Full metadata record

DC Field Value Language
dc.contributor.authorLiu, Chenxiko
dc.contributor.authorLee, Jeminko
dc.contributor.authorQuek, Tony Q. S.ko
dc.date.accessioned2019-07-04T07:25:00Z-
dc.date.available2019-07-04T07:25:00Z-
dc.date.created2019-07-01-
dc.date.created2019-07-01-
dc.date.issued2019-06-
dc.identifier.citationIEEE Transactions on Wireless Communications, v.18, no.6, pp.2919 - 2931-
dc.identifier.issn1536-1276-
dc.identifier.urihttp://hdl.handle.net/20.500.11750/10095-
dc.description.abstractUnmanned aerial vehicle (UAV) wireless communication has recently been recognized to be inevitable and prevalent in the fifth-generation (5G) wireless networks. In this paper, we propose a secure transmission scheme for a wiretap channel, where a source communicates with a legitimate UAV in the presence of an eavesdropper. We consider the full-duplex active eavesdropper, which performs both eavesdropping and malicious jamming simultaneously. The source transmits artificial noise (AN) signals, in addition to information signals, to confuse this eavesdropper. By considering the ground-To-UAV channel model, we analyze the hybrid outage probability, which takes both the transmission outage probability and the secrecy outage probability into consideration. We further provide the asymptotic hybrid outage probability in a more compact form, where both the transmit power at the source and the jamming power at the eavesdropper become large with a fixed ratio. Through the analysis and the numerical results, we determine the optimal power allocation factor between information signals and AN signals as well as the operating height of UAV that minimize the hybrid outage probability. We also provide the most harmful antenna configuration of the eavesdropper to the UAV communications, and this paper can be a useful framework for the design of confidential UAV communication system.-
dc.languageEnglish-
dc.publisherInstitute of Electrical and Electronics Engineers-
dc.titleSafeguarding UAV Communications Against Full-Duplex Active Eavesdropper-
dc.typeArticle-
dc.identifier.doi10.1109/TWC.2019.2906177-
dc.identifier.wosid000471120800003-
dc.identifier.scopusid2-s2.0-85067125474-
dc.type.localArticle(Overseas)-
dc.type.rimsART-
dc.description.journalClass1-
dc.contributor.localauthorLee, Jemin-
dc.contributor.nonIdAuthorLiu, Chenxi-
dc.contributor.nonIdAuthorQuek, Tony Q. S.-
dc.identifier.citationVolume18-
dc.identifier.citationNumber6-
dc.identifier.citationStartPage2919-
dc.identifier.citationEndPage2931-
dc.identifier.citationTitleIEEE Transactions on Wireless Communications-
dc.type.journalArticleArticle-
dc.description.isOpenAccessN-
dc.subject.keywordAuthorartificial noise-
dc.subject.keywordAuthorjamming-
dc.subject.keywordAuthorPhysical layer security-
dc.subject.keywordAuthorsecrecy outage-
dc.subject.keywordAuthorunmanned aerial vehicle-
dc.subject.keywordPlus5G mobile communication systems-
dc.subject.keywordPlusAntennas-
dc.subject.keywordPlusJamming-
dc.subject.keywordPlusNetwork layers-
dc.subject.keywordPlusProbability-
dc.subject.keywordPlusTransmissions-
dc.subject.keywordPlusUnmanned aerial vehicles (UAV)-
dc.subject.keywordPlusVehicle to vehicle communications-
dc.subject.keywordPlusAntenna configurations-
dc.subject.keywordPlusArtificial noise-
dc.subject.keywordPlusInformation signals-
dc.subject.keywordPlusOptimal power allocation-
dc.subject.keywordPlusPhysical layer security-
dc.subject.keywordPlusSecrecy outage probabilities-
dc.subject.keywordPlusSecrecy outages-
dc.subject.keywordPlusWireless communications-
dc.subject.keywordPlusOutages-


qrcode mendeley

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE