116 research outputs found

    UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective

    Get PDF
    Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the management of multiple UAVs is important. This paper considers the power allocation strategy for a UAV swarm-enabled aerial network to enhance the physical layer security of the downlink transmission, where an eavesdropper moves following the trajectory of the swarm for better eavesdropping. Unlike existing works, we use only the large-scale channel state information (CSI) and maximize the secrecy throughput in a whole-trajectory-oriented manner. The overall transmission energy constraint on each UAV and the total transmission duration for all the legitimate users are considered. The non-convexity of the formulated problem is solved by using max-min optimization with iteration. Both the transmission power of desired signals and artificial noise (AN) are derived iteratively. Simulation results are presented to validate the effectiveness of our proposed power allocation algorithm and to show the advantage of aerial CoMP by using only the large-scale CSI

    Physical Layer Service Integration in 5G: Potentials and Challenges

    Full text link
    High transmission rate and secure communication have been identified as the key targets that need to be effectively addressed by fifth generation (5G) wireless systems. In this context, the concept of physical-layer security becomes attractive, as it can establish perfect security using only the characteristics of wireless medium. Nonetheless, to further increase the spectral efficiency, an emerging concept, termed physical-layer service integration (PHY-SI), has been recognized as an effective means. Its basic idea is to combine multiple coexisting services, i.e., multicast/broadcast service and confidential service, into one integral service for one-time transmission at the transmitter side. This article first provides a tutorial on typical PHY-SI models. Furthermore, we propose some state-of-the-art solutions to improve the overall performance of PHY-SI in certain important communication scenarios. In particular, we highlight the extension of several concepts borrowed from conventional single-service communications, such as artificial noise (AN), eigenmode transmission etc., to the scenario of PHY-SI. These techniques are shown to be effective in the design of reliable and robust PHY-SI schemes. Finally, several potential research directions are identified for future work.Comment: 12 pages, 7 figure

    Robust Resource Allocation to Secure Physical Layer Using UAV-Assisted Mobile Relay Communications in 5G Technology

    Get PDF
    The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next generation researchers due to their flexible, dynamic, and cost-effective deployment, etc. Moreover, the UAVs have a wide range of application domains, such as rescue operation in the remote area, military surveillance, emergency application, etc. Given the UAVs are appropriately deployed, the UAVs provide continuous and reliable connectivity, on-demand, and cost-effective features to the desired destination in the wireless communication system. Thus, the UAVs can be a great choice to deploy as a mobile relay in co-existence with the base stations (BSs) on the ground to serve the 5G wireless users. In this thesis, the UAV-assisted mobile relay (UAV-MR) in the next generation wireless networks has been studied, which also considers the UAV-MR physical layer security. The proposed system also considers one ground user, one BS on the ground, and active presence of multiple eavesdroppers, situated nearby the ground user. The locations of these nodes (i.e., the ground user, the BS, and the eavesdroppers) are considered fixed on the ground. Moreover, the locations of the eavesdroppers are not precisely known to the UAV-MR. Thus, this thesis aims to maximize the achievable secrecy rate, while the BS sends the secure information to the ground user via the UAV-MR. However, the UAV-MR has some challenges to deploy in wireless networks, such as 3D deployment, robust resource allocation, secure UAV-MR to ground communication, the channel modeling, the UAV-MR flight duration, and the UAV-MR robust trajectory design, etc. Thus, this project investigates the UAV-MR assisted wireless networks, which addresses those technical challenges to guarantee efficient UAV-MR communication. Moreover, the mathematical frameworks are formulated to support the proposed model. An efficient algorithm is proposed to maximize the UAV-MR achievable secrecy rate. Finally, the simulation results show the improved performance for the UAV-MR assisted next-generation networks

    Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach

    Full text link
    Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have evolved into indispensable tools for effectively managing disasters and responding to emergencies. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAV-based B5G/6G architectures. Following this requirement, the present study thoroughly examines the security considerations about UAVs in relation to the architectural framework of the 5G/6G system, the technologies that facilitate its operation, and the concerns surrounding privacy. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAV-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAV-based systems, along with the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table
    corecore