RIS‐assisted secure UAV communications with resource allocation and cooperative jamming

J Guo, L Yu, Z Chen, Y Yao, Z Wang… - IET …, 2022 - Wiley Online Library
Unmanned aerial vehicles (UAVs) are widely used in wireless communication networks due
to their rapid deployment and high mobility. However, in practical scenarios, the existence of …

Secure Rate-Splitting Multiple Access for Maritime Cognitive Radio Network: Power Allocation and UAV's Location Optimization

L Min, J Li, Y He, W Wang - Journal of Marine Science and Engineering, 2023 - mdpi.com
This paper investigates the secure rate-splitting multiple access (RSMA) cooperation for the
maritime cognitive unmanned aerial vehicle (UAV) network. Specifically, we first take into …

Completion time optimization with RSS for multi-UAV assisted secure communications

A Gao, Q Zhang, Q Wang… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
To safeguard legitimate users from potential malicious eavesdropping, this letter proposes a
dynamic role switching scheme (RSS) in multi-UAV assisted secure communication …

UAV-assisted maritime legitimate surveillance: Joint trajectory design and power allocation

L Wu, W Wang, Z Ji, Y Yang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
This paper investigates a novel maritime wireless surveillance scenario, where a legitimate
monitor vessel moves around to eavesdrop the suspicious communication from a suspicious …

Physical layer secure communications based on collaborative beamforming for UAV networks: A multi-objective optimization approach

J Li, H Kang, G Sun, S Liang, Y Liu… - IEEE INFOCOM 2021 …, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications and networks are promising technologies
in the forthcoming fifth-generation wireless communications. However, they have the …

Joint trajectory and communication design for secure UAV networks

Z Li, M Chen, C Pan, N Huang, Z Yang… - IEEE …, 2019 - ieeexplore.ieee.org
This letter investigates a joint optimization problem of unmanned aerial vehicle (UAV) flight
trajectory, downlink transmission power, and ground terminals (GTs) association under …

Securing transmission for UAV swarm-enabled communication network

R Dong, B Wang, K Cao, T Cheng - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
Deploying unmanned aerial vehicles (UAVs) in communication networks could achieve
desirable degrees of freedom, but resulting from the high line-of-sight link attributes, security …

Throughput maximization of UAV-enabled wireless network in the presence of jammers: joint trajectory and communication design

Y Wu, W Yang, D Zhang, X Sun - IEICE Transactions on …, 2019 - search.ieice.org
Unmanned aerial vehicle (UAV) communication has drawn rising interest recently with the
distinctive gains brought by its inherent mobility. In this paper, we investigate the throughput …

Securing UAV communications via trajectory optimization

G Zhang, Q Wu, M Cui, R Zhang - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due
to many advantages such as low cost, high mobility, and on-demand deployment. This …

Robust 3D-trajectory and time switching optimization for dual-UAV-enabled secure communications

W Wang, X Li, R Wang, K Cumanan… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure
communication system, in which, a UAV moves around to send confidential messages to a …