Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers

Zhiyu Huang*, Zhichao Sheng, Ali A. Nasir, Hongwen Yu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

A full-duplex unmanned aerial vehicle (UAV)-based communication network is investigated, where the UAV is dispatched to transmit information to multiple downlink users (DLUs) and receive signal from uplink users (ULUs) simultaneously in the existence of malicious jammers. Considering the limited battery power of the UAV and the quality of service required, 3-D trajectory, DLUs scheduling, ULUs scheduling, and uplink/downlink transmit power allocation are jointly optimized to maximize the energy efficiency of the network. However, the formulated optimization problem with high coupling variables and fractional objective function is nonconvex and therefore mathematically intractable. To address the problem, the BCD method is implemented to decompose the optimization problem into four independent subproblems. An iterative algorithm based on Dinkelbach's algorithm and successive convex approximation technique is developed to solve the problem efficiently. Numerical simulation results are presented to evaluate the performance of different schemes and demonstrate the advantages of the proposed algorithm.

Original languageEnglish
Pages (from-to)1257-1268
Number of pages12
JournalIEEE Systems Journal
Volume18
Issue number2
DOIs
StatePublished - 1 Jun 2024

Bibliographical note

Publisher Copyright:
© 2007-2012 IEEE.

Keywords

  • Energy efficiency (EE)
  • full-duplex (FD)
  • malicious jammer
  • nonconvex optimization
  • unmanned aerial vehicle (UAV)

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Information Systems
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Energy Efficiency Maximization for UAV-Assisted Full-Duplex Communication in the Presence of Multiple Malicious Jammers'. Together they form a unique fingerprint.

Cite this