2020
DOI: 10.1109/jiot.2019.2957021
|View full text |Cite
|
Sign up to set email alerts
|

Secure Communication in NOMA-Assisted Millimeter-Wave SWIPT UAV Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
56
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(56 citation statements)
references
References 37 publications
0
56
0
Order By: Relevance
“…The work in [39] proposes a joint precoding optimization scheme for secure simultaneous wireless information and power transfer (SWIPT) in UAV-aided NOMA networks, where artificial jamming is generated at UAV to guarantee the security. In [40], a framework is proposed to study the security, reliability, and energy coverage performance of millimeter-wave (mmWave) SWIPT UAV networks for both OMA and NOMA schemes. For a UAV-relaying system with local caching, the work in [41] studies the joint optimization of the UAV trajectory and time scheduling to secure the transmission.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
“…The work in [39] proposes a joint precoding optimization scheme for secure simultaneous wireless information and power transfer (SWIPT) in UAV-aided NOMA networks, where artificial jamming is generated at UAV to guarantee the security. In [40], a framework is proposed to study the security, reliability, and energy coverage performance of millimeter-wave (mmWave) SWIPT UAV networks for both OMA and NOMA schemes. For a UAV-relaying system with local caching, the work in [41] studies the joint optimization of the UAV trajectory and time scheduling to secure the transmission.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
“…Besides [8]- [11], many efforts have been devoted to study the secrecy performance for mmWave networks recently, such as [22]- [26]. In [22], the secrecy performance for the mmWave network was analyzed systematically, where the locations of eavesdroppers and base stations were modeled as two independent homogeneous poisson point processes by using stochastic geometry theory.…”
Section: Introductionmentioning
confidence: 99%
“…Inspired by the advantage of SWIPT, more and more researchers and scientists are attempting to adopt the SWIPT technique to UAV-enabled relay system for improving performance [28][29][30]. In [28], Wang et al provided a UAV-enable nonorthogonal multiple access (NOMA) relay system with SWIPT, where the nonlinear energy harvesting model was considered.…”
Section: Introductionmentioning
confidence: 99%
“…[29] considered the throughput maximization problem in a UAV relay system with time-sharing mechanism, where the UAV relay is capable of SWIPT. In [30], the authors investigated a millimeter-wave UAV relay system with SWIPT to improve the secrecy performance, and the security rate of NOMA and orthogonal multiple access (OMA) were derived. However, the robust beamforming and SWIPT design for UAV-enabled relay system, where the UEs are capable of PS scheme, has not been well addressed.…”
Section: Introductionmentioning
confidence: 99%