Caching UAV assisted secure transmission in hyper-dense networks based on interference alignment

N Zhao, F Cheng, FR Yu, J Tang… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) can help small-cell base stations (SBSs) offload traffic via
wireless backhaul to improve coverage and increase rate. However, the capacity of …

UAV-relaying-assisted secure transmission with caching

F Cheng, G Gui, N Zhao, Y Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long
distance, which can achieve significant throughput gain owing to its mobility and line-of-sight …

Resource allocation and trajectory design in UAV-assisted jamming wideband cognitive radio networks

Y Wang, L Chen, Y Zhou, X Liu, F Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The secure performance of wideband cognitive radio networks (CRNs) with OFDMA
(orthogonal frequency-division multiple access) achieved by using physical layer security is …

Cooperative jamming via spectrum sharing for secure UAV communications

Y Li, R Zhang, J Zhang, L Yang - IEEE Wireless …, 2019 - ieeexplore.ieee.org
This letter investigates the physical layer security issue in unmanned aerial vehicle (UAV)
communication networks. Specifically, two UAVs transmit confidential messages to their …

Secure UAV-to-UAV systems with spatially random UAVs

J Ye, C Zhang, H Lei, G Pan… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
In this letter, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-
to-UAV system, where a UAV acts as the source () transmitting information to a legitimate …

Joint trajectory and power optimization for securing UAV communications against active eavesdropping

B Duo, J Luo, Y Li, H Hu, Z Wang - China Communications, 2021 - ieeexplore.ieee.org
Due to both of jamming and eavesdropping, active eavesdroppers can induce more serious
security threats to unmanned aerial vehicle (UAV)-enabled communications. This paper …

Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

Joint trajectory design and resource allocation for secure transmission in cache-enabled UAV-relaying networks with D2D communications

J Ji, K Zhu, D Niyato, R Wang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
With the exponential growth of data traffic, the use of caching and device-to-device (D2D)
communication has been recognized as an effective approach for mitigating the backhaul …

On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

H Bastami, M Letafati, M Moradikia… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent
logistics, search and rescue as well as in air-borne Base Station (BS). However, their …

Mobile jammer-aided secure UAV communications via trajectory design and power control

A Li, W Zhang - China Communications, 2018 - ieeexplore.ieee.org
To further promote the achievable average secrecy rate for UAV-ground communications, a
UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional …