Filters








6 Hits in 6.6 sec

Terahertz Meets Untrusted UAV-Relaying: Minimum Secrecy Energy Efficiency Maximization via Trajectory and Communication Co-design [article]

Milad Tatar Mamaghani, Yi Hong
2022 arXiv   pre-print
For the sake of quality of service fairness amongst all the UEs, we aim to maximize the minimum SEE (MSEE) performance via the joint design of key system parameters, including UUR's trajectory and velocity  ...  We assume that the UAV-mounted relay may act, besides providing relaying services, as a potential eavesdropper called the untrusted UAV-relay (UUR).  ...  Other efforts were made to maximize the average secrecy rate (ASR) via joint trajectory and communication design for UAV-standalone wireless system [13] - [15] , for double-UAV with external jamming  ... 
arXiv:2107.09896v3 fatcat:mhfcmukocbhudfhw7mwvhc6heu

Intelligent Reflective Surface Deployment in 6G: A Comprehensive Survey [article]

Faisal Naeem, Georges Kaddoum, Saud Khan, Komal S. Khan
2022 arXiv   pre-print
Finally, we highlight challenges and future research directions from the deployment aspect of IRSs for improving system performance for the future 6G network.  ...  Specifically, in this paper, we introduce key theoretical concepts underlying the IRS paradigm and discuss the design aspects related to the deployment of IRSs in 6G networks.  ...  IRS mounted on Mo- Outdoor Terrestrial communi- Average Joint design of transmission UAV [53] bile UAV cation network en- achievable rate, trajectory, and reflecting phase hanced by UAV-IRS average secrecy  ... 
arXiv:2204.01152v1 fatcat:sjy7hkp3bbcsxos7rfijggwbkm

A Survey on Millimeter-Wave Beamforming Enabled UAV Communications and Networking [article]

Zhenyu Xiao, Lipeng Zhu, Yanming Liu, Pengfei Yi, Rui Zhang, Xiang-Gen Xia, Robert Schober
2021 arXiv   pre-print
Finally, we present open issues and promising directions for future research in mmWave beamforming enabled UAV communications and networking.  ...  Unmanned aerial vehicles (UAVs) have found widespread commercial, civilian, and military applications. Wireless communication has always been one of the core technologies for UAV.  ...  In [88] , the joint trajectory, user association, power allocation, and passive beamforming optimization was studied for maximization of the fair secrecy energy efficiency in an IRS on-board UAV relay  ... 
arXiv:2104.09204v2 fatcat:rbywt5p7uzhhzg3hbc7tnln45q

A Systematic Review on NOMA Variants for 5G and Beyond

Ishan Budhiraja, Neeraj Kumar, Sudhanshu Tyagi, Sudeep Tanwar, Zhu Han, Doug Young Suh, MD. Jalil Piran
2021 IEEE Access  
In [220] , the authors studied the bit allocation, and trajectory optimization framework for UAV mounted cloudlet for offloading applications in NOMA.  ...  between energy efficiency and spectral efficiency.  ... 
doi:10.1109/access.2021.3081601 fatcat:mzmmr3km5zehhh3fnupyelfo3e

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., and Bose, R., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe  ...  ., +, JIoT Feb. 2020 1401-1412 Secure Communication via Multiple RF-EH Untrusted Relays With Finite Energy Storage.  ...  ., +, JIoT May 2020 3812-3821 Secure Communication via Multiple RF-EH Untrusted Relays With Finite Energy Storage.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
However, for now, security and privacy issues for 6G remain largely in concept.  ...  Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection  ...  The mentioned techniques on maximizing the transmission secrecy rate in mmWave can be applied for NOMA-aided networks to mitigate the attacks.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi