Joint Information-Theoretic Secrecy and Covertness for UAV-assisted Wireless Transmission With Finite Blocklength

P Liu, Z Li, J Si, N Al-Dhahir… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we study a novel joint information-theoretic secrecy and covertness model for
an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which …

UAV-aided Secure Communication with Imperfect Eavesdropper Location: Robust Design for Jamming Power and Trajectory

Z Liu, B Zhu, Y Xie, K Ma, X Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper exploits the mobility of an unmanned aerial vehicle (UAV) to improve the physical
layer (PLS) security against potential eavesdropping scenarios, where the sensitive data …

UAV-enabled secure communication with finite blocklength

Y Wang, X Zhou, Z Zhuang, L Sun… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In the finite blocklength scenario, which is suitable for practical applications, a method of
maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled …

Secure uav communications under uncertain eavesdroppers locations

S Wang, F Kong, Q Li - ICASSP 2021-2021 IEEE International …, 2021 - ieeexplore.ieee.org
Benefiting from the merits of low cost and high mobility, Unmanned aerial vehicle (UAV)
enabled communications have recently drawn considerable attentions. In this paper, we …

Average worst-case secrecy rate maximization via UAV and base station resource allocation

S Ahmed, BA Bash - 2019 57th Annual Allerton Conference on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a wireless network setting where a base station (BS) employs a
single unmanned aerial vehicle (UAV) mobile relay to disseminate information to multiple …

Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …

Cooperative jamming for secure UAV communications with partial eavesdropper information

Y Li, R Zhang, J Zhang, S Gao, L Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The broadcast nature of air-to-ground line-of-sight (LoS) wireless channel imposes a great
challenge in secure unmanned aerial vehicle (UAV) communications. To address this issue …

Secure uav communication with robust communication and trajectory design

W Fan, Y Wu, S Ju, K Zhang… - … Conference on Computer …, 2019 - ieeexplore.ieee.org
This paper proposes a communication system for UAVs to send confidential information to
multiple legal receivers in the presence of multiple eavesdroppers with uncertain location …

Joint uplink and downlink scheduling and UAV trajectory design in the presence of multiple unfriendly jammers and eavesdroppers

Z Sheng, H Fu, AA Nasir, R Wang, AH Muqaibel… - Physical …, 2022 - Elsevier
In this paper, we investigate secure uplink and downlink communications between an
unmanned aerial vehicle (UAV) and multiple user equipments (UEs) in the presence of …

Joint trajectory and communication design for secure UAV networks

Z Li, M Chen, C Pan, N Huang, Z Yang… - IEEE …, 2019 - ieeexplore.ieee.org
This letter investigates a joint optimization problem of unmanned aerial vehicle (UAV) flight
trajectory, downlink transmission power, and ground terminals (GTs) association under …