{"title":"改进未知窃听者位置的双无人机系统安全性能:海报摘要","authors":"Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan","doi":"10.1145/3450268.3453509","DOIUrl":null,"url":null,"abstract":"Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.","PeriodicalId":130134,"journal":{"name":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract\",\"authors\":\"Jianwei Sun, Heng Zhang, Weiwei Xu, Hongran Li, Jian Zhang, Jiacheng Ke, Hao Yan\",\"doi\":\"10.1145/3450268.3453509\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.\",\"PeriodicalId\":130134,\"journal\":{\"name\":\"Proceedings of the International Conference on Internet-of-Things Design and Implementation\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the International Conference on Internet-of-Things Design and Implementation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3450268.3453509\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Internet-of-Things Design and Implementation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3450268.3453509","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract
Unmanned aerial vehicles (UAVs) are widely used in wireless communication. We take a novel scenario into consideration where a friendly jammer UAV is utilized to interfere with the eavesdropper whose actual position is unknown and the other UAV is used as a transmitter. We propose an algorithm to find optimal trajectory of the friendly jammer UAV under the consideration that the transmitter is mobile. We evaluate the extent of safe region (SR) through optimizing jammer UAV's trajectory. Numerical simulations demonstrate that the method we proposed is effective.