{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T05:10:14Z","timestamp":1723353014048},"reference-count":39,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2023,12,17]],"date-time":"2023-12-17T00:00:00Z","timestamp":1702771200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62261048","61861039"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2024,1]]},"abstract":"Abstract<\/jats:title>This work focuses on the optimal trajectory of a rotary\u2010wing unmanned aerial vehicle (UAV) jammer and the system power allocation with the objective of maximizing the total secure energy efficiency (EE) of a slotted relay\u2010assisted millimeter wave (mm\u2010Wave) cognitive radio system. The UAV flies from starting location to final one in a round of communication mission that is overheard by a malicious eavesdropper. The network terminals are equipped with multiple\u2010input multiple\u2010output (MIMO) antenna array. This work first develops a practical approximation propagation model by addressing three key challenges: path loss, small\u2010scale Nakagami\u2010m fading channel gains, and transceiver antenna beamforming gains. By using the approximate model, the upper and lower bounds of the ergodic rate of each communication link are derived. Second, with the objective of maximizing secure EE, the optimal UAV trajectory and system resource allocation framework is established by considering the constraints of interference at primary receiver (PR), information\u2010causality relationship, rotary\u2010wing UAV propulsion energy and so forth. The optimal framework is solved with a tractable CVX tool by using the derived upper and lower bounds and successive convex approximation. Finally, an iterative optimizing algorithm is established by using Dinkelbach's method. In the simulation, the work presents the comparison of UAV trajectories, secure rates, and secure EEs of three schemes, that is, the proposed EE scheme, the non\u2010EE scheme where only the optimal secure rate is considered, and the EE scheme with the consideration of all communication\u2010related energy consumption. The simulations show that the EE schemes achieve smoother UAV trajectory than non\u2010EE, but the non\u2010EE scheme has higher secure rate. The impact of communication energy consumption is negligible. In addition, the effect of MIMO antenna array and mm\u2010Wave on system performance is exploited.<\/jats:p>","DOI":"10.1002\/ett.4915","type":"journal-article","created":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T03:44:32Z","timestamp":1702871072000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Physical layer security\u2010oriented energy\u2010efficient resource allocation and trajectory design for UAV jammer over 5G millimeter wave cognitive relay system"],"prefix":"10.1002","volume":"35","author":[{"given":"Yangyang","family":"Sun","sequence":"first","affiliation":[{"name":"College of Computer Science and Engineering Northwest Normal University Lanzhou China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7331-7813","authenticated-orcid":false,"given":"Xiangdong","family":"Jia","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering Northwest Normal University Lanzhou China"},{"name":"Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications Jiangsu Nanjing China"}]},{"given":"Xianghua","family":"Han","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering Northwest Normal University Lanzhou China"}]},{"given":"Mangang","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering Northwest Normal University Lanzhou China"}]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering Northwest Normal University Lanzhou China"}]}],"member":"311","published-online":{"date-parts":[[2023,12,17]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4530"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4233"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100338"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2873359"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3105185"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3108618"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.121.2100028"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2989462"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3024548"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2918452"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2022.3156402"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2021.3131631"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3151105"},{"key":"e_1_2_11_15_1","first-page":"1","volume-title":"2018 IEEE Globecom Workshops (GC Wkshps)","author":"Sun X","year":"2018"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2979977"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOMIS.2018.8644982"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2023.3235887"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2019.2949802"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3013647"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000768"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3203714"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3244954"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3099523"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2953725"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3262697"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2977948"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098049"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3042462"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2021.000044"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2014.2342736"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3320871"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2751045"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2889062"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2868075"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3224751"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2364267"},{"key":"e_1_2_11_38_1","unstructured":"GradshteynIS RyzhikIM.Table of Integrals Series and Products.2014."},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2900157"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924180"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T02:42:02Z","timestamp":1705977722000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,17]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1002\/ett.4915"],"URL":"https:\/\/doi.org\/10.1002\/ett.4915","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,17]]},"assertion":[{"value":"2023-08-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}