scispace - formally typeset
Search or ask a question
Author

Xu Jiang

Other affiliations: Xidian University
Bio: Xu Jiang is an academic researcher from Dalian University of Technology. The author has contributed to research in topics: Software deployment & Optimization problem. The author has an hindex of 2, co-authored 4 publications receiving 28 citations. Previous affiliations of Xu Jiang include Xidian University.

Papers
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey on green UAV communications for 6G is carried out, and the typical UAVs and their energy consumption models are introduced, and several promising techniques and open research issues are pointed out.

83 citations

Journal ArticleDOI
TL;DR: This letter considers employing a non-orthogonal multiple access (NOMA) unmanned aerial vehicle (UAV) as relay to ferry data from a remote base station to multiple ground users to minimize the power consumption of UAV by jointly optimizing the location and transmission power of U AV.
Abstract: In this letter, we consider employing a non-orthogonal multiple access (NOMA) unmanned aerial vehicle (UAV) as relay to ferry data from a remote base station to multiple ground users. Our objective is to minimize the power consumption of UAV by jointly optimizing the location and transmission power of UAV. The formulated problem is non-convex with highly coupled binary discrete constraints, which is intractable to solve. Firstly, it is transformed into a more tractable form, where the logarithmic constraints are transformed into polynomial form, and the discrete constraints are transformed into continuous form. Then the non-convex equality constraints are handled by penalty method, while the non-convex inequality constraints are handled by successive convex approximation technique. Based on these measures, we propose a double-loop iterative algorithm to obtain the solution approximately. Numerical results show the effectiveness of our proposed algorithm.

43 citations

Journal ArticleDOI
TL;DR: In this article, a robust resource allocation and UAV trajectory optimization problem with worst-case covertness constraint is formulated to maximize the average covert rate, and a block coordinate descent method based iterative algorithm is proposed to optimize the time slot allocation, power allocation and trajectory alternately.
Abstract: In this correspondence, covert air-to-ground communication is investigated to hide the wireless transmission from unmanned aerial vehicle (UAV). The warden's total detection error probability with limited observations is first analyzed. Considering the location uncertainty of the warden, a robust resource allocation and UAV trajectory optimization problem with worst-case covertness constraint is then formulated to maximize the average covert rate. To solve this optimization problem, we propose a block coordinate descent method based iterative algorithm to optimize the time slot allocation, power allocation and trajectory alternately. Numerical results demonstrate the effectiveness of the proposed algorithm in covert communication for UAVs.

25 citations

Journal ArticleDOI
TL;DR: A control code multiple encryption algorithm (CCMEA) for the single-photon-transmission between satellite and ground station and a security detection method by combining the decoy photon analysis and the quantum bit error rate (QBER) analysis is designed.
Abstract: The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and attacking in satellite-to-ground communication. For high security, optical communication is a promising solution. In this paper, we propose a control code multiple encryption algorithm (CCMEA) for the single-photon-transmission between satellite and ground station. CCMEA can utilize the control code to respectively encrypt three cognitive optimization sections: loop iteration, polarization coding and order rearrangement, and simulation shows that CCMEA can realize one step transmission to decrease loopholes compared with multistep encryption algorithm. In addition, we design a security detection method by combining the decoy photon analysis and the quantum bit error rate (QBER) analysis. The numerical results show that CCMEA can reduce the security threshold by 27% compared with multistep encryption algorithm of BB84 scheme. Finally, for satellite-to-ground communication, we construct an analytic QBER model on CCMEA with four factors: quantum channel transmission rate, single-photon acquisition probability, measurement factor and data filtering factor. The result demonstrates the effectiveness of CCMEA on satellite-to-ground communication.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Various grant-free NOMA schemes are presented, their potential and related practical challenges are highlighted, and possible future directions are thoroughly discussed at the end.
Abstract: Massive machine-type communications (mMTC) is one of the main three focus areas in the 5th generation (5G) of wireless communications technologies to enable connectivity of a massive number of Internet of things (IoT) devices with little or no human intervention. In conventional human-type communications (HTC), due to the limited number of available channel resources and orthogonal resource allocation techniques, users get a transmission slot by making scheduling/connection requests. The involved control channel signaling, negligible with respect to the huge transmit data, is not a major issue. However, this may turn into a potential performance bottleneck in mMTC, where huge number of devices transmit short packet data in a sporadic way. To tackle the limited radio resources and massive connectivity challenges, non-orthogonal multiple access (NOMA) has emerged as a promising technology that allows multiple users to simultaneously transmit their data over the same channel resource. This is achieved by employing user-specific signature sequences at the transmitting devices, which are exploited by the receiver for multi-user data detection. Due to its massive connectivity potential, NOMA has also been considered to enable grant-free transmissions especially in mMTC, where devices can transmit their data whenever they need without the scheduling requests. The existing surveys majorly discuss different NOMA schemes, and exploit their potential, in typical grant-based HTC scenarios, where users are connected with the base station, and various system parameters are pre-defined in the scheduling phase. Different from these works, this survey provides a comprehensive review of the recent advances in NOMA from a grant-free connectivity perspective. Various grant-free NOMA schemes are presented, their potential and related practical challenges are highlighted, and possible future directions are thoroughly discussed at the end.

