Dual-UAV-enabled secure communications: Joint trajectory design and user scheduling

Y Cai, F Cui, Q Shi, M Zhao… - IEEE Journal on Selected …, 2018 - ieeexplore.ieee.org
In this paper, we investigate a novel unmanned aerial vehicle (UAV)-enabled secure
communication system. Two UAVs are applied in this system where one UAV moves around …

Robust 3D-trajectory and time switching optimization for dual-UAV-enabled secure communications

W Wang, X Li, R Wang, K Cumanan… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
This paper investigates a dual-unmanned aerial vehicle (UAV)-enabled secure
communication system, in which, a UAV moves around to send confidential messages to a …

UAV-aided secure communications with cooperative jamming

H Lee, S Eom, J Park, I Lee - IEEE Transactions on Vehicular …, 2018 - ieeexplore.ieee.org
This paper investigates unmanned aerial vehicle (UAV) enabled secure communication
systems where a mobile UAV wishes to send confidential messages to multiple ground …

Energy-constrained UAV-assisted secure communications with position optimization and cooperative jamming

W Wang, X Li, M Zhang, K Cumanan… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In this paper, we consider an energy-constrained unmanned aerial vehicle (UAV)-enabled
mobile relay assisted secure communication system in the presence of a legitimate source …

UAV-enabled secure communications: Joint trajectory and transmit power optimization

X Zhou, Q Wu, S Yan, F Shu, J Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
This paper studies the physical layer security of an unmanned aerial vehicle (UAV) network,
where a UAV base station (UAV-B) transmits confidential information to multiple information …

Resource allocation for secure multi-UAV communication systems with multi-eavesdropper

R Li, Z Wei, L Yang, DWK Ng, J Yuan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we study the resource allocation and trajectory design for secure unmanned
aerial vehicle (UAV)-enabled communication systems, where multiple multi-purpose UAV …

Mobile jammer-aided secure UAV communications via trajectory design and power control

A Li, W Zhang - China Communications, 2018 - ieeexplore.ieee.org
To further promote the achievable average secrecy rate for UAV-ground communications, a
UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional …

Joint trajectory and power optimization for securing UAV communications against active eavesdropping

B Duo, J Luo, Y Li, H Hu, Z Wang - China Communications, 2021 - ieeexplore.ieee.org
Due to both of jamming and eavesdropping, active eavesdroppers can induce more serious
security threats to unmanned aerial vehicle (UAV)-enabled communications. This paper …

Joint trajectory and communication design for secure UAV networks

Z Li, M Chen, C Pan, N Huang, Z Yang… - IEEE …, 2019 - ieeexplore.ieee.org
This letter investigates a joint optimization problem of unmanned aerial vehicle (UAV) flight
trajectory, downlink transmission power, and ground terminals (GTs) association under …

Robust trajectory and transmit power design for secure UAV communications

M Cui, G Zhang, Q Wu, DWK Ng - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are anticipated to be widely deployed in future wireless
communications, due to their advantages of high mobility and easy deployment. However …