Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Chenxi | ko |
dc.contributor.author | Lee, Jemin | ko |
dc.contributor.author | Quek, Tony Q. S. | ko |
dc.date.accessioned | 2019-07-04T07:25:00Z | - |
dc.date.available | 2019-07-04T07:25:00Z | - |
dc.date.created | 2019-07-01 | - |
dc.date.issued | 2019-06 | - |
dc.identifier.citation | IEEE Transactions on Wireless Communications, v.18, no.6, pp.2919 - 2931 | - |
dc.identifier.issn | 1536-1276 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11750/10095 | - |
dc.description.abstract | Unmanned aerial vehicle (UAV) wireless communication has recently been recognized to be inevitable and prevalent in the fifth-generation (5G) wireless networks. In this paper, we propose a secure transmission scheme for a wiretap channel, where a source communicates with a legitimate UAV in the presence of an eavesdropper. We consider the full-duplex active eavesdropper, which performs both eavesdropping and malicious jamming simultaneously. The source transmits artificial noise (AN) signals, in addition to information signals, to confuse this eavesdropper. By considering the ground-To-UAV channel model, we analyze the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration. We further provide the asymptotic hybrid outage probability in a more compact form, where both the transmit power at the source and the jamming power at the eavesdropper become large with a fixed ratio. Through the analysis and the numerical results, we determine the optimal power allocation factor between information signals and AN signals as well as the operating height of UAV that minimize the hybrid outage probability. We also provide the most harmful antenna configuration of the eavesdropper to the UAV communications, and this paper can be a useful framework for the design of confidential UAV communication system. | - |
dc.language | English | - |
dc.publisher | Institute of Electrical and Electronics Engineers | - |
dc.title | Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TWC.2019.2906177 | - |
dc.identifier.wosid | 000471120800003 | - |
dc.identifier.scopusid | 2-s2.0-85067125474 | - |
dc.type.local | Article(Overseas) | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.contributor.nonIdAuthor | Liu, Chenxi | - |
dc.contributor.nonIdAuthor | Quek, Tony Q. S. | - |
dc.identifier.citationVolume | 18 | - |
dc.identifier.citationNumber | 6 | - |
dc.identifier.citationStartPage | 2919 | - |
dc.identifier.citationEndPage | 2931 | - |
dc.identifier.citationTitle | IEEE Transactions on Wireless Communications | - |
dc.type.journalArticle | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | artificial noise | - |
dc.subject.keywordAuthor | jamming | - |
dc.subject.keywordAuthor | Physical layer security | - |
dc.subject.keywordAuthor | secrecy outage | - |
dc.subject.keywordAuthor | unmanned aerial vehicle | - |
dc.subject.keywordPlus | 5G mobile communication systems | - |
dc.subject.keywordPlus | Antennas | - |
dc.subject.keywordPlus | Jamming | - |
dc.subject.keywordPlus | Network layers | - |
dc.subject.keywordPlus | Probability | - |
dc.subject.keywordPlus | Transmissions | - |
dc.subject.keywordPlus | Unmanned aerial vehicles (UAV) | - |
dc.subject.keywordPlus | Vehicle to vehicle communications | - |
dc.subject.keywordPlus | Antenna configurations | - |
dc.subject.keywordPlus | Artificial noise | - |
dc.subject.keywordPlus | Information signals | - |
dc.subject.keywordPlus | Optimal power allocation | - |
dc.subject.keywordPlus | Physical layer security | - |
dc.subject.keywordPlus | Secrecy outage probabilities | - |
dc.subject.keywordPlus | Secrecy outages | - |
dc.subject.keywordPlus | Wireless communications | - |
dc.subject.keywordPlus | Outages | - |
dc.contributor.affiliatedAuthor | Lee, Jemin | - |
There are no files associated with this item.