2022
DOI: 10.1109/tii.2021.3087726
|View full text |Cite
|
Sign up to set email alerts
|

Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 94 publications
(46 citation statements)
references
References 30 publications
0
46
0
Order By: Relevance
“…The position of UAV S is related to the origin of the three-dimensional Cartesian coordinate system. The position information can be get by GPS positioning or other methods [34], [36]- [37]. We assume that UAV S has known the position of all GUs and GJ, and the channel state information of the corresponding links in advance by means of synthetic aperture radar, etc [34], [37].…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The position of UAV S is related to the origin of the three-dimensional Cartesian coordinate system. The position information can be get by GPS positioning or other methods [34], [36]- [37]. We assume that UAV S has known the position of all GUs and GJ, and the channel state information of the corresponding links in advance by means of synthetic aperture radar, etc [34], [37].…”
Section: System Modelmentioning
confidence: 99%
“…Li et al studied the rate improving design in case of imperfect eavesdropping channels [35]. Since UAV has the unique advantages of high mobility and easy concealment, it can be easily explored by malicious users to eavesdrop the legitimate signals [36]- [37]. Zhou et al proposed a security computation offloading scheme in a traditional communication mode with UAV acting as an eavesdropper, and the signals from other users are treated as interference during the transmission [36].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The next generation of mobile networks (5G) is being deployed [1][2][3], which will bring new challenges and opportunities, enabling the creation and integration of new networks such as the Internet of Things (IoT), meeting the explosive growth in data traffic and lower latency requirements demanded in today's communications and enabling and improving the quality of services in a multitude of applications, such as social networking, media streaming, video calls, and other broadband services [4][5][6][7][8][9]. In this sense, 5G cellular communication networks are expected to have a more reliable transmission link, better connectivity, and to approach the challenges involved with the mobility scenarios.…”
Section: Introductionmentioning
confidence: 99%