2021
DOI: 10.1109/tifs.2021.3122989
|View full text |Cite
|
Sign up to set email alerts
|

On the Physical Layer Security of the Cooperative Rate-Splitting-Aided Downlink in UAV Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 44 publications
0
18
0
Order By: Relevance
“…Furthermore, employing transmit beamforming can improve the throughput of the legitimate user while managing the throughput of the wiretapped signal at the eavesdroppers, hence enhancing PHY security. Numerous research works [97], [106], [166], [167], [168], [169], [170], [171], [172], [173], [174], [175], [176], [177], [183] have considered NOMA/beamforming techniques in UAV networks in order to enhance the network security. A brief overview of these works is presented in Table 12.…”
Section: Uav-aided Noma and Beamforming Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, employing transmit beamforming can improve the throughput of the legitimate user while managing the throughput of the wiretapped signal at the eavesdroppers, hence enhancing PHY security. Numerous research works [97], [106], [166], [167], [168], [169], [170], [171], [172], [173], [174], [175], [176], [177], [183] have considered NOMA/beamforming techniques in UAV networks in order to enhance the network security. A brief overview of these works is presented in Table 12.…”
Section: Uav-aided Noma and Beamforming Methodsmentioning
confidence: 99%
“…A suboptimal solution was obtained by utilizing semi-definite relaxation and alternating optimization. Further, the authors in [176] have evaluated the maximum-minimum secrecy fairness of a UAV-aided cellular network with a two-user MISO system.…”
Section: Uav-aided Noma and Beamforming Methodsmentioning
confidence: 99%
“…First, define f (11) (g 2 ) = Csρ(a2g2+ρ)+2 Rs a1ρg2 −Csa1a2g2+a1ρ−Csa2(a2g2+ρ) and f (12) (g 2 ) = ρ(Csρ+2 Rs a1g2) a1ρ−Csa2ρ−2 Rs a1a2g2 . With regard to the events shown in (22) and (24), considering non-negative g 1 and g 2 , and following a similar approach as in Lemma 4 along with simple algebraic manipulations, shows that the inequality a1 a2 > C s must hold. As such, E (i) s is reformulated as…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…Besides, by enabling cooperation, improvement in the secrecy sum-rate of RSMA in the presence of external eavesdropping was demonstrated in [22], [23]. Cooperative RS was also considered at an aerial base station to protect the secrecy of a two-user system against an external eavesdropper [24]. Deploying RSMA in a system with two legitimate users and a potential eavesdropper was also studied in [25], which addressed the maximization of the minimum achievable secrecy rate.…”
Section: A Contextmentioning
confidence: 99%
“…The authors in this work proposed secure RS transmission scheme which advocates the dual use of the common message as a desired message and artificial noise. In [27] the max-min secrecy fairness of cellular networks was investigated, in which cooperative RS aided down-link transmissions are employed. A novel application of RSMA for joint communications and jamming with a Multi-Carrier waveform in a multi-antenna Cognitive Radio was proposed in [28].…”
Section: Introductionmentioning
confidence: 99%