scholarly journals Secrecy Energy-Efficient UAV Communication via Trajectory Design and Power Control

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
An Li ◽  
Huohuo Han ◽  
Chuanxin Yu

This paper investigates the problem of maximizing the secrecy energy efficiency (SEE) for unmanned aerial vehicle- (UAV-) to-ground wireless communication system, in which a fixed-wing UAV tries to transmit covert information to a terrestrial legitimate destination receiver with multiple terrestrial eavesdroppers. In particular, we intend to maximize the worst-case SEE of UAV by jointly optimizing UAV’s flight trajectory and transmit power over a finite flight period. However, the formulated problem is challenging to solve because of its large-scale nonconvexity. For efficiently solving this problem, we first decouple the above optimization problem into two subproblems and then propose an alternating iterative algorithm by adopting block coordinate descent method and Dinkelbach’s algorithm as well as successive convex approximation technique to seek a suboptimal solution. For the sake of performance comparison, two benchmark schemes, the secrecy rate maximization (SRM) scheme and constrained energy minimization (CEM) scheme are considered to obtain more useful insights. Finally, simulation results are executed to verify that our proposed SEE maximization (SEEM) algorithm is superior to two benchmark schemes for the UAV-ground communication system.

Sensors ◽  
2019 ◽  
Vol 19 (20) ◽  
pp. 4440 ◽  
Author(s):  
Hanming Sun ◽  
Bin Duo ◽  
Zhengqiang Wang ◽  
Xiaochen Lin ◽  
Changchun Gao

To improve the secrecy performance of cellular-enabled unmanned aerial vehicle (UAV) communication networks, this paper proposes an aerial cooperative jamming scheme and studies its optimal design to achieve the maximum average secrecy rate. Specifically, a base station (BS) transmits confidential messages to a UAV and meanwhile another UAV performs the role of an aerial jammer by cooperatively sending jamming signals to oppose multiple suspicious eavesdroppers on the ground. As the UAVs have the advantage of the controllable mobility, the objective is to maximize the worst-case average secrecy rate by the joint optimization of the two UAVs’ trajectories and the BS’s/UAV jammer’s transmit/jamming power over a given mission period. The objective function of the formulated problem is highly non-linear regarding the optimization variables and the problem has non-convex constraints, which is, in general, difficult to achieve a globally optimal solution. Thus, we divide the original problem into four subproblems and then solve them by applying the successive convex approximation (SCA) and block coordinate descent (BCD) methods. Numerical results demonstrate that the significantly better secrecy performance can be obtained by using the proposed algorithm in comparison with benchmark schemes.


Impact ◽  
2019 ◽  
Vol 2019 (10) ◽  
pp. 90-92
Author(s):  
Kae Doki ◽  
Yuki Funabora ◽  
Shinji Doki

Every day we are seeing an increasing number of robots being employed in our day-to-day lives. They are working in factories, cleaning our houses and may soon be chauffeuring us around in vehicles. The affordability of drones too has come down and now it is conceivable for most anyone to own a sophisticated unmanned aerial vehicle (UAV). While fun to fly, these devices also represent powerful new tools for several industries. Anytime an aerial view is needed for a planning, surveillance or surveying, for example, a UAV can be deployed. Further still, equipping these vehicles with an array of sensors, for climate research or mapping, increases their capability even more. This gives companies, governments or researchers a cheap and safe way to collect vast amounts of data and complete tasks in remote or dangerous areas that were once impossible to reach. One area UAVs are proving to be particularly useful is infrastructure inspection. In countries all over the world large scale infrastructure projects like dams and bridges are ageing and in need of upkeep. Identifying which ones and exactly where they are in need of patching is a huge undertaking. Not only can this work be dangerous, requiring trained inspectors to climb these megaprojects, it is incredibly time consuming and costly. Enter the UAVs. With a fleet of specially equipped UAVs and a small team piloting them and interpreting the data they bring back the speed and safety of this work increases exponentially. The promise of UAVs to overturn the infrastructure inspection process is enticing, but there remain several obstacles to overcome. One is achieving the fine level of control and positioning required to navigate the robots around 3D structures for inspection. One can imagine that piloting a small UAV underneath a huge highway bridge without missing a single small crack is quite difficult, especially when the operators are safely on the ground hundreds of meters away. To do this knowing exactly where the vehicle is in space becomes a critical variable. The job can be made even easier if a flight plan based on set waypoints can be pre-programmed and followed autonomously by the UAV. It is exactly this problem that Dr Kae Doki from the Department of Electrical Engineering at Aichi Institute of Technology, and collaborators are focused on solving.


Technologies ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 2
Author(s):  
Ashish Jaiswal ◽  
Ashwin Ramesh Babu ◽  
Mohammad Zaki Zadeh ◽  
Debapriya Banerjee ◽  
Fillia Makedon

Self-supervised learning has gained popularity because of its ability to avoid the cost of annotating large-scale datasets. It is capable of adopting self-defined pseudolabels as supervision and use the learned representations for several downstream tasks. Specifically, contrastive learning has recently become a dominant component in self-supervised learning for computer vision, natural language processing (NLP), and other domains. It aims at embedding augmented versions of the same sample close to each other while trying to push away embeddings from different samples. This paper provides an extensive review of self-supervised methods that follow the contrastive approach. The work explains commonly used pretext tasks in a contrastive learning setup, followed by different architectures that have been proposed so far. Next, we present a performance comparison of different methods for multiple downstream tasks such as image classification, object detection, and action recognition. Finally, we conclude with the limitations of the current methods and the need for further techniques and future directions to make meaningful progress.


