Joint trajectory design and power allocation for unmanned aerial vehicles aided secure transmission in the presence of no‐fly zone

نویسندگان

چکیده

Unmanned aerial vehicles (UAVs) are widely considered as key enablers for future wireless networks due to their advantages, such high mobility and flexible deployment. In this paper, the UAV assisted secure communication system is investigated, where deployed mobile jammer prevent eavesdropper from overhearing confidential message. With objective of maximizing secrecy rate, a joint optimization problem involving trajectory transmit power UAV, well source node formulated. Moreover, effects Non-Fly Zone (NFZ) imperfect estimation on location also taken into consideration. As original hardly trackable, worst case rate (WCSR) assumption first employed bypass uncertainty brought by error. Then block coordinate descent (BCD) based algorithm proposed decompose three sub-ones, can be obtained in an iterative manner. Simulation results reveal that improve performance significantly. addition, robustness under error verified.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Trajectory Planning for Unmanned Aerial Vehicles in Uncertain Environments

As unmanned aerial vehicles (UAVs) take on more prominent roles in aerial missions, it becomes necessary to increase the level of autonomy available to them within the mission planner. In order to complete realistic mission scenarios, the UAV must be capable of operating within a complex environment, which may include obstacles and other no-fly zones. Additionally, the UAV must be able to overc...

متن کامل

Trajectory Optimization for Target Localization Using Small Unmanned Aerial Vehicles

Small unmanned aerial vehicles (UAVs) equipped with navigation and video capabilities can be used to perform target localization. Combining UAV state estimates with image data leads to bearing measurements of the target that can be processed to determine its position. This 3-D bearings-only estimation problem is nonlinear and traditional filtering methods are prone to biases, noisy estimates, a...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks

In the coming years, usage of Unmanned Aerial Vehicles (UAVs) is expected to grow tremendously. Maintaining security of UAVs under cyber attacks is an important yet challenging task, as these attacks are often erratic and difficult to predict. Secure estimation problems study how to estimate the states of a dynamical system from a set of noisy and maliciously corrupted sensor measurements. The ...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Attacks

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV ...

متن کامل

Neuro-adaptive Trajectory Control of Unmanned Aerial Vehicles

A neuro-adaptive approach for autonomous flight controller design for aerial robots is proposed. Three intelligent modules are implemented to control respectively the altitude, airspeed and roll angle of the airplane, through which the altitude and the latitude-longitude of the unmanned aerial vehicle are controlled. Each intelligent module consists of a conventional feedback controller and a n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Communications

سال: 2022

ISSN: ['1751-8636', '1751-8628']

DOI: https://doi.org/10.1049/cmu2.12326