4.8 Article

Transceiver Design and Multihop D2D for UAV IoT Coverage in Disasters

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 6, 期 2, 页码 1803-1815

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2018.2877504

关键词

Device-to-device (D2D); emergency wireless networks; Internet of Things (IoT); outage probability; transceiver design; unmanned aerial vehicle (UAV)

资金

  1. National Natural Science Foundation of China [61871065]
  2. Open Research Fund of State Key Laboratory of Integrated Services Networks [ISN19-02]
  3. Fundamental Research Funds for the Central Universities [DUT17JC43]
  4. Xinghai Scholars Program

向作者/读者索取更多资源

When natural disasters strike, the coverage for Internet of Things (IoT) may be severely destroyed, due to the damaged communications infrastructure. Unmanned aerial vehicles (UAVs) can be exploited as flying base stations to provide emergency coverage for IoT, due to its mobility and flexibility. In this paper, we propose multiantenna transceiver design and multihop device-to-device (D2D) communication to guarantee the reliable transmission and extend the UAV coverage for IoT in disasters. First, multihop D2D links are established to extend the coverage of UAV emergency networks due to the constrained transmit power of the UAV. In particular, a shortest-path-routing algorithm is proposed to establish the D2D links rapidly with minimum nodes. The closed-form solutions for the number of hops and the outage probability are derived for the uplink and downlink. Second, the transceiver designs for the UAV uplink and downlink are studied to optimize the performance of UAV transmission. Due to the nonconvexity of the problem, they are first transformed into convex ones and then, low-complexity algorithms are proposed to solve them efficiently. Simulation results show the performance improvement in the throughput and outage probability by the proposed schemes for UAV wireless coverage of IoT in disasters.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

Energy-Efficiency Optimization for D2D Communications Underlaying UAV-Assisted Industrial IoT Networks With SWIPT

Zhijie Su, Wanmei Feng, Jie Tang, Zhen Chen, Yuli Fu, Nan Zhao, Kai-Kit Wong

Summary: This article investigates the energy efficiency optimization problem for the Device-to-Device (D2D) communications underlaying unmanned aerial vehicles (UAVs)-assisted Industrial Internet of Things (IIoT) networks with simultaneous wireless information and power transfer (SWIPT). A joint UAV location and resource allocation algorithm is proposed to solve the nonconvex optimization problem involving the UAV's location, beam pattern, power control, and time scheduling. Numerical results demonstrate the significant energy efficiency gain achieved by the proposed algorithm.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Covert Communication Assisted by UAV-IRS

Chao Wang, Xinying Chen, Jianping An, Zehui Xiong, Chengwen Xing, Nan Zhao, Dusit Niyato

Summary: In this paper, a covert communication scheme assisted by UAV-IRS is proposed to maximize the covert transmission rate and defend against adversarial eavesdropping. The ground transmitter secretly sends private messages to a legitimate receiver via the UAV-IRS to prevent detection by an adversary. The scheme optimizes the transmit power, IRS phase shift, and UAV-IRS location to meet covert requirements.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

UAV-Aided Secure Short-Packet Data Collection and Transmission

Xinying Chen, Nan Zhao, Zheng Chang, Timo Hamalainen, Xianbin Wang

Summary: In this paper, a secure UAV-aided data collection and transmission scheme is proposed to ensure the freshness and security of the transmission from the sensors to the remote ground base station. The trajectory, flight duration, and user scheduling are optimized to maximize energy efficiency during the data collection phase. In the UAV data transmission phase, the maximum rate of transmission is considered to achieve a maximum secrecy rate.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Engineering, Electrical & Electronic

Secure Transmission Design for Aerial IRS Assisted Wireless Networks

Wenjing Wei, Xiaowei Pang, Jie Tang, Nan Zhao, Xianbin Wang, Arumugam Nallanathan

Summary: In this paper, a secure aerial IRS-assisted transmission design in wireless networks is proposed, which combines UAV and IRS to establish desired virtual LoS links and ensure security. The system performance is optimized by maximizing the worst-case sum secrecy rate, and the optimization problem is solved using an alternating algorithm. Simulation results demonstrate the effectiveness of the proposed scheme and the improvement in security achieved through joint optimization.

