UAV-Assisted Downlink-and-Uplink Communication in the Presence of Multiple Malicious Jammers

Zhiyu Huang*, Zhichao Sheng, Ali A. Nasir, Cheng Yin, Antonino Masaracchia

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper investigates the unmanned aerial vehicle (UAV)-assisted communication network with multiple downlink users (DLUs) and uplink users (ULUs) in the presence of multiple malicious jammers. To guarantee fairness among the users and their uplink and downlink communication throughput, we aim to maximize the minimum average throughput by jointly optimizing the scheduling of ULUs/DLUs, three dimensional (3D) trajectory and the UAV transmission power. Although the optimization problem is computationally intractable due to its non-convexity, we develop an iterative algorithm based on the block coordinate descend approach and the successive convex approximation technique to solve the problem efficiently. Numerical outcomes show that our proposed algorithm can improve throughput significantly over several benchmark schemes.

Original languageEnglish
Title of host publication2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665491228
DOIs
StatePublished - 2023
Event2023 IEEE Wireless Communications and Networking Conference, WCNC 2023 - Glasgow, United Kingdom
Duration: 26 Mar 202329 Mar 2023

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2023-March
ISSN (Print)1525-3511

Conference

Conference2023 IEEE Wireless Communications and Networking Conference, WCNC 2023
Country/TerritoryUnited Kingdom
CityGlasgow
Period26/03/2329/03/23

Bibliographical note

Publisher Copyright:
© 2023 IEEE.

Keywords

  • UAV communication
  • downlink-and-uplink
  • malicious jammer
  • trajectory design

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'UAV-Assisted Downlink-and-Uplink Communication in the Presence of Multiple Malicious Jammers'. Together they form a unique fingerprint.

Cite this