2022
DOI: 10.1109/tcomm.2022.3203471
|View full text |Cite
|
Sign up to set email alerts
|

Joint UAV Deployment and Power Allocation for Secure Space-Air-Ground Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 59 publications
0
12
0
Order By: Relevance
“…Due to the special form of logarithmic subtraction in the secrecy rate, the optimization problems of secure beamforming are usually neither convex nor concave in many situations [136]. Most recently, the authors in [137] considered the uplink of the full-duplex UAV-aided three-layer space-air-ground communications networks, comprising of terrestrial IoT terminals, a UAV, and an LEO satellite, where eavesdroppers are intercepting the information transmitted. To ensure a secure uplink transmission, a joint UAV deployment and power allocation scheme were developed for maximizing the secrecy rate, subject to the following constraints: 1) UAV's power, 2) the UAV deployment area, and 3) the secrecy rate, which are imposed on the different layers.…”
Section: • Joint Secure Communication and Control Designmentioning
confidence: 99%
“…Due to the special form of logarithmic subtraction in the secrecy rate, the optimization problems of secure beamforming are usually neither convex nor concave in many situations [136]. Most recently, the authors in [137] considered the uplink of the full-duplex UAV-aided three-layer space-air-ground communications networks, comprising of terrestrial IoT terminals, a UAV, and an LEO satellite, where eavesdroppers are intercepting the information transmitted. To ensure a secure uplink transmission, a joint UAV deployment and power allocation scheme were developed for maximizing the secrecy rate, subject to the following constraints: 1) UAV's power, 2) the UAV deployment area, and 3) the secrecy rate, which are imposed on the different layers.…”
Section: • Joint Secure Communication and Control Designmentioning
confidence: 99%
“…We consider the same case in [32] that channel between ABS m and terminal n comprises of the path loss L ABS m,n and small-scale fading S ABS m,n , which obeys the quasi-static Rayleigh distribution. Thus, the channel gain between ABS m and terminal n is given by…”
Section: Abs Systemmentioning
confidence: 99%
“…A UAV deployment was proposed for overloaded situations [31]. Besides, the improvement in the secrecy rate was highlighted [32]. Overall, existing studies focused on ensuring communication performance.…”
Section: Introductionmentioning
confidence: 99%
“…Resource allocation [114], [115] UE offloading [116] Adaptive RF [117] Physical layer security [118] Integration with vehicular networks [119] Architecture for AI integration [120] General the mobile cells to the nearest eNB over the backhaul link, and to the neighboring mobile cells over the sidehaul link. The authors proposed algorithms to enable resource sharing between a mobile-cell, access link, sidehaul link and conventional cellular users taking into account interference caused by the wireless backhaul of mobile cells.…”
Section: Main Topicmentioning
confidence: 99%
“…Motivated by this, the authors proposed an adaptive transmission scheme where RF is used when freespace optical links are with poor channel state. The article [118] focused on physical layer security in SAGIN. The system model assumed that full duplex UAVs are capable of receiving information from internet of things (IoT) devices while transmitting artificial noise to the eavesdropping channel.…”
Section: ) Satellitementioning
confidence: 99%