IEEE TRANSACTIONS ON COMMUNICATIONS (2023)

Article Computer Science, Hardware & Architecture

Attacking Spectrum Sensing With Adversarial Deep Learning in Cognitive Radio-Enabled Internet of Things

Mingqian Liu, Hongyi Zhang, Zilong Liu, Nan Zhao

Summary: This article investigates the unique advantages and security risks of deep learning in spectrum sensing in cognitive radio-based Internet of Things networks. By combining traditional interference methods with data poisoning attacks, a new adversarial attack method is proposed to reduce sensing accuracy, while introducing a novel design of jamming waveform to enhance interference capability.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Engineering, Electrical & Electronic

Exploiting Collaborative Computing to Improve Downlink Sum Rate in Satellite Integrated Terrestrial Networks

Liwen Zhang, Junyu Liu, Min Sheng, Nan Zhao, Jiandong Li

Summary: This paper aims to improve the downlink user sum rate in Satellite Integrated Terrestrial Network (SITN). A joint interference management and user association (JIMUA) scheme is proposed to enhance the backhaul capacity and meet the user demands by employing collaborative computing.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Cooperative Rate Splitting Secure Transmission With an Untrusted User Relay

Yuqiao Tong, Dongdong Li, Zhutian Yang, Nan Zhao, Yunfei Chen, Yonghui Li

Summary: Combining rate splitting with cooperative relay can improve the sum rate of conventional RS networks. However, the challenge lies in preventing untrusted relays from eavesdropping on private messages. To address this, a two-slot CRS scheme is proposed to guarantee security of the far user. The problem is solved using an iterative algorithm. Simulation results show the scheme's effectiveness in preventing eavesdropping.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

When DSA Meets SWIPT: A Joint Power Allocation and Time Splitting Scheme Based on Multi-Agent Deep Reinforcement Learning

Renhao Zhang, Xuanheng Li, Nan Zhao

Summary: This paper proposes a joint power allocation and time splitting scheme to enable devices to implement both dynamic spectrum access (DSA) and simultaneously wireless information and power transfer (SWIPT) simultaneously, aiming to maximize long-term throughput while ensuring interference limitation and energy supply requirements.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

Outage Analysis of Rate Splitting Networks With an Untrusted User

Yuqiao Tong, Dongdong Li, Zhutian Yang, Zehui Xiong, Nan Zhao, Yonghui Li

Summary: Two RS schemes are proposed to improve the spectrum efficiency and degrees of freedom of multi-access transmissions by using different successive interference cancellation (SIC) layers. The users decode the common stream and then their own private streams according to the scheme. One scheme uses zero-forcing for interference cancellation, while the other adopts maximum ratio transmission for the trusted far user. Outage probability and secrecy outage probability are analyzed based on channel statistics and achievable rates. Simulation results verify the theoretical findings and demonstrate the advantages of the two schemes in terms of common stream transmission and the security for the far user.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Engineering, Electrical & Electronic

When UAVs Meet Cognitive Radio: Offloading Traffic Under Uncertain Spectrum Environment via Deep Reinforcement Learning

Xuanheng Li, Sike Cheng, Haichuan Ding, Miao Pan, Nan Zhao

Summary: The emergence of the Internet of Things (IoT) has caused congestion in telecommunications networks. Unmanned aerial vehicles (UAVs) are considered a promising solution for relieving this congestion. By embedding cognitive radios into UAVs, idle spectrums can be utilized to build backhaul links. However, the success of offloading traffic through cognitive UAV (CUAV) assistance depends on both the traffic demand and spectrum environment. In this paper, we propose a deep reinforcement learning (DRL) based solution, DRL-(TB)-B-3, that jointly designs trajectory, time allocation, band selection, and transmission power control to maximize energy efficiency for CUAV-assisted traffic offloading. Simulation results demonstrate the effectiveness of our proposed strategy.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Hardware & Architecture

