7,276 research outputs found
Securing UAV Communications Via Trajectory Optimization
Unmanned aerial vehicle (UAV) communications has drawn significant interest
recently due to many advantages such as low cost, high mobility, and on-demand
deployment. This paper addresses the issue of physical-layer security in a UAV
communication system, where a UAV sends confidential information to a
legitimate receiver in the presence of a potential eavesdropper which are both
on the ground. We aim to maximize the secrecy rate of the system by jointly
optimizing the UAV's trajectory and transmit power over a finite horizon. In
contrast to the existing literature on wireless security with static nodes, we
exploit the mobility of the UAV in this paper to enhance the secrecy rate via a
new trajectory design. Although the formulated problem is non-convex and
challenging to solve, we propose an iterative algorithm to solve the problem
efficiently, based on the block coordinate descent and successive convex
optimization methods. Specifically, the UAV's transmit power and trajectory are
each optimized with the other fixed in an alternating manner until convergence.
Numerical results show that the proposed algorithm significantly improves the
secrecy rate of the UAV communication system, as compared to benchmark schemes
without transmit power control or trajectory optimization.Comment: Accepted by IEEE GLOBECOM 201
Effective Capacity in Broadcast Channels with Arbitrary Inputs
We consider a broadcast scenario where one transmitter communicates with two
receivers under quality-of-service constraints. The transmitter initially
employs superposition coding strategies with arbitrarily distributed signals
and sends data to both receivers. Regarding the channel state conditions, the
receivers perform successive interference cancellation to decode their own
data. We express the effective capacity region that provides the maximum
allowable sustainable data arrival rate region at the transmitter buffer or
buffers. Given an average transmission power limit, we provide a two-step
approach to obtain the optimal power allocation policies that maximize the
effective capacity region. Then, we characterize the optimal decoding regions
at the receivers in the space spanned by the channel fading power values. We
finally substantiate our results with numerical presentations.Comment: This paper will appear in 14th International Conference on
Wired&Wireless Internet Communications (WWIC
- …