期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Physical Layer Security for UAV Communications:A Comprehensive Survey 被引量:9
1
作者 Jue Wang Xuanxuan Wang +5 位作者 Ruifeng Gao Chengleyang Lei Wei Feng Ning Ge Shi Jin Tony Q.S.Quek 《China Communications》 SCIE CSCD 2022年第9期77-115,共39页
Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an... Due to its high mobility and flexible deployment,unmanned aerial vehicle(UAV)is drawing unprecedented interest in both military and civil applications to enable agile and ubiquitous connectivity.Mainly operating in an open environment,UAV communications benefit from dominant line-of-sight links;however,this on the other hand renders the communications more vulnerable to malicious attacks.Recently,physical layer security(PLS)has been introduced to UAV systems as an important complement to the conventional cryptography-based approaches.In this paper,a comprehensive survey on the current achievements of UAV-PLS is conducted.We first introduce the basic concepts including typical static/-mobile UAV deployment scenarios,the unique air-toground channel and aerial nodes distribution models,as well as various roles that a UAV may act when PLS is concerned.Then,we start by reviewing the secrecy performance analysis and enhancing techniques for statically deployed UAV systems,and extend the discussion to the more general scenario where the UAVs’mobility is further exploited.For both cases,respectively,we summarize the commonly adopted methodologies,then describe important works in the litera ture in detail.Finally,potential research directions and challenges are discussed to provide an outlook for future works in the area of UAV-PLS. 展开更多
关键词 physical layer security UAV communications static/mobile UAV deployment air-to-ground channel trajectory optimization
在线阅读 下载PDF
Mobile Jammer-Aided Secure UAV Communications via Trajectory Design and Power Control 被引量:13
2
作者 An Li Wenjing Zhang 《China Communications》 SCIE CSCD 2018年第8期141-151,共11页
To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile... To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes. 展开更多
关键词 physical layer security UAV-ground communications mobile jammer-aided trajectory design power control
在线阅读 下载PDF
移动通信系统安全功能的实现和演进
3
作者 方珅 《电信工程技术与标准化》 2006年第3期45-49,共5页
本文通过对比GSM、GPRS、WCDMA系统对安全功能的实现机制来分析安全演进过程,按照分析网络结构、找出网络漏洞和潜在威胁、提出安全措施的思路进行对比分析。重点对影响信息保密性、信息完整性和信息可用性原则来评估第三代通信网络安... 本文通过对比GSM、GPRS、WCDMA系统对安全功能的实现机制来分析安全演进过程,按照分析网络结构、找出网络漏洞和潜在威胁、提出安全措施的思路进行对比分析。重点对影响信息保密性、信息完整性和信息可用性原则来评估第三代通信网络安全功能实现。通过分析网络存在的安全漏洞及安全威胁来得到安全功能的需求,从而得到第三代通信网络安全功能实现的比较。尤其是对WCDMA中使用的关键安全措施进行较为完整的描述。 展开更多
关键词 移动通信 安全 wcdma
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部