GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254971
|View full text |Cite
|
Sign up to set email alerts
|

Securing UAV Communications via Trajectory Optimization

Abstract: Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due to many advantages such as low cost, high mobility, and on-demand deployment. This paper addresses the issue of physical-layer security in a UAV communication system, where a UAV sends confidential information to a legitimate receiver in the presence of a potential eavesdropper which are both on the ground. We aim to maximize the secrecy rate of the system by jointly optimizing the UAV's trajectory and transmit power over … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
136
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(138 citation statements)
references
References 21 publications
1
136
0
1
Order By: Relevance
“…For convenience, we define the set of all antenna elements as M ∆ = {1, · · · , M}. In order to guarantee flight safety, we assume that the UAV flies at constant altitude H 0 which is higher than the tallest obstacles in the service area [4]- [6]. Moreover, we define v u [n]…”
Section: A Multiuser Uav Communication Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…For convenience, we define the set of all antenna elements as M ∆ = {1, · · · , M}. In order to guarantee flight safety, we assume that the UAV flies at constant altitude H 0 which is higher than the tallest obstacles in the service area [4]- [6]. Moreover, we define v u [n]…”
Section: A Multiuser Uav Communication Systemmentioning
confidence: 99%
“…Secure UAV communications was investigated in [6] where the trajectory of a UAV and its transmit power were jointly optimized to maximize the system secrecy rate. The authors of [7] proposed solar-powered UAV communication systems and studied the jointly optimal resource allocation and UAV trajectory design for maximization of the system sum throughput.…”
mentioning
confidence: 99%
“…March 17, 2020 DRAFT Next, we handle the binary user scheduling constraint C2 in (21). In particular, we follow a similar approach as in [1], [41] and relax the binary subcarrier variable s m,k U ,i [n] as a real value between 0 and 1, i.e.,…”
Section: A Subproblem 1: Communication Resource Allocation Optimizationmentioning
confidence: 99%
“…s m,k U ,i [n] = 1 and p m,k U ,i [n] > 0, under the condition H m,k U ,i [n] ≤ H m,k E ,i [n], we have ñR m,k U ,i [n] −R m,k U ,k E ,i [n]ô ≤ 0, which leads to a smaller objective value in(21). Besides, the solution set becomes smaller as some power is wasted without improving the objective value.…”
mentioning
confidence: 99%
“…For example, UAV-aided jamming scheme was proposed to handle the security issues in [4]. Besides, joint trajectory and resource allocation design was investigated in [5]- [7] for improving the system secrecy rate with UAV-mounted base stations and UAVaided relaying protocols, respectively. However, the previous works are all based on an assumption that accurate position information of eavesdroppers is available at UAVs which is over optimistic.…”
Section: Introductionmentioning
confidence: 99%