Securing energy-constrained UAV communications against both internal and external eavesdropping

Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates an unmanned aerial vehicle (UAV) enabled network where an
energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple …

Joint trajectory and power design for UAV-enabled secure communications with no-fly zone constraints

Y Gao, H Tang, B Li, X Yuan - IEEE Access, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have attracted growing interest in wireless
communications due to their several superiorities, such as highly controllable mobility …

Securing UAV communication with mobile UAV eavesdroppers: Joint trajectory and communication design

C Wen, L Qiu, X Liang - 2021 IEEE Wireless Communications …, 2021 - ieeexplore.ieee.org
This paper investigates an unmanned aerial vehicle (UAV)-enabled secure communication
system, where ground users (GUs) send confidential information to a UAV by time division …

Energy minimization for robust secure transmission in UAV networks with multiple colluding eavesdroppers

Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2021 - ieeexplore.ieee.org
This letter investigates an unmanned aerial vehicle (UAV) aided wireless network where a
UAV transmits confidential data to multiple legitimate receivers (LRs) in the presence of …

Joint trajectory and power control for secure dual-UAV communications against air and ground eavesdropping

Z Zhu, G Su, B Chen, M Dai, X Lin… - 2022 31st Wireless and …, 2022 - ieeexplore.ieee.org
With the maturity of unmanned aerial vehicle (UAV) technology, UAV plays an important role
in communication due to its high mobility. In this paper, we study a dual-UAVs assisted …

Energy-efficient resource allocation for secure UAV communication systems

Y Cai, Z Wei, R Li, DWK Ng… - 2019 IEEE Wireless …, 2019 - ieeexplore.ieee.org
In this paper, we study the resource allocation and trajectory design for energy-efficient
secure unmanned aerial vehicle (UAV) communication systems where a UAV base station …

Joint trajectory and power optimization for securing UAV communications against active eavesdropping

B Duo, J Luo, Y Li, H Hu, Z Wang - China Communications, 2021 - ieeexplore.ieee.org
Due to both of jamming and eavesdropping, active eavesdroppers can induce more serious
security threats to unmanned aerial vehicle (UAV)-enabled communications. This paper …

Securing transmission for UAV swarm-enabled communication network

R Dong, B Wang, K Cao, T Cheng - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve
desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security …

Robust trajectory and resource allocation design for secure UAV-aided communications

X Sun, C Shen, DWK Ng… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper aims to enhance the physical layer security against potential internal
eavesdroppings by exploiting the maneuverability of an unmanned aerial vehicle (UAV). We …

Secure uav communications under uncertain eavesdroppers locations

S Wang, F Kong, Q Li - ICASSP 2021-2021 IEEE International …, 2021 - ieeexplore.ieee.org
Benefiting from the merits of low cost and high mobility, Unmanned aerial vehicle (UAV)
enabled communications have recently drawn considerable attentions. In this paper, we …