2019 IEEE International Conference on Communications Workshops (ICC Workshops) 2019
DOI: 10.1109/iccw.2019.8756815
|View full text |Cite
|
Sign up to set email alerts
|

Robust Trajectory and Resource Allocation Design for Secure UAV-Aided Communications

Abstract: This paper aims to enhance the physical layer security against potential internal eavesdroppings by exploiting the maneuverability of an unmanned aerial vehicle (UAV). We consider a scenario where two receivers with different security clearance levels require to be served by a legitimate transmitter with the aid of the UAV. We jointly design the trajectory and resource allocation to maximize the accumulated system confidential data rate. The design is formulated as a mixed-integer nonconvex optimization proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(24 citation statements)
references
References 12 publications
0
24
0
Order By: Relevance
“…It results in a significant security challenge for UAV-enabled CR networks. Besides conventional cryptography encryption methods enabling secure information transmission, physicallayer security technology has emerged as a promising alternative approach to guarantee the security of wireless communication systems by exploiting the physical layer characteristics of wireless channels [13]- [17]. In [18], the physical layer security of a UAV network was studied to jointly design the trajectory and transmission power of the UAV in order to maximize the minimum average secrecy rate of all users.…”
Section: A Background and Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…It results in a significant security challenge for UAV-enabled CR networks. Besides conventional cryptography encryption methods enabling secure information transmission, physicallayer security technology has emerged as a promising alternative approach to guarantee the security of wireless communication systems by exploiting the physical layer characteristics of wireless channels [13]- [17]. In [18], the physical layer security of a UAV network was studied to jointly design the trajectory and transmission power of the UAV in order to maximize the minimum average secrecy rate of all users.…”
Section: A Background and Motivationmentioning
confidence: 99%
“…As a result, the trajectory design and power allocation based on the assumption of perfect location information may lead to a large performance loss for UAVenabled CR networks in practice. Recently, although the robust trajectory and transmit power designs have been considered in [16], [17], only the worst-case scenario has been studied. Specifically, in the worst-case scenario, the location errors are modeled by bounded sets.…”
Section: A Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides, several world-leading industrial companies, such as Facebook, Google, and Qualcomm, have made advancements on their journey to deliver high-speed internet from the air by UAVs [1]. As a result, the investigation of deploying UAVs for assisting wireless networks has recently received significant attention from the academia, such as mobile relays [7], [8], aerial mobile base stations [9], [10], and UAV-enabled information dissemination and data collection [1], [11].…”
Section: Introductionmentioning
confidence: 99%