1,938 research outputs found
UAV Swarm-Enabled Aerial CoMP: A Physical Layer Security Perspective
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV),
aerial coordinated multiple points (CoMP) can be enabled by a UAV swarm. In
this case, the management of multiple UAVs is important. This paper considers
the power allocation strategy for a UAV swarm-enabled aerial network to enhance
the physical layer security of the downlink transmission, where an eavesdropper
moves following the trajectory of the swarm for better eavesdropping. Unlike
existing works, we use only the large-scale channel state information (CSI) and
maximize the secrecy throughput in a whole-trajectory-oriented manner. The
overall transmission energy constraint on each UAV and the total transmission
duration for all the legitimate users are considered. The non-convexity of the
formulated problem is solved by using max-min optimization with iteration. Both
the transmission power of desired signals and artificial noise (AN) are derived
iteratively. Simulation results are presented to validate the effectiveness of
our proposed power allocation algorithm and to show the advantage of aerial
CoMP by using only the large-scale CSI
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have
evolved into indispensable tools for effectively managing disasters and
responding to emergencies. For example, one of their most critical applications
is to provide seamless wireless communication services in remote rural areas.
Thus, it is substantial to identify and consider the different security
challenges in the research and development associated with advanced UAV-based
B5G/6G architectures. Following this requirement, the present study thoroughly
examines the security considerations about UAVs in relation to the
architectural framework of the 5G/6G system, the technologies that facilitate
its operation, and the concerns surrounding privacy. It exhibits security
integration at all the protocol stack layers and analyzes the existing
mechanisms to secure UAV-based B5G/6G communications and its energy and power
optimization factors. Last, this article also summarizes modern technological
trends for establishing security and protecting UAV-based systems, along with
the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table
A Comprehensive Overview on 5G-and-Beyond Networks with UAVs: From Communications to Sensing and Intelligence
Due to the advancements in cellular technologies and the dense deployment of
cellular infrastructure, integrating unmanned aerial vehicles (UAVs) into the
fifth-generation (5G) and beyond cellular networks is a promising solution to
achieve safe UAV operation as well as enabling diversified applications with
mission-specific payload data delivery. In particular, 5G networks need to
support three typical usage scenarios, namely, enhanced mobile broadband
(eMBB), ultra-reliable low-latency communications (URLLC), and massive
machine-type communications (mMTC). On the one hand, UAVs can be leveraged as
cost-effective aerial platforms to provide ground users with enhanced
communication services by exploiting their high cruising altitude and
controllable maneuverability in three-dimensional (3D) space. On the other
hand, providing such communication services simultaneously for both UAV and
ground users poses new challenges due to the need for ubiquitous 3D signal
coverage as well as the strong air-ground network interference. Besides the
requirement of high-performance wireless communications, the ability to support
effective and efficient sensing as well as network intelligence is also
essential for 5G-and-beyond 3D heterogeneous wireless networks with coexisting
aerial and ground users. In this paper, we provide a comprehensive overview of
the latest research efforts on integrating UAVs into cellular networks, with an
emphasis on how to exploit advanced techniques (e.g., intelligent reflecting
surface, short packet transmission, energy harvesting, joint communication and
radar sensing, and edge intelligence) to meet the diversified service
requirements of next-generation wireless systems. Moreover, we highlight
important directions for further investigation in future work.Comment: Accepted by IEEE JSA
- …