Author(s):  
Tong Shen ◽  
Tingting Liu ◽  
Yan Lin ◽  
Yongpeng Wu ◽  
Feng Shu ◽  
...  

Abstract In this paper, two regional robust secure precise wireless transmission (SPWT) schemes for multi-user unmanned aerial vehicle (UAV), (1)regional signal-to-leakage-and-noise ratio (SLNR) and artificial-noise-to-leakage-and-noise ratio (ANLNR) (R-SLNR-ANLNR) maximization and (2) point SLNR and ANLNR (P-SLNR-ANLNR) maximization, are proposed to tackle with the estimation errors of the target users’ location. In the SPWT system, the estimation error for SPWT cannot be ignored. However, the conventional robust methods in secure wireless communications optimize the beamforming vector in the desired positions only in statistical means and cannot guarantee the security for each symbol. The proposed regional robust schemes are designed for optimizing the secrecy performance in the whole error region around the estimated location. Specifically, with the known maximal estimation error, we define the target region and wiretap region. Then, we design an optimal beamforming vector and an artificial noise projection matrix, which achieve the confidential signal in the target area having the maximal power while only few signal power is conserved in the potential wiretap region. Instead of considering the statistical distributions of the estimated errors into optimization, we optimize the SLNR and ANLNR of the whole target area, which significantly decreases the complexity. Moreover, the proposed schemes can ensure that the desired users are located in the optimized region, which are more practical than the conventional methods. Simulation results show that our proposed regional robust SPWT design is capable of substantially improving the secrecy rate compared to the conventional non-robust method. The P-SLNR-ANLNR maximization-based method has the comparable secrecy performance with lower complexity than that of the R-SLNR-ANLNR maximization-based method.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-13
Author(s):  
Xiao Liang ◽  
Honglun Wang ◽  
Haitao Luo

The UAV/UGV heterogeneous system combines the air superiority of UAV (unmanned aerial vehicle) and the ground superiority of UGV (unmanned ground vehicle). The system can complete a series of complex tasks and one of them is pursuit-evasion decision, so a collaborative strategy of UAV/UGV heterogeneous system is proposed to derive a pursuit-evasion game in complex three-dimensional (3D) polygonal environment, which is large enough but with boundary. Firstly, the system and task hypothesis are introduced. Then, an improved boundary value problem (BVP) is used to unify the terrain data of decision and path planning. Under the condition that the evader knows the position of collaborative pursuers at any time but pursuers just have a line-of-sight view, a worst case is analyzed and the strategy between the evader and pursuers is studied. According to the state of evader, the strategy of collaborative pursuers is discussed in three situations: evader is in the visual field of pursuers, evader just disappears from the visual field of pursuers, and the position of evader is completely unknown to pursuers. The simulation results show that the strategy does not guarantee that the pursuers will win the game in complex 3D polygonal environment, but it is optimal in the worst case.


Forests ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 397
Author(s):  
Riccardo Dainelli ◽  
Piero Toscano ◽  
Salvatore Filippo Di Gennaro ◽  
Alessandro Matese

Forest sustainable management aims to maintain the income of woody goods for companies, together with preserving non-productive functions as a benefit for the community. Due to the progress in platforms and sensors and the opening of the dedicated market, unmanned aerial vehicle–remote sensing (UAV–RS) is improving its key role in the forestry sector as a tool for sustainable management. The use of UAV (Unmanned Aerial Vehicle) in precision forestry has exponentially increased in recent years, as demonstrated by more than 600 references published from 2018 until mid-2020 that were found in the Web of Science database by searching for “UAV”+“forest”. This result is even more surprising when compared with similar research for “UAV”+“agriculture”, from which emerge about 470 references. This shows how UAV–RS research forestry is gaining increasing popularity. In Part II of this review, analyzing the main findings of the reviewed papers (227), numerous strengths emerge concerning research technical issues. UAV–RS is fully applicated for obtaining accurate information from practical parameters (height, diameter at breast height (DBH), and biomass). Research effectiveness and soundness demonstrate that UAV–RS is now ready to be applied in a real management context. Some critical issues and barriers in transferring research products are also evident, namely,(1) hyperspectral sensors are poorly used, and their novel applications should be based on the capability of acquiring tree spectral signature especially for pest and diseases detection, (2) automatic processes for image analysis are poorly flexible or based on proprietary software at the expense of flexible and open-source tools that can foster researcher activities and support technology transfer among all forestry stakeholders, and (3) a clear lack exist in sensors and platforms interoperability for large-scale applications and for enabling data interoperability.


Author(s):  
Jong-Shin Chen ◽  
Cheng-Ying Yang ◽  
Jenq-Foung Jf Yao ◽  
Min-Hsiang Hwang

Sign in / Sign up

Export Citation Format

Share Document