0000000000414329

AUTHOR

Xinying Chen

showing 3 related works from this author

UAV-Aided Secure Short-Packet Data Collection and Transmission

2023

Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing t…

finite blocklengthdata collectionsecure transmissionInternet of Thingseavesdroppingsensoriverkotresource allocationshort-packet transmissionlangaton tekniikkamiehittämättömät ilma-aluksetsensorstiedonsiirtodatatietoliikennetrajectoryunmanned aerial vehicleesineiden internetElectrical and Electronic Engineeringautonomous aerial vehicleswireless sensor networksIEEE Transactions on Communications
researchProduct

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

2021

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterProcess (computing)020206 networking & telecommunicationsJammingEavesdroppingThroughputData_CODINGANDINFORMATIONTHEORY02 engineering and technologyTransmitter power outputPower (physics)Covert0202 electrical engineering electronic engineering information engineeringbusinessComputer network2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)
researchProduct

UAV-Aided Multi-Antenna Covert Communication Against Multiple Wardens

2021

In this paper, we propose a UAV-aided covert communication scheme assisted by a multi-antenna jammer to maximize the transmission rate between a ground transmitter and a UAV receiver against several randomly distributed wardens. The transmitter adopts the maximum ratio transmission, while the jammer zero-forces its transmitted signal at the UAV to disturb the monitoring at wardens without interfering the legitimate transmission. First, we analyze the detection performance and derive the optimal threshold for each warden to minimize its detection outage probability (DOP). Then, with the worst situation in which all wardens set their respective optimal thresholds to achieve the minimum global…

Transmission (telecommunications)Computer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterMulti antennaReal-time computingCovert communicationComputerApplications_COMPUTERSINOTHERSYSTEMSJammingData_CODINGANDINFORMATIONTHEORYOutage probabilityTransmitter power outputSignalICC 2021 - IEEE International Conference on Communications
researchProduct