2020
DOI: 10.1109/tcomm.2020.2983040
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation for Secure Multi-UAV Communication Systems With Multi-Eavesdropper

Abstract: In this paper, we study the resource allocation and trajectory design for secure unmanned aerial vehicle (UAV)-enabled communication systems, where multiple multi-purpose UAV base stations are dispatched to provide secure communications to multiple legitimate ground users (GUs) in the existence of multiple eavesdroppers (Eves). Specifically, by leveraging orthogonal frequency division multiple access (OFDMA), active UAV base stations can communicate to their desired ground users via the assigned subcarriers wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(36 citation statements)
references
References 48 publications
0
36
0
Order By: Relevance
“…Since the objective function contains a max-min secrecy rate (e.g., R S n ), it's hard to solve problem (7) directly. To make it more tractable, we introduce a new slack variable τ n [16], and problem (7) can be reformulated as…”
Section: A Problem Transformationmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the objective function contains a max-min secrecy rate (e.g., R S n ), it's hard to solve problem (7) directly. To make it more tractable, we introduce a new slack variable τ n [16], and problem (7) can be reformulated as…”
Section: A Problem Transformationmentioning
confidence: 99%
“…x ) is concave [16]. Therefore, C5 is a convex constraint, and problem ( 16) is a convex optimization problem, which can be efficiently solved.…”
Section: B Algorithm Designmentioning
confidence: 99%
“…[12] explores a similar system where the position information is unknown, aiming at maximizing the worst-case secrecy rate of the system. To achieve a higher rate in secure communications, multi-purpose UAV base stations are adopted in [13], where the sub-carrier allocation and UAV trajectory are jointly optimized. The works [11]- [13] optimize the objective in a similar method by decoupling the original problem into several sub-problems and solving them in an iterative manner.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…To achieve a higher rate in secure communications, multi-purpose UAV base stations are adopted in [13], where the sub-carrier allocation and UAV trajectory are jointly optimized. The works [11]- [13] optimize the objective in a similar method by decoupling the original problem into several sub-problems and solving them in an iterative manner. However, [14] considers a novel situation with multiple UAV eavesdroppers (UEs) of inexact position, and analyzes the system secure connection probability by Monte Carlo trial.…”
Section: A Related Work and Motivationmentioning
confidence: 99%
“…Since in [121]- [124], the role of the UAV is fixed, it can only provide communication/interference functions in the entire time range. In response to the above shortcomings, [125] proposed a multi-purpose drone, which can be dynamically used as a communication drone or jamming drone, providing a high flexibility for safe drone communication. [126] studied the confidentiality interruption performance of the low-altitude UAV group secure communication system using opportunistic relays, and verified the influence of backhaul reliability, drone cooperation and eavesdropping probability on the confidentiality interruption probability.…”
Section: D) Secure Communication Technologymentioning
confidence: 99%