect data [3] [4]. Researchers have proposed various methods to guarantee the data safety in the transmission process of IoT [5][6][7][8][9][10][11]. The medical industry has made great progress thanks to these sensors [12] [13].…”
Section: Introductionmentioning
confidence: 99%