×
Jan 18, 2019 · This paper aims to tackle this challenge by applying the physical layer security technique. We consider both the downlink and uplink UAV ...
Dec 31, 2018 · Motivated by this, we aim to design joint UAV trajectory and transmit power optimization algorithms to secure both. U2G and G2U communications.
This paper aims to tackle this challenge by applying the physical layer security technique. We consider both the downlink and uplink UAV communications with a ...
The high mobility of the UAV is exploited to proactively establish favorable and degraded channels for the legitimate and eavesdropping links, ...
This paper addresses the issue of physical-layer security in a UAV communication system, where a UAV sends confidential information to a legitimate receiver in ...
People also ask
Oct 12, 2017 · Our goal is to maximize the average secrecy rate over a finite flight period of the UAV by jointly designing the UAV trajectory and transmit ...
We aim to maximize the average secrecy rates of the DL and UL communications, respectively, by jointly optimizing the UAV trajectory and the UAV/ground node's ...
We aim to maximize the secrecy rate of the system by jointly optimizing the UAV's trajectory and transmit power over a finite horizon. In contrast to the ...
In this paper, we propose and analyze the maximal secrecy capability of an unmanned aerial vehicle (UAV)-based relay non-orthogonal multiple access system.
This paper investigates a new spectrum sharing scenario between unmanned aerial vehicle (UAV) and terrestrial wireless communication systems.