Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
作者机构:Key Laboratory of Specialty Fiber Optics and Optical Access NetworksShanghai UniversityShanghai 200444China School of ElectronicsElectrical Engineering and Computer ScienceQueen's University BelfastBelfast BT71NNUK
出 版 物:《Security and Safety》 (一体化安全(英文))
年 卷 期:2024年第3卷第1期
页 面:68-87页
学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 082503[工学-航空宇航制造工程] 081001[工学-通信与信息系统] 0825[工学-航空宇航科学与技术]
基 金:supported in part by the National Natural Science Foundation of China(NSFC)under Grant 61901254 in part by the Aeronautical Science Foundation of China under Grant 2020Z0660S6001
主 题:Unmanned aerial vehicle(UAV)-assisted communication simultaneous transmission and reception(STR) throughput optimization non-convex optimization
摘 要:In this paper,we study an unmanned aerial vehicle(UAV)-assisted communication system,where the UAV is dispatched to implement simultaneous transmission and reception(STR)in the existence of multiple malicious *** schemes are investigated,namely frequency band-division-duplex(FDD)and time-fraction(TF).Based on the FDD scheme,the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth *** perform the STR within the whole bandwidth,the TF-based scheme is considered by using a fraction of a time slot for the downlink,while the remaining fraction of the time slot is allocated for the *** aim to maximize the worst-case throughput by optimizing the UAV three-dimensional(3D)trajectory and resource allocation for each *** optimization problem is non-convex and thus computationally *** handle the nonlinear problem,we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex *** simulation results demonstrate the performance of the TF-based scheme over the benchmark schemes.