Optimization of Secure Computation Efficiency in UAV-Enabled RIS-Assisted MEC-IoT Networks with Aerial and Ground Eavesdroppers

ET Michailidis, MG Volakaki, NI Miridakis… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
This paper proposes a security-aware computation offloading framework tailored for mobile
edge computing (MEC)-enabled Internet of Things (IoT) networks operating in environments …

Secure uav communication with robust communication and trajectory design

W Fan, Y Wu, S Ju, K Zhang… - … Conference on Computer …, 2019 - ieeexplore.ieee.org
This paper proposes a communication system for UAVs to send confidential information to
multiple legal receivers in the presence of multiple eavesdroppers with uncertain location …

Jamming-aided secure communication in ultra-dense LEO integrated satellite-terrestrial networks

Y Shi, J Liu, J Wang, Y Xun - China Communications, 2023 - ieeexplore.ieee.org
The ultra-dense low earth orbit (LEO) integrated satellite-terrestrial networks (UDLEO-ISTN)
can bring lots of benefits in terms of wide coverage, high capacity, and strong robustness …

Multi-domain resource multiplexing based secure transmission for satellite-assisted IoT: AO-SCA approach

Z Yin, N Cheng, Y Hui, W Wang, L Zhao… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Due to the wireless broadcasting and broad coverage in satellite-supported Internet of
things (IoT) networks, the IoT nodes are susceptible to eavesdropping threats. Considering …

UAV-assisted secure communication for coordinated satellite-terrestrial networks

H Li, J Li, M Liu, F Gong - IEEE Communications Letters, 2023 - ieeexplore.ieee.org
This letter investigates an unmanned aerial vehicle (UAV)-assisted satellite-terrestrial
communication network. Specifically, a three-dimensional mobile UAV helps to enhance …

Joint trajectory and power design for UAV-enabled secure communications with no-fly zone constraints

Y Gao, H Tang, B Li, X Yuan - IEEE Access, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have attracted growing interest in wireless
communications due to their several superiorities, such as highly controllable mobility …

IRS-Enabled Secure G2A Communications for UAV System With Aerial Eavesdropping

T Cheng, B Wang, K Cao, R Dong… - IEEE Systems …, 2022 - ieeexplore.ieee.org
As one of the most promising new technologies in the upcoming 6G communication,
intelligent reflecting surface (IRS) can significantly improve the reliability of wireless …

UAV-aided Secure Communication with Imperfect Eavesdropper Location: Robust Design for Jamming Power and Trajectory

Z Liu, B Zhu, Y Xie, K Ma, X Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper exploits the mobility of an unmanned aerial vehicle (UAV) to improve the physical
layer (PLS) security against potential eavesdropping scenarios, where the sensitive data …

Timeliness and Secrecy-Aware Uplink Data Aggregation for Large-Scale UAV-IoT Networks

Y Ma, K Liu, Y Liu, L Zhu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Due to the inherent characteristics of system extensibility and implementation flexibility,
unmanned aerial vehicle (UAV)-assisted data aggregations will play an essential role in …

Joint trajectory and communication design for secure UAV networks

Z Li, M Chen, C Pan, N Huang, Z Yang… - IEEE …, 2019 - ieeexplore.ieee.org
This letter investigates a joint optimization problem of unmanned aerial vehicle (UAV) flight
trajectory, downlink transmission power, and ground terminals (GTs) association under …