2022
DOI: 10.23919/jcn.2021.000044
|View full text |Cite
|
Sign up to set email alerts
|

Robust secure UAV relay-assisted cognitive communications with resource allocation and cooperative jamming

Abstract: Article that has been accepted for inclusion in a future issue of a journal. Content is final as presented, with the exception of pagination.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 35 publications
0
12
0
Order By: Relevance
“…To safeguard different wireless networks, PLS techniques have been extensively studied in the literature for various applications such as cooperative non-orthogonal multiple access (NOMA) networks [23], opportunistic relaying in IoT networks [24], full-duplex relaying [25], energy harvestingbased device-to-device communications [26], and UAV-aided secure wireless communication [27]- [29]. In particular, [28] investigated resource allocation for secure downlink UAV transmissions towards a terrestrial user empowered by a reconfigurable intelligent surface (RIS) where a friendly UAVjammer is employed for communication secrecy.…”
Section: A Prior Studies and Motivationmentioning
confidence: 99%
“…To safeguard different wireless networks, PLS techniques have been extensively studied in the literature for various applications such as cooperative non-orthogonal multiple access (NOMA) networks [23], opportunistic relaying in IoT networks [24], full-duplex relaying [25], energy harvestingbased device-to-device communications [26], and UAV-aided secure wireless communication [27]- [29]. In particular, [28] investigated resource allocation for secure downlink UAV transmissions towards a terrestrial user empowered by a reconfigurable intelligent surface (RIS) where a friendly UAVjammer is employed for communication secrecy.…”
Section: A Prior Studies and Motivationmentioning
confidence: 99%
“…The work of Wang et al provided a comprehensive characteristic of the A2G channels. 29 Considering that a channel can be either LoS or NLoS at any instant, this model calculates the channel gain by taking the average on the both cases according to their respective probabilities of occurrence, thus only providing an approximation description of the channel. The model in the work of Al-Hourani et al predicted the expectation of path loss based on statistical analysis.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…The LoS probability greatly depends on the specific communication environment. The work of Wang et al provided a comprehensive characteristic of the A2G channels 29 . Considering that a channel can be either LoS or NLoS at any instant, this model calculates the channel gain by taking the average on the both cases according to their respective probabilities of occurrence, thus only providing an approximation description of the channel.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, with the development of 5G communication technology and the improvement of the mobile Internet of Things, unmanned aerial vehicle (UAV) base stations have begun to be widely used in auxiliary communication and post-disaster rescue tasks [ 1 , 2 ]. The UAV air base station has the characteristics of strong maneuverability, controllable mobility, and convenient deployment and can support the high-speed transmission of communication data, etc.…”
Section: Introductionmentioning
confidence: 99%