2021
DOI: 10.21203/rs.3.rs-1013858/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Positioning And Power Optimization For UAV-Assisted Networks In The Presence of Eavesdroppers: A Multi-Armed Bandit Approach

Abstract: Unmanned Aerial Vehicles (UAVs) are becoming increasingly attractive for the ambitious expectations for 5G and beyond networks due to their several benefits. Indeed, UAV-assisted communications introduce a new range of challenges and opportunities regarding the security of these networks. Thus, in this paper we explore the opportunities that UAVs can provide for physical layer security solutions. Particularly, we analize the secrecy performance of a ground wireless communication network assisted by two friendl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…On the other hand, considering that security and privacy issues are becoming ever more important to provide the level of trustworthiness and resilience expected for 6G, exploring hybrid RF/VLC systems from the security perspective is sparking increasing interest in the research community [7]. In this sense, physical layer security (PLS), which takes advantage of the wireless medium to enhance the secrecy of wireless communications, can be explored to design solutions capable of improving confidentiality in diverse scenarios of 6G [8]- [10]. Nonetheless, most of PLS techniques presented in the literature are designed for RF systems.…”
Section: A Motivationmentioning
confidence: 99%
“…On the other hand, considering that security and privacy issues are becoming ever more important to provide the level of trustworthiness and resilience expected for 6G, exploring hybrid RF/VLC systems from the security perspective is sparking increasing interest in the research community [7]. In this sense, physical layer security (PLS), which takes advantage of the wireless medium to enhance the secrecy of wireless communications, can be explored to design solutions capable of improving confidentiality in diverse scenarios of 6G [8]- [10]. Nonetheless, most of PLS techniques presented in the literature are designed for RF systems.…”
Section: A Motivationmentioning
confidence: 99%
“…On the other hand, considering that security and privacy issues are becoming more and more important to provide the level of trustworthiness and resilience expected for 6G, exploring hybrid RF/VLC systems from the security perspective becomes an attractive research area [6]. In this sense, physical layer security (PLS), which takes advantage of the wireless medium to enhance the secrecy of wireless communications, may be explored to design solutions capable of improving confidentiality in diverse scenarios of 6G [7]- [9]. Nonetheless, most of PLS techniques presented in the literature are designed for RF systems, thus certain adaptations should be considered before employing PLS in VLC systems due to illumination requirements, such as dimming control and peakpower constraint [10].…”
Section: Introduction a Motivationmentioning
confidence: 99%