Your browser doesn't support javascript.
loading
Aerial Cooperative Jamming for Cellular-Enabled UAV Secure Communication Network: Joint Trajectory and Power Control Design.
Sun, Hanming; Duo, Bin; Wang, Zhengqiang; Lin, Xiaochen; Gao, Changchun.
Afiliación
  • Sun H; The Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China. 1149151@mail.dhu.end.cn.
  • Duo B; College of Information Science & Technology, Chengdu University of Technology, Chengdu 610059, China. duobin@cdut.edu.cn.
  • Wang Z; School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing 400065, China. wangzq@cqupt.edu.cn.
  • Lin X; School of Electronic Information Engineering, Shanghai Dianji University, Shanghai 201306, China. linxc@sdju.edu.cn.
  • Gao C; The Glorious Sun School of Business and Management, Donghua University, Shanghai 200051, China. gcc369@dhu.edu.cn.
Sensors (Basel) ; 19(20)2019 Oct 14.
Article en En | MEDLINE | ID: mdl-31614986
ABSTRACT
To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically, a base station (BS) transmits confidential messages to a UAV and meanwhile another UAV performs the role of an aerial jammer by cooperatively sending jamming signals to oppose multiple suspicious eavesdroppers on the ground. As the UAVs have the advantage of the controllable mobility, the objective is to maximize the worst-case average secrecy rate by the joint optimization of the two UAVs' trajectories and the BS's/UAV jammer's transmit/jamming power over a given mission period. The objective function of the formulated problem is highly non-linear regarding the optimization variables and the problem has non-convex constraints, which is, in general, difficult to achieve a globally optimal solution. Thus, we divide the original problem into four subproblems and then solve them by applying the successive convex approximation (SCA) and block coordinate descent (BCD) methods. Numerical results demonstrate that the significantly better secrecy performance can be obtained by using the proposed algorithm in comparison with benchmark schemes.
Palabras clave

Texto completo: 1 Bases de datos: MEDLINE Idioma: En Revista: Sensors (Basel) Año: 2019 Tipo del documento: Article País de afiliación: China

Texto completo: 1 Bases de datos: MEDLINE Idioma: En Revista: Sensors (Basel) Año: 2019 Tipo del documento: Article País de afiliación: China