{"title":"Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract","authors":"Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan","doi":"10.1145/3450268.3453509","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3450268.3453509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.