7,276 research outputs found

    Securing UAV Communications Via Trajectory Optimization

    Full text link
    Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due to many advantages such as low cost, high mobility, and on-demand deployment. This paper addresses the issue of physical-layer security in a UAV communication system, where a UAV sends confidential information to a legitimate receiver in the presence of a potential eavesdropper which are both on the ground. We aim to maximize the secrecy rate of the system by jointly optimizing the UAV's trajectory and transmit power over a finite horizon. In contrast to the existing literature on wireless security with static nodes, we exploit the mobility of the UAV in this paper to enhance the secrecy rate via a new trajectory design. Although the formulated problem is non-convex and challenging to solve, we propose an iterative algorithm to solve the problem efficiently, based on the block coordinate descent and successive convex optimization methods. Specifically, the UAV's transmit power and trajectory are each optimized with the other fixed in an alternating manner until convergence. Numerical results show that the proposed algorithm significantly improves the secrecy rate of the UAV communication system, as compared to benchmark schemes without transmit power control or trajectory optimization.Comment: Accepted by IEEE GLOBECOM 201

    Effective Capacity in Broadcast Channels with Arbitrary Inputs

    Full text link
    We consider a broadcast scenario where one transmitter communicates with two receivers under quality-of-service constraints. The transmitter initially employs superposition coding strategies with arbitrarily distributed signals and sends data to both receivers. Regarding the channel state conditions, the receivers perform successive interference cancellation to decode their own data. We express the effective capacity region that provides the maximum allowable sustainable data arrival rate region at the transmitter buffer or buffers. Given an average transmission power limit, we provide a two-step approach to obtain the optimal power allocation policies that maximize the effective capacity region. Then, we characterize the optimal decoding regions at the receivers in the space spanned by the channel fading power values. We finally substantiate our results with numerical presentations.Comment: This paper will appear in 14th International Conference on Wired&Wireless Internet Communications (WWIC
    • …
    corecore