Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/5297
Title: Joint Optimization of Sensing Time and Transmission Power Allocation for Secrecy Rate Maximization in UAV-CR Networks
Authors: Mallick, Sudipta
Mati, Gyana Ranjan
Das, Susmita
Ray, Arun Kumar
Keywords: CDSS approach
UAV
Cognitive radio network
Secrecy rate
Issue Date: Aug-2025
Citation: 6th IEEE India Council International Subsections Conference (INDISCON), NIT Rourkela, 21-23 August 2025
Abstract: The unmanned aerial vehicle-assisted cognitive radio network has gained wide attention as a significant cutting-edge technology in the fifth-generation (5G) and upcoming sixth-generation (6G) era due to dynamic deployment flexibility, improved spectrum utilization efficiency, and many more. However, in cognitive radio networks (CRN), the secondary transmitter (ST) opportunistically uses the vacant spectrum bands to send their confidential information to the secondary receiver (SR) in the presence of an eavesdropper, which may result in severe security threats. UAV-assisted CRN can provide better physical layer security while utilizing the unused spectrum by transmitting artificial noise (AN) to confuse eavesdroppers (Eve). This study investigates the physical layer security in a UAV-assisted CRN network where the UAV acts as a secondary transmitter (ST) and a jammer according to the primary user (PU) status identified in the channel. A collaborative decision-based spectrum sensing (CDSS) approach is proposed to improve the sensing accuracy, which improves the secrecy rate while maintaining the PU’s quality of service (QoS). Moreover, an objective function is formulated for the UAV’s secrecy rate, jointly optimizing the sensing time and the UAV’s transmission power allocation to SR and Eve to maximize the secrecy rate further. The optimal value of sensing time is obtained using a searching method at the outer loop, and a difference of concave (DC) programming is used to obtain optimal transmission power at the inner loop. The simulation results suggest that the proposed approach has achieved an improved secrecy rate over existing benchmark approaches.
Description: Copyright belongs to the proceeding publisher.
URI: http://hdl.handle.net/2080/5297
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
2025_INDISCON_SMallick_Joint.pdf753.86 kBAdobe PDFView/Open    Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.