期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Average Secrecy Capacity of the Reconfigurable Intelligent Surface-Assisted Integrated Satellite Unmanned Aerial Vehicle Relay Networks
1
作者 Ping Li Kefeng Guo +2 位作者 Feng Zhou XuelingWang Yuzhen Huang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1849-1864,共16页
Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-e... Integrated satellite unmanned aerial vehicle relay networks(ISUAVRNs)have become a prominent topic in recent years.This paper investigates the average secrecy capacity(ASC)for reconfigurable intelligent surface(RIS)-enabled ISUAVRNs.Especially,an eve is considered to intercept the legitimate information from the considered secrecy system.Besides,we get detailed expressions for the ASC of the regarded secrecy system with the aid of the reconfigurable intelligent.Furthermore,to gain insightful results of the major parameters on the ASC in high signalto-noise ratio regime,the approximate investigations are further gotten,which give an efficient method to value the secrecy analysis.At last,some representative computer results are obtained to prove the theoretical findings. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks reconfigurable intelligent surface average secrecy capacity(ASC) asymptotic ASC
下载PDF
Secrecy Outage Probability for Two-Way Integrated Satellite Unmanned Aerial Vehicle Relay Networks with Hardware Impairments
2
作者 Xiaoting Ren Kefeng Guo 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2515-2530,共16页
In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy... In this paper,we investigate the secrecy outage performance for the two-way integrated satellite unmanned aerial vehicle relay networks with hardware impairments.Particularly,the closed-form expression for the secrecy outage probability is obtained.Moreover,to get more information on the secrecy outage probability in a high signalto-noise regime,the asymptotic analysis along with the secrecy diversity order and secrecy coding gain for the secrecy outage probability are also further obtained,which presents a fast method to evaluate the impact of system parameters and hardware impairments on the considered network.Finally,Monte Carlo simulation results are provided to show the efficiency of the theoretical analysis. 展开更多
关键词 Integrated satellite unmanned aerial vehicle relay networks two-way unmanned aerial vehicle relay hardware impairments secrecy outage probability(SOP) asymptotic SOP
下载PDF
Multi-objective robust secure beamforming for cognitive satellite and UAV networks 被引量:3
3
作者 WANG Zining LIN Min +3 位作者 TANG Xiaogang GUO Kefeng HUANG Shuo CHENG Ming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第4期789-798,共10页
A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with t... A multi-objective optimization based robust beamforming(BF)scheme is proposed to realize secure transmission in a cognitive satellite and unmanned aerial vehicle(UAV)network.Since the satellite network coexists with the UAV network,we first consider both achievable secrecy rate maximization and total transmit power minimization,and formulate a multi-objective optimization problem(MOOP)using the weighted Tchebycheff approach.Then,by supposing that only imperfect channel state information based on the angular information is available,we propose a method combining angular discretization with Taylor approximation to transform the non-convex objective function and constraints to the convex ones.Next,we adopt semi-definite programming together with randomization technology to solve the original MOOP and obtain the BF weight vector.Finally,simulation results illustrate that the Pareto optimal trade-off can be achieved,and the superiority of our proposed scheme is confirmed by comparing with the existing BF schemes. 展开更多
关键词 cognitive satellite and unmanned aerial vehicle network(CSUN) multi-objective optimization robust secure beamforming(BF) weighted Tchebycheff approach
下载PDF
Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network
4
作者 Lemei Da Hai Liang +3 位作者 Yong Ding Yujue Wang Changsong Yang Huiyong Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期879-902,共24页
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such... The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information transmission.Due to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security threats.This paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario.Each UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative domain.After successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for storage.There are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,respectively.The security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution attack.It also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)assumption.The performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity. 展开更多
关键词 unmanned aerial vehicle cluster network certificateless signcryption certificateless signature batch verification source authentication data privacy blockchain
下载PDF
Dynamic value iteration networks for the planning of rapidly changing UAV swarms 被引量:3
5
作者 Wei LI Bowei YANG +1 位作者 Guanghua SONG Xiaohong JIANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第5期687-696,共10页
In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this st... In an unmanned aerial vehicle ad-hoc network(UANET),sparse and rapidly mobile unmanned aerial vehicles(UAVs)/nodes can dynamically change the UANET topology.This may lead to UANET service performance issues.In this study,for planning rapidly changing UAV swarms,we propose a dynamic value iteration network(DVIN)model trained using the episodic Q-learning method with the connection information of UANETs to generate a state value spread function,which enables UAVs/nodes to adapt to novel physical locations.We then evaluate the performance of the DVIN model and compare it with the non-dominated sorting genetic algorithm II and the exhaustive method.Simulation results demonstrate that the proposed model significantly reduces the decisionmaking time for UAV/node path planning with a high average success rate. 展开更多
关键词 Dynamic value iteration networks Episodic Q-learning unmanned aerial vehicle(UAV)ad-hoc network Non-dominated sorting genetic algorithm II(NSGA-II) Path planning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部