256 citations

Journal ArticleDOI
15 Jun 2022-Drones
TL;DR: A comprehensive study on UAVs, swarms, types, classification, charging, and standardization is presented, highlighting the importance of drones, goals and functionality problems, and identifying the research gap.
Abstract: Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance. The drone industry has been getting significant attention as a model of manufacturing, service and delivery convergence, introducing synergy with the coexistence of different emerging domains. UAVs offer implicit peculiarities such as increased airborne time and payload capabilities, swift mobility, and access to remote and disaster areas. Despite these potential features, including extensive variety of usage, high maneuverability, and cost-efficiency, drones are still limited in terms of battery endurance, flight autonomy and constrained flight time to perform persistent missions. Other critical concerns are battery endurance and the weight of drones, which must be kept low. Intuitively it is not suggested to load them with heavy batteries. This study highlights the importance of drones, goals and functionality problems. In this review, a comprehensive study on UAVs, swarms, types, classification, charging, and standardization is presented. In particular, UAV applications, challenges, and security issues are explored in the light of recent research studies and development. Finally, this review identifies the research gap and presents future research directions regarding UAVs.

112 citations

Journal ArticleDOI
TL;DR: This paper investigates the secure transmission design for an IRS-assisted UAV network in the presence of an eavesdropper and results validate the effectiveness of the proposed scheme and the performance improvement achieved by the joint trajectory and beamforming design.
Abstract: Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible to eavesdropping due to air-ground line-of-sight channels. Intelligent reflecting surface (IRS) is capable of reconfiguring the propagation environment, and thus is an attractive solution for integrating with UAV to facilitate the security in wireless networks. In this paper, we investigate the secure transmission design for an IRS-assisted UAV network in the presence of an eavesdropper. With the aim at maximizing the average secrecy rate, the trajectory of UAV, the transmit beamforming, and the phase shift of IRS are jointly optimized. To address this sophisticated problem, we decompose it into three sub-problems and resort to an iterative algorithm to solve them alternately. First, we derive the closed-form solution to the active beamforming. Then, with the optimal transmit beamforming, the passive beamforming optimization problem of fractional programming is transformed into corresponding parametric sub-problems. Moreover, the successive convex approximation is applied to deal with the non-convex UAV trajectory optimization problem by reformulating a convex problem which serves as a lower bound for the original one. Simulation results validate the effectiveness of the proposed scheme and the performance improvement achieved by the joint trajectory and beamforming design.

99 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on green UAV communications for 6G is carried out, and the typical UAVs and their energy consumption models are introduced, and several promising techniques and open research issues are pointed out.

83 citations

Posted Content
TL;DR: The introduced approaches enable UAVs to adaptively exploit wireless system resources while guaranteeing secure operation in real time, and show the benefits of the introduced solutions for each of the aforementioned cellular-connected UAV application use cases.
Abstract: Cellular-connected unmanned aerial vehicles (UAVs) will inevitably be integrated into future cellular networks as new aerial mobile users. Providing cellular connectivity to UAVs will enable a myriad of applications ranging from online video streaming to medical delivery. However, to enable a reliable wireless connectivity for the UAVs as well as a secure operation, various challenges need to be addressed such as interference management, mobility management and handover, cyber-physical attacks, and authentication. In this paper, the goal is to expose the wireless and security challenges that arise in the context of UAV-based delivery systems, UAV-based real-time multimedia streaming, and UAV-enabled intelligent transportation systems. To address such challenges, artificial neural network (ANN) based solution schemes are introduced. The introduced approaches enable the UAVs to adaptively exploit the wireless system resources while guaranteeing a secure operation, in real-time. Preliminary simulation results show the benefits of the introduced solutions for each of the aforementioned cellular-connected UAV application use case.

64 citations