874 research outputs found
Securing UAV Communications Via Trajectory Optimization
Unmanned aerial vehicle (UAV) communications has drawn significant interest
recently due to many advantages such as low cost, high mobility, and on-demand
deployment. This paper addresses the issue of physical-layer security in a UAV
communication system, where a UAV sends confidential information to a
legitimate receiver in the presence of a potential eavesdropper which are both
on the ground. We aim to maximize the secrecy rate of the system by jointly
optimizing the UAV's trajectory and transmit power over a finite horizon. In
contrast to the existing literature on wireless security with static nodes, we
exploit the mobility of the UAV in this paper to enhance the secrecy rate via a
new trajectory design. Although the formulated problem is non-convex and
challenging to solve, we propose an iterative algorithm to solve the problem
efficiently, based on the block coordinate descent and successive convex
optimization methods. Specifically, the UAV's transmit power and trajectory are
each optimized with the other fixed in an alternating manner until convergence.
Numerical results show that the proposed algorithm significantly improves the
secrecy rate of the UAV communication system, as compared to benchmark schemes
without transmit power control or trajectory optimization.Comment: Accepted by IEEE GLOBECOM 201
Security enhancement for NOMA-UAV networks
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide effective coverage for terrestrial users. However, the security of NOMA-UAV systems remains a challenge due to the line-of-sight air-to-ground channels and higher transmission power of weaker users in NOMA. In this paper, we propose two schemes to guarantee the secure transmission in UAV-NOMA networks. When only one user requires secure transmission, we derive the hovering position for the UAV and the power allocation to meet rate threshold of the secure user while maximizing the sum rate of remaining users. This disrupts the eavesdropping towards the secure user effectively. When multiple users require secure transmission, we further take the advantage of beamforming via multiple antennas at the UAV to guarantee their secure transmission. Due to the non-convexity of this problem, we convert it into a convex one for an iterative solution by using the second order cone programming. Finally, simulation results are provided to show the effectiveness of the proposed scheme
Blockchain-Based Security Architecture for Unmanned Aerial Vehicles in B5G/6G Services and Beyond: A Comprehensive Approach
Unmanned Aerial Vehicles (UAVs), previously favored by enthusiasts, have
evolved into indispensable tools for effectively managing disasters and
responding to emergencies. For example, one of their most critical applications
is to provide seamless wireless communication services in remote rural areas.
Thus, it is substantial to identify and consider the different security
challenges in the research and development associated with advanced UAV-based
B5G/6G architectures. Following this requirement, the present study thoroughly
examines the security considerations about UAVs in relation to the
architectural framework of the 5G/6G system, the technologies that facilitate
its operation, and the concerns surrounding privacy. It exhibits security
integration at all the protocol stack layers and analyzes the existing
mechanisms to secure UAV-based B5G/6G communications and its energy and power
optimization factors. Last, this article also summarizes modern technological
trends for establishing security and protecting UAV-based systems, along with
the open challenges and strategies for future research work.Comment: 25 pages, 6 figures, 3 table
IRS-assisted UAV Communications: A Comprehensive Review
Intelligent reflecting surface (IRS) can smartly adjust the wavefronts in
terms of phase, frequency, amplitude and polarization via passive reflections
and without any need of radio frequency (RF) chains. It is envisaged as an
emerging technology which can change wireless communication to improve both
energy and spectrum efficiencies with low energy consumption and low cost. It
can intelligently configure the wireless channels through a massive number of
cost effective passive reflecting elements to improve the system performance.
Similarly, unmanned aerial vehicle (UAV) communication has gained a viable
attention due to flexible deployment, high mobility and ease of integration
with several technologies. However, UAV communication is prone to security
issues and obstructions in real-time applications. Recently, it is foreseen
that UAV and IRS both can integrate together to attain unparalleled
capabilities in difficult scenarios. Both technologies can ensure improved
performance through proactively altering the wireless propagation using smart
signal reflections and maneuver control in three dimensional (3D) space. IRS
can be integrated in both aerial and terrene environments to reap the benefits
of smart reflections. This study briefly discusses UAV communication, IRS and
focuses on IRS-assisted UAC communications. It surveys the existing literature
on this emerging research topic and highlights several promising technologies
which can be implemented in IRS-assisted UAV communication. This study also
presents several application scenarios and open research challenges. This study
goes one step further to elaborate research opportunities to design and
optimize wireless systems with low energy footprint and at low cost. Finally,
we shed some light on future research aspects for IRS-assisted UAV
communication
- …