2021
DOI: 10.1109/access.2021.3073488
|View full text |Cite
|
Sign up to set email alerts
|

Transceiver Design for Full-Duplex UAV Based Zero-Padded OFDM System With Physical Layer Security

Abstract: In this paper, multi-antenna transceiver for zero-padded orthogonal frequency division multiplexing (OFDM) system is designed at mmWave by integrating full-duplex unmanned aerial vehicle (UAV) into the terrestrial cellular networks. Assuming that there exist no direct communication links between the ground base station (GBS) and the mobile users due to unexpected blockages from high storied buildings in urban area, the UAV applies decode-and-forward cooperative strategy on the received OFDM signals transmitted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…The total computational complexity of the proposed system is O(ϑ LLCS + ϑ OVSF + ϑ DFT + ϑ IFFT + ϑ OW −DFTs−OFDM ). According to [15], the total computational complexity is O(ϑ ILM + ϑ WHT (User) + ϑ WHT (Eave) + ϑ PAPR(User) + ϑ PAPR(Eave) + ϑ IDFT (User) + ϑ IDFT (Eave) ), where ϑ ILM represents the complexity of interwining logistic map (ILM)-cosine transform, ϑ WHT (User) represents the complexity of walsh-hadamard transform (WHT) of legitimate user, ϑ WHT (Eave) represents the complexity of WHT of ED, ϑ PAPR(User) represents the complexity of PAPR of legitimate user, ϑ PAPR(Eave) represents the complexity of PAPR of ED, ϑ IDFT (User) represents the complexity of IDFT of legitimate user, and ϑ IDFT (Eave) represents the complexity of IDFT of ED. So, the proposed system has less computational complexity than the system presented in [15].…”
Section: Ber Calculation Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The total computational complexity of the proposed system is O(ϑ LLCS + ϑ OVSF + ϑ DFT + ϑ IFFT + ϑ OW −DFTs−OFDM ). According to [15], the total computational complexity is O(ϑ ILM + ϑ WHT (User) + ϑ WHT (Eave) + ϑ PAPR(User) + ϑ PAPR(Eave) + ϑ IDFT (User) + ϑ IDFT (Eave) ), where ϑ ILM represents the complexity of interwining logistic map (ILM)-cosine transform, ϑ WHT (User) represents the complexity of walsh-hadamard transform (WHT) of legitimate user, ϑ WHT (Eave) represents the complexity of WHT of ED, ϑ PAPR(User) represents the complexity of PAPR of legitimate user, ϑ PAPR(Eave) represents the complexity of PAPR of ED, ϑ IDFT (User) represents the complexity of IDFT of legitimate user, and ϑ IDFT (Eave) represents the complexity of IDFT of ED. So, the proposed system has less computational complexity than the system presented in [15].…”
Section: Ber Calculation Algorithmmentioning
confidence: 99%
“…In [14], the authors investigate the operation of multiple UAV-assisted relay and jammers to secure mmWave communication; and derive new closed-form expressions of secrecy outage probability utilizing models of 3D-antenna gain. By incorporating fullduplex UAVs in terrestrial cellular networks, it is possible to achieve multi-antenna transceiver for zero-padded orthogonal frequency division multiplexing (OFDM) systems [15].…”
Section: Introductionmentioning
confidence: 99%
“…Several research works [94], [95], [96], [97], [98], [99], [100], [101], [102], [103], [104], [105], [106], [107], [108], [109], [110], summarized in Table 6, have emphasized the need to employ AN to secure communication at the physical layer. Specifically, the authors in [94] have investigated a wiretap channel where a reliable network was established between the multi-antenna transmitters and a single-antenna UE relay node.…”
Section: A Artificial Noise-aided Phy Securitymentioning
confidence: 99%
“…The desired user is guaranteed to be within the satellite's transmitted signal beam to improve the QoS. Further, zero-padded OFDM system-aided multi-antenna transceivers for mmWave are considered in [107] by integrating FD UAVs with ground cellular networks in the presence of a passive eavesdropper. An intertwining logistic map-cosine transformassisted algorithm and AN are utilized to enhance PHY security.…”
Section: A Artificial Noise-aided Phy Securitymentioning
confidence: 99%
“…Even in an emergency situation when terrestrial mobile stations go through unexpected discontinuity due to disasters, UAVs can be utilized as a base station (BS) or as a relay station (RS). Due to flexible deployment and cost effectiveness, full-duplex UAVs can also be integrated with terrestrial cellular networks [4]. A typical scenario is illustrated in Figure 1, where UAVs are forming a cooperative relay network with an assumption that there is no direct connection between BS and user equipment (UE).…”
Section: Introductionmentioning
confidence: 99%