Secrecy energy efficiency maximization in UAV-enabled wireless sensor networks without eavesdropper's CSI

M Li, X Tao, N Li, H Wu, J Xu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are anticipated to be a potential data collection solution
for wireless sensor networks (WSNs). The main challenges of integrating UAVs in WSNs are …

Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications

X Wang, K Li, SS Kanhere, D Li… - 2017 13th …, 2017 - ieeexplore.ieee.org
We consider a wireless information surveillance in UAV network, where a legitimate
unmanned aerial vehicle (UAV) proactively eavesdrops communication between two …

RIS‐assisted secure UAV communications with resource allocation and cooperative jamming

J Guo, L Yu, Z Chen, Y Yao, Z Wang… - IET …, 2022 - Wiley Online Library
Unmanned aerial vehicles (UAVs) are widely used in wireless communication networks due
to their rapid deployment and high mobility. However, in practical scenarios, the existence of …

Mobile jammer-aided secure UAV communications via trajectory design and power control

A Li, W Zhang - China Communications, 2018 - ieeexplore.ieee.org
To further promote the achievable average secrecy rate for UAV-ground communications, a
UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional …

Safeguarding UAV networks through integrated sensing, jamming, and communications

Z Wei, F Liu, DWK Ng, R Schober - ICASSP 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
This paper proposes an integrated sensing, jamming, and communications (ISJC)
framework for securing unmanned aerial vehicle (UAV)-enabled wireless networks. The …

Robust trajectory and resource allocation design for secure UAV-aided communications

X Sun, C Shen, DWK Ng… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper aims to enhance the physical layer security against potential internal
eavesdroppings by exploiting the maneuverability of an unmanned aerial vehicle (UAV). We …

Securing LPWANs: A Reconfigurable Intelligent Surface (RIS) Assisted UAV Approach

MH Khoshafa, TMN Ngatched… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
This letter presents a novel approach to enhance the secrecy performance of a low-power
wide-area network (LPWAN) by integrating a reconfigurable intelligent surface (RIS) with an …

Secure UAV random networks with minimum safety distance

J Lyu, HM Wang - IEEE Transactions on Vehicular Technology, 2021 - ieeexplore.ieee.org
In this correspondence, we study the physical layer security in a stochastic unmanned aerial
vehicles (UAVs) network from a network-wide perspective, where the locations of UAVs are …

Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …