A Secure Downlink Transmission Scheme for a UAV‐Assisted Edge Network

X Gao, Y Huo, Q Gao, H Zhao… - … and Mobile Computing, 2022 - Wiley Online Library
As an extension of centralized cloud services in a space‐air‐ground integrated network, an
unmanned aerial vehicle (UAV‐)‐enabled edge network brings computation as close …

Joint cache and trajectory optimization for secure UAV-relaying with underlaid D2D communications

J Ji, K Zhu, D Niyato, R Wang - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
With the exponential growth of data traffic, the use of caching and device-to-device (D2D)
communications has been regarded as an efficient approach for alleviating the backhaul …

Secrecy capacity maximization for a UAV-assisted MEC system

D Han, T Shi - China Communications, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communication has attracted wide attentions in the mobile
edge computing (MEC) system owing to its high-flexibility and simple operation auxiliary …

Joint UAV deployment and power allocation for secure space-air-ground communications

C Han, L Bai, T Bai, J Choi - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Owing to their intrinsic advantages of seamless coverage and of high data rate, space-air-
ground communications networks (SAGCN) are recognized as one of the emerging …

Secrecy analysis for spatially random UAV systems

J Ye, C Zhang, G Pan, Y Chen… - 2018 IEEE Globecom …, 2018 - ieeexplore.ieee.org
In this paper, an unmanned aerial vehicle (UAV) to ground communication system with
spatially random eavesdroppers account on both ground and airspace is considered. UAV …

Cognitive NOMA for UAV-enabled secure communications: Joint 3D trajectory design and power allocation

N Tang, H Tang, B Li, X Yuan - IEEE Access, 2020 - ieeexplore.ieee.org
In the paper, we investigate the physical layer security (PLS) of an unmanned aerial vehicle
(UAV) enabled communication system that integrates non-orthogonal multiple access …

Securing UAV communications via trajectory optimization

G Zhang, Q Wu, M Cui, R Zhang - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due
to many advantages such as low cost, high mobility, and on-demand deployment. This …

[PDF][PDF] 3d beamforming for improving the security of uav-enabled mobile relaying system

Q Yuan, Y Hu, C Wang, X Ma - Radioengineering, 2019 - pdfs.semanticscholar.org
In this paper, we consider an unmanned aerial vehicle (UAV)-enabled mobile relaying
system consists of a ground control station (GCS), a high-mobility UAV for relaying, a …

Power allocation for UAV swarm-enabled secure networks using large-scale CSI

X Wang, W Feng, Y Chen, N Ge - 2019 IEEE global …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) swarm-enabled aerial network has emerged as an effective
solution to ondemand communications, especially in unexpected scenarios. Due to the …

Dual-UAV enabled secure data collection with propulsion limitation

R Zhang, X Pang, W Lu, N Zhao… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been widely utilized to improve the end-to-end
performance of wireless communications. However, its line-of-sight makes UAV …