2020
DOI: 10.1109/access.2020.2986025
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Aided Jamming for Secure Ground Communication With Unknown Eavesdropper Location

Abstract: This paper investigates unmanned aerial vehicle (UAV)-aided jamming technique for enabling physical layer keyless security in scenarios where the exact eavesdropper location is unknown. We assume that the unknown eavesdropper location is within an ellipse characterizing the coverage region of the transmitter. By sequentially optimizing the transmit power, the flight path of the UAV and its jamming power, we aim at maximizing the average secrecy rate with arbitrary eavesdropper location. Simulation results demo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…Furthermore, with successive convex approximation (SCA) techniques, an intelligent reflecting surface aided UAV communication system was investigated in [14] by designing the beamforming and trajectory of the UAV. In [15], a SCA based power and trajectory optimization approach was proposed for the an UAV-aided secure communication network.…”
Section: A Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, with successive convex approximation (SCA) techniques, an intelligent reflecting surface aided UAV communication system was investigated in [14] by designing the beamforming and trajectory of the UAV. In [15], a SCA based power and trajectory optimization approach was proposed for the an UAV-aided secure communication network.…”
Section: A Prior Workmentioning
confidence: 99%
“…From ( 13), we can express the state-transition probabilities for the UAV from s to s by taking action a, which is given by P(s, a, s ) = P(s |s, a) = Pr{S(t) = s |S(t − 1) = s, A(t − 1) = a} = r∈R P(s , r|s, a), (15) where the expected rewards for the state-action pair can be expressed as a two-argument function r : S × A ∈ R, i.e.,…”
Section: B Preliminaries Of Mdpsmentioning
confidence: 99%
“…Different from traditional methods to enhance the security in terrestrial communication systems, UAV can utilize its high mobility and flexibility to avoid being eavesdropped via adjusting its flight trajectory. For instance, the UAV can fly close to the legitimate user or fly away from the eavesdropper via trajectory optimization, and thus the average secrecy rate can be improved in the presence of a single eavesdropper [27], multiple eavesdroppers [28], or eavesdroppers with unknown locations [29]. Furthermore, adding artificial noise was an effective method to further improve the security of the UAV communication [30]- [34].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, unmanned aerial vehicles (UAVs) have been widely used as carrying platforms of base stations in wireless communications [1], [2]. Many recent studies have been dedicated to UAV communications [3]- [7]. In [3], the joint optimization of trajectory and transmit power was studied by Wu et al to maximize the sum rate in multi-UAV networks.…”
Section: Introductionmentioning
confidence: 99%
“…a UAV-assisted cellular network, applying the superimposed training sequence with imperfect channel statistics. UAV-aided jamming for secure communication with unknown location of the eavesdropper was investigated in [7] by Nnamani et al On the other hand, to improve the spectrum efficiency, non-orthogonal multiple access (NOMA) is emerging as a crucial technique for future wireless networks [8]- [10]. In [8], Chen et al have proved that NOMA has a better performance than orthogonal multiple access (OMA).…”
Section: Introductionmentioning
confidence: 99%