4.7 Article

Secure UAV-Enabled Communication Using Han-Kobayashi Signaling

期刊

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
卷 19, 期 5, 页码 2905-2919

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2020.2968317

关键词

Secure communication; secrecy throughput; unmanned aerial vehicle (UAV); Han-Kobayshi signaling; non-convex optimization

资金

  1. National Natural Science Foundation of China (NSFC) [61901254]
  2. Institute for Computational Science and Technology, Hochiminh City, Vietnam
  3. Australian Research Councils' Discovery Projects [DP190102501]
  4. U.K. Royal Academy of Engineering Research Fellowship [RF1415\14\22]
  5. U.S. National Science Foundation [CCF-0939370, CCF-1908308]

向作者/读者索取更多资源

This paper proposes Han-Kobayashi signaling (HKS), under which each pair of users decodes a common message to improve their throughput, for UAV-enabled multi-user communication. Given that only a single transmit antenna is used and thus there is no null space of users' channels for inserting an artificial noise that would effectively help to jam an eavesdropper without interfering the users' desired signals, a new information and artificial noise transfer scheme to address physical layer security (PLS) for the considered networks is investigated. Under this scheme, the UAV sends the confidential information to its users within a fraction of the time slot and sends the artificial noise within the remaining fraction. Accordingly, the problem of jointly optimizing the time-fraction, bandwidth and power allocation to maximize the users' worst secrecy throughput is formulated. New inner approximations are proposed for developing path-following algorithms for its computation. Simulation shows that the proposed information and artificial noise transfer enables not only HKS but also orthogonal multi-access and nonorthogonal multi-access to provide PLS for UAV-enabled communication even when the eavesdropper is in the best channel condition. HKS outperforms the other two schemes in terms of users' worst secrecy throughput.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据