Securing energy-constrained UAV communications against both internal and external eavesdropping

Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates an unmanned aerial vehicle (UAV) enabled network where an
energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple …

Cyber threats and cybersecurity reassessed in uav-assisted cyber physical systems

M Haider, I Ahmed, DB Rawat - 2022 Thirteenth International …, 2022 - ieeexplore.ieee.org
This study aims to perceive the potential security threats in unmanned aerial vehicles
(UAVs) assisted communication networks and to determine the feasible and effective …

UAV-enabled secure communication with finite blocklength

Y Wang, X Zhou, Z Zhuang, L Sun… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In the finite blocklength scenario, which is suitable for practical applications, a method of
maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled …

Physical-layer security for untrusted UAV-assisted full-duplex wireless networks

T Nuradha, KT Hemachandra… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
The paper considers physical layer security (PLS) of an untrusted unmanned aerial vehicle
(UAV) network, where a multitude of UAVs communicate in full-duplex (FD) mode. A source …

Securing mobile IoT with unmanned aerial systems

AS Abdalla, B Shang, V Marojevic… - 2020 IEEE 6th World …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) will soon be omnipresent and billions of sensors and actuators
will support our industries and well-being. IoT devices are embedded systems that are …

Secure UAV-to-UAV systems with spatially random UAVs

J Ye, C Zhang, H Lei, G Pan… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
In this letter, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-
to-UAV system, where a UAV acts as the source () transmitting information to a legitimate …

Secure UAV communication networks via friendly jamming and bandwidth allocation

H Zhang, X He, H Dai - IEEE INFOCOM 2020-IEEE Conference …, 2020 - ieeexplore.ieee.org
Recently, unmanned aerial vehicles (UAVs) become a promising enabler for building on-
demand deployable and cost-effective wireless communication systems in various real …

Leveraging uav-ris reflects to improve the security performance of wireless network systems

J Sun, H Zhang, X Wang, M Yang… - IEEE Networking …, 2023 - ieeexplore.ieee.org
In this letter, a novel application method of reconfigurable intelligent surfaces (RIS) is
proposed, which installs a RIS on an unmanned aerial vehicle (UAV) rather than fixed to …

Secure UAV-enabled communication using Han–Kobayashi signaling

Z Sheng, HD Tuan, AA Nasir… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper proposes Han-Kobayashi signaling (HKS), under which each pair of users
decodes a common message to improve their throughput, for UAV-enabled multi-user …

Spectrum sharing for secrecy performance enhancement in D2D-enabled UAV networks

B Yang, T Taleb, Z Wu, L Ma - IEEE Network, 2020 - ieeexplore.ieee.org
With the assistance of device-to-device (D2D) communications, unmanned aerial vehicle
(UAV) networks are anticipated to support widespread applications in fifth generation (5G) …