2019
DOI: 10.1109/tvt.2019.2900157
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Enabled Secure Communications: Joint Trajectory and Transmit Power Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
119
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 231 publications
(119 citation statements)
references
References 16 publications
0
119
0
Order By: Relevance
“…PLS for a single A2G channel was considered in [23]- [27]. The joint design of UAV trajectory/location and power optimization to maximize users' secrecy throughput was addressed in [23]- [31]. Specifically, multiple potential eavesdroppers on the ground were considered with imperfect position information in [23], while in [25], an UAV was employed as a mobile jammer to combat against eavesdropping.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…PLS for a single A2G channel was considered in [23]- [27]. The joint design of UAV trajectory/location and power optimization to maximize users' secrecy throughput was addressed in [23]- [31]. Specifically, multiple potential eavesdroppers on the ground were considered with imperfect position information in [23], while in [25], an UAV was employed as a mobile jammer to combat against eavesdropping.…”
Section: Introductionmentioning
confidence: 99%
“…To ensure secure communication, the authors in [28] optimized the UAV trajectory in such a way that would maximize the minimum secrecy throughput (among all users). In [24], [29]- [31], the authors used two UAVs in providing secure communication with one UAV delivering only information while the other sending only artificial noise to jam the EV(s). It is noteworthy that deploying a dynamic UAV or multiple stationary UAVs is too costly and thus not practical for secure communication.…”
Section: Introductionmentioning
confidence: 99%
“…To simplify the design in the sequel, we assume that the channel is modeled by pure LoS links as commonly adopted in the literature, e.g., [14], [15], [21], [22]. As the UAV communication channel is dominated by the LoS links 4 , the CSI between each node and each UAV can be determined by its location [21], [22], [23], [25], [26]. Besides, the desired ground node users perform handshaking with the system regularly such that accurate location information is available for resource allocation design.…”
Section: B Signal Modelmentioning
confidence: 99%
“…Furthermore, although deploying a single UAV in the system was demonstrated to offer some advantages for wireless communications [1], [24], the performance of single UAV communication systems can be unsatisfactory due to the stringent requirement on secure communication. Thus, with the assistance of a jammer UAV, the authors in [25], [26], [27] proposed a cooperative jamming scheme for secure UAV communications by jointly optimizing power allocation and trajectories. Yet, since the jammer UAV is only equipped with a single-antenna in these systems, the direction of artificial noise cannot be controlled properly which also causes strong interference to legitimate users due to the existence of strong LoS paths.…”
mentioning
confidence: 99%
“…Specially, DM can be directly applied to millimeter wave and UAV channels. This makes it have a potential to become a hot research topic in the coming future and will provide an This work was supported in part by the National Natural Science Foundation of China alternative secure solution for the future wireless networks, particularly beyond 5G and UAV networks [10].…”
Section: Introductionmentioning
confidence: 99%