SECURE BEAMFORMING FOR IRS-ENHANCED NOMA NETWORKS

Wei Wang, Yang Cao, Min Sheng, Jie Tang, Nan Zhao, Dusit Niyato, Kai-Kit Wong

Summary: Due to the increasing demand for higher spectrum efficiency and large-scale connectivity, non-orthogonal multiple access (NOMA) has become a highly competitive candidate for the upcoming sixth-generation (6G) systems. However, the unstable wireless propagation environment and potential wireless security risk hinder the applications of NOMA. Fortunately, the intelligent reflecting surface (IRS) that can construct three-dimensional beamforming and reconfigure channels has emerged as an efficient technology to overcome the limitations of NOMA. In this article, an overview of NOMA is presented, along with its main shortcomings and security risks. The IRS technology is then introduced, highlighting its enhancement in NOMA networks. The article also addresses typical security threats in IRS-NOMA networks and proposes countermeasures based on joint transmit beamforming and IRS reflecting beamforming to combat external and internal eavesdropping.

IEEE WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Information Systems

Covert Communications: A Comprehensive Survey

Xinying Chen, Jianping An, Zehui Xiong, Chengwen Xing, Nan Zhao, F. Richard Yu, Arumugam Nallanathan

Summary: Information security is a critical issue in wireless networks, and covert communication emerges as a potential solution due to its high-security level. By hiding transmitted signals in noise, covert communication can ensure stronger information security. However, challenges such as effective randomness utilization and low signal-to-interference-plus-noise ratio still exist in its practical implementation.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Engineering, Civil

Adversarial Attack and Defense on Deep Learning for Air Transportation Communication Jamming

Mingqian Liu, Zhenju Zhang, Yunfei Chen, Jianhua Ge, Nan Zhao

Summary: The air transportation communication jamming recognition model based on deep learning (DL) can identify and classify communication jamming quickly and accurately, improving the safety and reliability of air traffic. However, the vulnerability of deep learning makes the model susceptible to carefully designed adversarial examples. This study proposes a double level attack method to improve defense performance and transfer the knowledge from the model to jamming recognition models in other wireless communication environments through transfer learning.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Information Systems

A Unified Rate-Splitting Framework for Secure Spectrum Sharing via Joint Precoding Optimization

Dongdong Li, Zhutian Yang, Nan Zhao, Yunfei Chen, Zhilu Wu, Yonghui Li

Summary: To handle the security problem of cognitive radio (CR) systems, secondary users (SUs) can assist the primary user (PU) in secure transmission. The rate-splitting multiple access (RSMA) is adopted for spectrum sharing among CR users, with nonorthogonal multiple access (NOMA) and space division multiple access (SDMA) as special cases. A unified rate-splitting framework is established in this article to ensure secure spectrum sharing without knowledge of wiretap channels. The framework allows for effective transmission of common stream and secure transmission of private stream for both PU and SU, and can also enhance security in NOMA and SDMA through precoding design.

IEEE SYSTEMS JOURNAL (2023)

Article Engineering, Electrical & Electronic

Online Edge Learning Offloading and Resource Management for UAV-Assisted MEC Secure Communications

Yu Ding, Yunqi Feng, Weidang Lu, Shilian Zheng, Nan Zhao, Limin Meng, Arumugam Nallanathan, Xiaoniu Yang

Summary: In this paper, a novel online edge learning offloading (OELO) scheme is proposed for UAV-assisted MEC secure communications, which improves secure computation performance. By optimizing binary offloading decision and resource management, while ensuring dynamic task data queue stability and minimum secure computing requirement, the secure computation efficiency is maximized. The Dinkelbach method is used to transform the optimization problem into a tractable form, and the offloading decision is generated based on deep reinforcement learning (DRL) and resource management is optimized iteratively through successive convex approximation (SCA). Simulation results show that the proposed scheme achieves better computing performance, stability, and security compared to benchmarks.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2023)

暂无数据