2021
DOI: 10.1109/tcomm.2020.3042462
|View full text |Cite
|
Sign up to set email alerts
|

Low-Complexity Joint Power Allocation and Trajectory Design for UAV-Enabled Secure Communications With Power Splitting

Abstract: An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and investigated, where the UAV transmits legitimate information to a ground user in the presence of an eavesdropper (Eve). To guarantee the security, the UAV employs a power splitting approach, where its transmit power can be divided into two parts for transmitting confidential messages and artificial noise (AN), respectively. We aim to maximize the average secrecy rate by jointly optimizing the UAVs trajectory, the transmit power… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 46 publications
(37 citation statements)
references
References 42 publications
0
37
0
Order By: Relevance
“…Geometry-based methods including dynamic clustering algorithm [63] and circle packing method [64] are frequently applied to optimize the UAV placement and power consumption. However, these methods may fail in a complicated situation [65]. The graph theory-based design framework for trajectory optimization may result in low complexity and good performance [33].…”
Section: Uav Placement Optimization Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Geometry-based methods including dynamic clustering algorithm [63] and circle packing method [64] are frequently applied to optimize the UAV placement and power consumption. However, these methods may fail in a complicated situation [65]. The graph theory-based design framework for trajectory optimization may result in low complexity and good performance [33].…”
Section: Uav Placement Optimization Methodsmentioning
confidence: 99%
“…Another common approach is to apply different algorithms concurrently. For example, combining the block coordinate descent method, the concave-convex procedure, and the alternating direction method of multipliers show low computational complexity [65]. Recently, artificial intelligence and machine learning techniques have demonstrated promising performance gains and complexity reduction in wireless networks.…”
Section: Uav Placement Optimization Methodsmentioning
confidence: 99%
“…In [13], dual-drone based cooperative jamming, where one drone transmits confidential messages and another drone simultaneously transmits AN signals to reduce the eavesdropping capability of the ground adversaries, was developed. In [14], a powersplitting method was developed to split the transmit power of the legitimate drone between the confidential messages and AN signals. The studies in [10], [11], [13], [14] assumed accurate estimation of the eavesdroppers' locations.…”
Section: Introductionmentioning
confidence: 99%
“…In [20], a utility optimization problem was considered to maximize the average secrecy rate in UAV-assisted mobile jamming system by jointly designing the UAV's trajectory and jamming power. An average secrecy rate maximization problem for an UAV-enabled secure communication system was studied in [21], where a joint design of UAV trajectory, transmit power levels and power splitting ratios was proposed. Moreover, a UAV-assisted secure system in the presence of multiple eavesdroppers was investigated in [22], where the secrecy rate was maximized by jointly optimizing the trajectory and transmit power of the UAV.…”
Section: Introductionmentioning
confidence: 99%