IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9162671
|View full text |Cite
|
Sign up to set email alerts
|

Secure UAV Communication Networks via Friendly Jamming and Bandwidth Allocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…based on the monotonicity of the log function. For the nonconcavity of the left side term of the constraint (27), we utilize the first order Taylor expansion to get the lower bound of the term 1…”
Section: A Transmit Power Allocationmentioning
confidence: 99%
See 1 more Smart Citation
“…based on the monotonicity of the log function. For the nonconcavity of the left side term of the constraint (27), we utilize the first order Taylor expansion to get the lower bound of the term 1…”
Section: A Transmit Power Allocationmentioning
confidence: 99%
“…In references [25], [26], the authors proposed an artificial noise (AN) method and the means of joint trajectory and power optimization to resist eavesdropping and improve system secrecy rate, respectively. In [27], [28], the authors maximize secrecy rate of the UAV relay with a UAV jammer and an active eavesdropper whose location is not fixed. An effective method was proposed to achieve the best security performance of the system with multiple randomly distributed eavesdroppers in [29].…”
mentioning
confidence: 99%
“…UAV jammer has also been integrated into UAV relaying systems [180], [182], [188], [191]. In [191], for such dual-UAV system with one UAV relay and one UAV jammer, the authors proposed an iterative algorithm via optimizing the trajectories and transmit power for both UAVs to maximize the SR.…”
Section: Trajectory Optimizationmentioning
confidence: 99%
“…In [180], the constraints of flight trajectory and power on both UAVs, as well as the information-causality constraint on the relaying UAV, were jointly considered in the optimization to maximize the SR. The paper [182] considered a multi-UAV communication network, where a novel joint friendly jamming and bandwidth allocation scheme was developed.…”
Section: Trajectory Optimizationmentioning
confidence: 99%
“…DR: The number of malicious UAVs detected by smart agents in the proposed method is divided by the total number of malicious UAVs in the UAV network [28,29]. The DR is shown in Eq.…”
Section: Performance Metricsmentioning
confidence: 99%