ﻻ يوجد ملخص باللغة العربية
By observing the fact that moving in a straight line is a common flying behavior of unmanned aerial vehicles (UAVs) in normal applications, e.g., power line inspections, and air patrols along with highway/streets/borders, in this paper we investigate the secrecy outage performance of a UAV system with linear trajectory, where a UAV ($S$) flies in a straight line and transmits its information over the downlink to a legitimate receiver ($D$) on the ground while an eavesdropping UAV ($E$) trying to overhear the information delivery between $S$ and $D$. Meanwhile, some information is delivered to $S$ over the uplink from $D$, such as commanding messages to control $S$s detecting operations, which can also be eavesdropped by $E$. The locations of $S$, $D$, and $E$ are randomly distributed. We first characterize the statistical characteristics (including cumulative distribution functions and probability density function) of the received signal-to-noise ratio over both downlink and uplink, and then the closed-form analytical expressions for the lower boundary of the secrecy outage probability of both downlink and uplink have also been derived accordingly. Finally, Monte-Carlo simulations are given to testify our proposed analytical models.
Recently, three useful secrecy metrics based on the partial secrecy regime were proposed to analyze secure transmissions on wireless systems over quasi-static fading channels, namely: generalized secrecy outage probability, average fractional equivoc
In this paper, considering an interference limited inband downlink cellular network, we study the effects of scheduling criteria, mobility constraints, path loss models, backhaul constraints, and 3D antenna radiation pattern on trajectory optimizatio
Unmanned aerial vehicles (UAVs) are now beginning to be deployed for enhancing the network performance and coverage in wireless communication. However, due to the limitation of their on-board power and flight time, it is challenging to obtain an opti
Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles (UAVs). In this paper, we study secure transmission in a four-node (source, destination, mobile relay, a
An unmanned aerial vehicle (UAV)-aided secure communication system is conceived and investigated, where the UAV transmits legitimate information to a ground user in the presence of an eavesdropper (Eve). To guarantee the security, the UAV employs a p