Joint resource, trajectory, and artificial noise optimization in secure driven 3-D UAVs with NOMA and imperfect CSI

Y Li, H Zhang, K Long - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Driven by the practicality of unmanned aerial vehicle (UAV), we consider a dual-UAV based
non-orthogonal multiple access (NOMA) scenario, which consists of one communication …

Cognitive NOMA for UAV-enabled secure communications: Joint 3D trajectory design and power allocation

N Tang, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
In the paper, we investigate the physical layer security (PLS) of an unmanned aerial vehicle
(UAV) enabled communication system that integrates non-orthogonal multiple access …

Alternative optimization for secrecy throughput maximization in UAV-aided NOMA networks

LP Qian, W Zhang, Q Wang, Y Wu… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
With the rapid boost of wireless networks, it is challenging to guarantee the secure
transmission and massive connectivity in the process of data collection. This letter considers …

Joint trajectory and power optimization for jamming-aided NOMA-UAV secure networks

Y Li, W Wang, M Liu, N Zhao, X Jiang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
The combination of nonorthogonal multiple access (NOMA) technique and unmanned aerial
vehicle (UAV) provides an effective solution for achieving massive connections and …

Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks

D Deng, X Li, V Menon, MJ Piran, H Chen… - Digital Communications …, 2022 - Elsevier
Abstract Non-Orthogonal Multiplex Access (NOMA) can be deployed in Unmanned Aerial
Vehicle (UAV) networks to improve spectrum efficiency. Due to the broadcasting feature of …

Max-min secrecy rate for NOMA-based UAV-assisted communications with protected zone

Z Yin, M Jia, W Wang, N Cheng, F Lyu… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
In this paper, we study the secrecy provisioning downlink transmission in an aerial-assisted
network, where the unmanned aerial vehicle (UAV) serves as an aerial platform to provide …

Joint resource and trajectory optimization for secure UAV-based relay NOMA system

TT Nguyen, MH Tran, TTH Le, XN Tran - Vehicular Communications, 2023 - Elsevier
In this paper, we propose and analyze the maximal secrecy capability of an unmanned
aerial vehicle (UAV)-based relay non-orthogonal multiple access system. In this system, a …

Robust 3D-trajectory and time switching optimization for dual-UAV-enabled secure communications

W Wang, X Li, R Wang, K Cumanan… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure
communication system, in which, a UAV moves around to send confidential messages to a …

Securing aerial-ground transmission for NOMA-UAV networks

X Chen, D Li, Z Yang, Y Chen, N Zhao, Z Ding… - IEEE …, 2020 - ieeexplore.ieee.org
The efficient spectrum utilization of non-orthogonal multiple access (NOMA) and flexible
mobility of unmanned aerial vehicle (UAV) enable NOMA UAV to become a prospective …

UAV swarm-enabled aerial CoMP: A physical layer security perspective

X Wang, W Feng, Y Chen, N Ge - IEEE Access, 2019 - ieeexplore.ieee.org
Unlike aerial base station enabled by a single unmanned aerial vehicle (UAV), aerial
coordinated multiple points (CoMP) can be enabled by a UAV swarm. In this case, the …