HM Tran, TT Nguyen, XN Tran - Available at SSRN 4797517 - papers.ssrn.com
In this paper, we analyze the average secrecy rate (ASR) of a two-way relay system based on an unmanned aerial vehicle (UAV). Specifically, a UAV serves as an aerial relay station …
Q An, Y Pan, H Han, H Hu - Sensors, 2022 - mdpi.com
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibility, on-demand deployment and the freedom in trajectory design. The communication …
G Sun, N Li, X Tao, H Wu - IEEE Access, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV)-enabled mobile relaying technique is a promising approach in providing high data rate transmission. Limitations of the UAV's hardware and the line-of …
Q Wang, Z Chen, H Li, S Li - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile relaying is emerged as a promising technique to assist wireless communication, driven by the rapid development of unmanned aerial vehicles. In this paper, we study secure …
Eavesdropping occurs when an unauthorized receiver secretly intercepts a transmitted signal. In this paper, we investigate the optimum flight path and transmit power for an …
In this paper, we propose and analyze the maximal secrecy capability of an unmanned aerial vehicle (UAV)-based relay non-orthogonal multiple access system. In this system, a …
T Bao, H Wang, WJ Wang, HC Yang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we study the secrecy performance of an unmanned aerial vehicle (UAV)- assisted relay communication system, where a ground base station (GBS) intends to send …
MC Mah, HS Lim, AWC Tan - Vehicular Communications, 2020 - Elsevier
Eavesdropping occurs when an unauthorized receiver secretly intercepts a transmitted signal. In this paper, we investigate the optimum flight path and transmit power for an …
Z Wang, Y Liu, H Zhang, Y Xu, X Wan… - 2021 24th International …, 2021 - ieeexplore.ieee.org
This paper considers an unmanned aerial vehicle (UAV) as a buffer-aided mobile relay systems. A UAV is exploited to forward confidential information between a ground source …