Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers

In this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and...

Full description

Saved in:
Bibliographic Details
Main Authors: Huang Zhiyu, Liu Shuzhen, Sheng Zhichao, Yu Hongwen, Masaracchia Antonino
Format: Article
Language:English
Published: EDP Sciences 2024-01-01
Series:Security and Safety
Subjects:
Online Access:https://sands.edpsciences.org/articles/sands/full_html/2024/01/sands20230022/sands20230022.html
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849390874737246208
author Huang Zhiyu
Liu Shuzhen
Sheng Zhichao
Yu Hongwen
Masaracchia Antonino
author_facet Huang Zhiyu
Liu Shuzhen
Sheng Zhichao
Yu Hongwen
Masaracchia Antonino
author_sort Huang Zhiyu
collection DOAJ
description In this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and time-fraction (TF). Based on the FDD scheme, the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth simultaneously. To perform the STR within the whole bandwidth, the TF-based scheme is considered by using a fraction of a time slot for the downlink, while the remaining fraction of the time slot is allocated for the uplink. We aim to maximize the worst-case throughput by optimizing the UAV three-dimensional (3D) trajectory and resource allocation for each scheme. The optimization problem is non-convex and thus computationally intractable. To handle the nonlinear problem, we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex problems. The simulation results demonstrate the performance of the TF-based scheme over the benchmark schemes.
format Article
id doaj-art-cf6a14dca5124f1e92f5c6ae72da2922
institution Kabale University
issn 2826-1275
language English
publishDate 2024-01-01
publisher EDP Sciences
record_format Article
series Security and Safety
spelling doaj-art-cf6a14dca5124f1e92f5c6ae72da29222025-08-20T03:41:15ZengEDP SciencesSecurity and Safety2826-12752024-01-013202303110.1051/sands/2023031sands20230022Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammersHuang Zhiyu0https://orcid.org/0009-0000-0687-2385Liu Shuzhen1Sheng Zhichao2Yu Hongwen3Masaracchia Antonino4Key Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai UniversityKey Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai UniversityKey Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai UniversityKey Laboratory of Specialty Fiber Optics and Optical Access Networks, Shanghai UniversitySchool of Electronics, Electrical Engineering and Computer Science, Queen’s University BelfastIn this paper, we study an unmanned aerial vehicle (UAV)-assisted communication system, where the UAV is dispatched to implement simultaneous transmission and reception (STR) in the existence of multiple malicious jammers. Two schemes are investigated, namely frequency band-division-duplex (FDD) and time-fraction (TF). Based on the FDD scheme, the UAV can transmit information by using the portion of the bandwidth and receive information within the remaining portion of the bandwidth simultaneously. To perform the STR within the whole bandwidth, the TF-based scheme is considered by using a fraction of a time slot for the downlink, while the remaining fraction of the time slot is allocated for the uplink. We aim to maximize the worst-case throughput by optimizing the UAV three-dimensional (3D) trajectory and resource allocation for each scheme. The optimization problem is non-convex and thus computationally intractable. To handle the nonlinear problem, we use the block coordinate decomposition method to disaggregate the optimization problem into four subproblems and adopt the successive convex approximation technique to tackle non-convex problems. The simulation results demonstrate the performance of the TF-based scheme over the benchmark schemes.https://sands.edpsciences.org/articles/sands/full_html/2024/01/sands20230022/sands20230022.htmlunmanned aerial vehicle (uav)-assisted communicationsimultaneous transmission and reception (str)throughput optimizationnon-convex optimization
spellingShingle Huang Zhiyu
Liu Shuzhen
Sheng Zhichao
Yu Hongwen
Masaracchia Antonino
Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
Security and Safety
unmanned aerial vehicle (uav)-assisted communication
simultaneous transmission and reception (str)
throughput optimization
non-convex optimization
title Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
title_full Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
title_fullStr Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
title_full_unstemmed Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
title_short Optimization for UAV-assisted simultaneous transmission and reception communications in the existence of malicious jammers
title_sort optimization for uav assisted simultaneous transmission and reception communications in the existence of malicious jammers
topic unmanned aerial vehicle (uav)-assisted communication
simultaneous transmission and reception (str)
throughput optimization
non-convex optimization
url https://sands.edpsciences.org/articles/sands/full_html/2024/01/sands20230022/sands20230022.html
work_keys_str_mv AT huangzhiyu optimizationforuavassistedsimultaneoustransmissionandreceptioncommunicationsintheexistenceofmaliciousjammers
AT liushuzhen optimizationforuavassistedsimultaneoustransmissionandreceptioncommunicationsintheexistenceofmaliciousjammers
AT shengzhichao optimizationforuavassistedsimultaneoustransmissionandreceptioncommunicationsintheexistenceofmaliciousjammers
AT yuhongwen optimizationforuavassistedsimultaneoustransmissionandreceptioncommunicationsintheexistenceofmaliciousjammers
AT masaracchiaantonino optimizationforuavassistedsimultaneoustransmissionandreceptioncommunicationsintheexistenceofmaliciousjammers