Joint trajectory design and resource allocation for UAV-assisted jamming NOMA cognitive UAV networks

R Sun, Y Wu, F Zhou, Q Wu - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
The exploitation of non-orthogonal multiple access (NOMA) for the cognitive unmanned
aerial vehicle (UAV) networks is promising to tackle the spectrum scarcity problem …

Joint trajectory and power optimization for jamming-aided NOMA-UAV secure networks

Y Li, W Wang, M Liu, N Zhao, X Jiang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
The combination of nonorthogonal multiple access (NOMA) technique and unmanned aerial
vehicle (UAV) provides an effective solution for achieving massive connections and …

Resource allocation and trajectories design for UAV-assisted jamming cognitive UAV networks

Z Tao, F Zhou, Y Wang, X Liu, Q Wu - China Communications, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications are subject to the severe spectrum scarcity
problem. Cognitive UAV networks are promising to tackle this issue while the confidential …

Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks

D Deng, X Li, V Menon, MJ Piran, H Chen… - Digital Communications …, 2022 - Elsevier
Abstract Non-Orthogonal Multiplex Access (NOMA) can be deployed in Unmanned Aerial
Vehicle (UAV) networks to improve spectrum efficiency. Due to the broadcasting feature of …

Securing aerial-ground transmission for NOMA-UAV networks

X Chen, D Li, Z Yang, Y Chen, N Zhao, Z Ding… - IEEE …, 2020 - ieeexplore.ieee.org
The efficient spectrum utilization of non-orthogonal multiple access (NOMA) and flexible
mobility of unmanned aerial vehicle (UAV) enable NOMA UAV to become a prospective …

Cognitive NOMA for UAV-enabled secure communications: Joint 3D trajectory design and power allocation

N Tang, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
In the paper, we investigate the physical layer security (PLS) of an unmanned aerial vehicle
(UAV) enabled communication system that integrates non-orthogonal multiple access …

Joint resource, trajectory, and artificial noise optimization in secure driven 3-D UAVs with NOMA and imperfect CSI

Y Li, H Zhang, K Long - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Driven by the practicality of unmanned aerial vehicle (UAV), we consider a dual-UAV based
non-orthogonal multiple access (NOMA) scenario, which consists of one communication …

Security enhancement for NOMA-UAV networks

N Zhao, Y Li, S Zhang, Y Chen, W Lu… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Owing to its distinctive merits, non-orthogonal multiple access (NOMA) techniques have
been utilized in unmanned aerial vehicle (UAV) enabled wireless base stations to provide …

Alternative optimization for secrecy throughput maximization in UAV-aided NOMA networks

LP Qian, W Zhang, Q Wang, Y Wu… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
With the rapid boost of wireless networks, it is challenging to guarantee the secure
transmission and massive connectivity in the process of data collection. This letter considers …

Secure NOMA-based UAV-MEC network towards a flying eavesdropper

W Lu, Y Ding, Y Gao, Y Chen, N Zhao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Non-orthogonal multiple access (NOMA) allows multiple users to share link resource for
higher spectrum efficiency. It can be applied to unmanned aerial vehicle (UAV) and mobile …