{"title":"无人机辅助干扰NOMA认知无人机网络联合轨迹设计与资源分配","authors":"Ruomei Sun, Yuhang Wu, Fuhui Zhou, Qihui Wu","doi":"10.1109/ISWCS56560.2022.9940431","DOIUrl":null,"url":null,"abstract":"The exploitation of non-orthogonal multiple access (NOMA) for the cognitive unmanned aerial vehicle (UAV) networks is promising to tackle the spectrum scarcity problem. However, the openness characteristic of the spectrum in the cognitive UAV networks makes the private information vulnerable to be eavesdropped. In this paper, a downlink UAV-assisted jamming cognitive UAV network with NOMA is studied to tackle this issue. In order to improve the secure performance of the networks, the trajectories and transmit power of the cognitive UAV and the jamming UAV are jointly optimized to maximize the average security rate of the secondary users. An alternative algorithm that employs the successive convex approximation (SCA) method is proposed to solve the challenging non-convex optimization problem. Furthermore, the simulation results show that the proposed scheme can significantly improve the system secure performance.","PeriodicalId":141258,"journal":{"name":"2022 International Symposium on Wireless Communication Systems (ISWCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Joint Trajectory Design and Resource Allocation for UAV-assisted Jamming NOMA Cognitive UAV Networks\",\"authors\":\"Ruomei Sun, Yuhang Wu, Fuhui Zhou, Qihui Wu\",\"doi\":\"10.1109/ISWCS56560.2022.9940431\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The exploitation of non-orthogonal multiple access (NOMA) for the cognitive unmanned aerial vehicle (UAV) networks is promising to tackle the spectrum scarcity problem. However, the openness characteristic of the spectrum in the cognitive UAV networks makes the private information vulnerable to be eavesdropped. In this paper, a downlink UAV-assisted jamming cognitive UAV network with NOMA is studied to tackle this issue. In order to improve the secure performance of the networks, the trajectories and transmit power of the cognitive UAV and the jamming UAV are jointly optimized to maximize the average security rate of the secondary users. An alternative algorithm that employs the successive convex approximation (SCA) method is proposed to solve the challenging non-convex optimization problem. Furthermore, the simulation results show that the proposed scheme can significantly improve the system secure performance.\",\"PeriodicalId\":141258,\"journal\":{\"name\":\"2022 International Symposium on Wireless Communication Systems (ISWCS)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Symposium on Wireless Communication Systems (ISWCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISWCS56560.2022.9940431\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Symposium on Wireless Communication Systems (ISWCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWCS56560.2022.9940431","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Joint Trajectory Design and Resource Allocation for UAV-assisted Jamming NOMA Cognitive UAV Networks
The exploitation of non-orthogonal multiple access (NOMA) for the cognitive unmanned aerial vehicle (UAV) networks is promising to tackle the spectrum scarcity problem. However, the openness characteristic of the spectrum in the cognitive UAV networks makes the private information vulnerable to be eavesdropped. In this paper, a downlink UAV-assisted jamming cognitive UAV network with NOMA is studied to tackle this issue. In order to improve the secure performance of the networks, the trajectories and transmit power of the cognitive UAV and the jamming UAV are jointly optimized to maximize the average security rate of the secondary users. An alternative algorithm that employs the successive convex approximation (SCA) method is proposed to solve the challenging non-convex optimization problem. Furthermore, the simulation results show that the proposed scheme can significantly improve the system secure performance.