2019 IEEE Globecom Workshops (GC Wkshps) 2019
DOI: 10.1109/gcwkshps45667.2019.9024575
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Security for Untrusted UAV-Assisted Full-Duplex Wireless Networks

Abstract: The paper considers physical layer security (PLS) of an untrusted unmanned aerial vehicle (UAV) network, where a multitude of UAVs communicate in full-duplex (FD) mode. A source-based jamming (SBJ) scheme is exploited for secure communication without utilizing any external jammers. Firstly, the optimal power allocation between the confidential signal and the jamming signal is derived to maximize the secrecy rate of each link between the source and the destination. Then, the best UAV selection scheme is propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Here we assume that there are no reliable direct links from UEs to BS (see [24], [34] and references therein), and all nodes are equipped with a single antenna, operating in half-duplex mode. Therefore, a UAVrelay is employed to assist end-to-end communications [18]; nonetheless, the UAV-relay may not be fully authorized to access collected confidential information and may conduct malicious eavesdropping, i.e., an UUR [23]. Thus secure data transmission is in demand.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Here we assume that there are no reliable direct links from UEs to BS (see [24], [34] and references therein), and all nodes are equipped with a single antenna, operating in half-duplex mode. Therefore, a UAVrelay is employed to assist end-to-end communications [18]; nonetheless, the UAV-relay may not be fully authorized to access collected confidential information and may conduct malicious eavesdropping, i.e., an UUR [23]. Thus secure data transmission is in demand.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…The majority of previous research has deemed the UAV to be a fully authorized and legitimate communication node in UAV-assisted relaying applications. However, when the UAV behaves as an untrusted relay, which is called untrusted UAV-relay (UUR), with the capability of information eavesdropping while assisting endto-end communications (see [23], [24]), the system design becomes quite challenging and entirely different from the existing body of research.…”
Section: Introductionmentioning
confidence: 99%
“…Here we assume that there are no reliable direct links from UEs to BS (see [26], [37] and references therein), and all nodes are equipped with a single antenna, operating in half-duplex mode. Therefore, a UAVrelay is employed to assist end-to-end communications [20]; nonetheless, the UAV-relay may not be fully authorized to access collected confidential information and may conduct malicious eavesdropping, i.e., a UUR [25]. Thus, secure data transmission is in demand.…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…The majority of previous research has deemed the UAV to be a fully authorized and legitimate communication node in UAV-assisted relaying applications. However, when the UAV behaves as an untrusted relay, which is called untrusted UAV-relay (UUR), with the capability of information eavesdropping while assisting endto-end communications (see [25], [26]), the system design becomes quite challenging and entirely different from the existing body of research.…”
Section: Introductionmentioning
confidence: 99%
“…Further, in [33] the trajectory design and resource allocation of a similar system model has been explored to minimize outage probability. For security-based FD-operated UAV communications, in [34], the authors have considered an FD system with an untrusted UR, and then studied secrecy outage and average secrecy rate performance metrics, wherein the untrusted relaying refers to the case when the intermediate relaying conducts adversarial activity during communication facilitation [35]- [37]. It should be worth pointing out that FD malicious nodes can potentially pose severe security attacks compared to their passive counterparts.…”
Section: A Related Work and Motivationsmentioning
confidence: 99%