2019 16th IEEE Annual Consumer Communications &Amp; Networking Conference (CCNC) 2019
DOI: 10.1109/ccnc.2019.8651678
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Enabled Jamming Noise for Achieving Secure Communications in Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
28
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(28 citation statements)
references
References 13 publications
0
28
0
Order By: Relevance
“…There exist a few works in the literature focusing on the security of UAV-aided CR networks [29], [30]. The work in [29] deploys UAV as a mobile relay to assist communication from a secondary transmitter (ST) to a secondary receiver (SR) in the presence of an Eve, while the work in [30] employs UAV as a friendly jammer to interfere with the Eve.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…There exist a few works in the literature focusing on the security of UAV-aided CR networks [29], [30]. The work in [29] deploys UAV as a mobile relay to assist communication from a secondary transmitter (ST) to a secondary receiver (SR) in the presence of an Eve, while the work in [30] employs UAV as a friendly jammer to interfere with the Eve.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
“…There exist a few works in the literature focusing on the security of UAV-aided CR networks [29], [30]. The work in [29] deploys UAV as a mobile relay to assist communication from a secondary transmitter (ST) to a secondary receiver (SR) in the presence of an Eve, while the work in [30] employs UAV as a friendly jammer to interfere with the Eve. Moreover, the security of cognitive UAV communication networks is studied in [31], [32], where a cognitive/secondary UAV acts as a transceiver to communicate with an SR. With imperfect information regarding the locations of PRs and Eves, a joint robust two-dimensional (2D) trajectory and transmit power design is investigated in [32] to maximize the average secrecy rate by taking into account two practical inaccurate location estimations, i.e., the worst case and the outage-constrained case.…”
Section: B Related Work 1) Terrestrial Networkmentioning
confidence: 99%
“…Yang et al in [10] investigate the different Pareto efficiency between the optimal GU transmit power and UAV trajectory design. Phu et al [11] use UAV as a friendly jammer to maximize the average secrecy rate of the cognitive radio network (CRN) by jointly optimizing the transmission power and UAV trajectory. Reference [9] designs the trajectory of UAV to minimize the mission completion time in UAV-enabled multi-casting systems based on the traveling salesman problem (TSP).…”
Section: Introductionmentioning
confidence: 99%
“…In [40], the authors deploy a UAV as a secondary relay to bridge the communication between a secondary transmitterreceiver pair in the presence of a PR that operate over the same frequency band and a potential eavesdropper. Reference [41] considers a scenario where a UAV is introduced as a friendly jammer to help improve the secrecy rate performance of a CR network. However, only one eavesdropper with perfect location information and one PR are considered in [40] and [41], which is overly optimistic and extremely simplifies the practical consideration.…”
Section: Introductionmentioning
confidence: 99%
“…Reference [41] considers a scenario where a UAV is introduced as a friendly jammer to help improve the secrecy rate performance of a CR network. However, only one eavesdropper with perfect location information and one PR are considered in [40] and [41], which is overly optimistic and extremely simplifies the practical consideration.…”
Section: Introductionmentioning
confidence: 99%