Secure throughput optimization for cache-enabled multi-UAVs networks

F Fazel, J Abouei, M Jaseemuddin… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
This article considers an ultradense heterogeneous network (UDHN) consisting of cache-
enabled unmanned aerial vehicles (UAVs) and Internet of Things mobile devices (IMDs) …

Improving dual-UAV aided ground-UAV bi-directional communication security: Joint UAV trajectory and transmit power optimization

H Kang, X Chang, J Mišić, VB Mišić… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates a dual-unmanned aerial vehicle (UAV) aided communication system
to improve the security of the communication between ground devices and UAVs. Different …

Cooperative jamming for secure UAV communications with partial eavesdropper information

Y Li, R Zhang, J Zhang, S Gao, L Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The broadcast nature of air-to-ground line-of-sight (LoS) wireless channel imposes a great
challenge in secure unmanned aerial vehicle (UAV) communications. To address this issue …

RIS-UAV enabled worst-case downlink secrecy rate maximization for mobile vehicles

X Liu, Y Yu, B Peng, XB Zhai, Q Zhu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper considers worst-case downlink secure communication from base station (BS) to
mobile legitimate vehicle at the presence of an eavesdropper, where reconfigurable …

Secure uav communication with robust communication and trajectory design

W Fan, Y Wu, S Ju, K Zhang… - … Conference on Computer …, 2019 - ieeexplore.ieee.org
This paper proposes a communication system for UAVs to send confidential information to
multiple legal receivers in the presence of multiple eavesdroppers with uncertain location …

IRS-assisted secure UAV transmission via joint trajectory and beamforming design

X Pang, N Zhao, J Tang, C Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are
susceptible to eavesdropping due to air-ground line-of-sight channels. Intelligent reflecting …

Protecting secure communication under UAV smart attack with imperfect channel estimation

C Li, Y Xu, J Xia, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends
some confidential message to one receiver, under the smart attack from one unmanned …

Optical HAPS eavesdropping in vertical heterogeneous networks

E Erdogan, OB Yahia, GK Kurt… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
In the next generation (6G) wireless networks, the integration of terrestrial and non-terrestrial
networks is essential to provide flawless connectivity over the globe. The vital element of this …

Secrecy outage performance of ground-to-air communications with multiple aerial eavesdroppers and its deep learning evaluation

T Bao, J Zhu, HC Yang… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
In this letter, we study the secure information transmission from a ground base station (GBS)
to a legitimate unmanned aerial vehicle (UAV) user, in the presence of multiple UAV …

Secure communications for UAV-enabled mobile edge computing systems

Y Zhou, C Pan, PL Yeoh, K Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
In this paper, we propose a secure unmanned aerial vehicle (UAV) mobile edge computing
(MEC) system where multiple ground users offload large computing tasks to a nearby …