Joint information-theoretic secrecy and covertness for UAV-assisted wireless transmission with finite blocklength

P Liu, Z Li, J Si, N Al-Dhahir… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we study a novel joint information-theoretic secrecy and covertness model for
an unmanned aerial vehicle (UAV)-assisted finite blocklength transmission system, in which …

UAV-aided secure communication with imperfect eavesdropper location: Robust design for jamming power and trajectory

Z Liu, B Zhu, Y Xie, K Ma, X Guan - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper exploits the mobility of an unmanned aerial vehicle (UAV) to improve the physical
layer (PLS) security against potential eavesdropping scenarios, where the sensitive data …

UAV-enabled secure communication with finite blocklength

Y Wang, X Zhou, Z Zhuang, L Sun… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
In the finite blocklength scenario, which is suitable for practical applications, a method of
maximizing the average effective secrecy rate (AESR) is proposed for a UAV-enabled …

UAV-enabled secure communications via collaborative beamforming with imperfect eavesdropper information

G Sun, X Zheng, Z Sun, Q Wu, J Li… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are playing a pivotal role in wireless networks due to their
high mobility and on-demand deployment advantages. However, the UAV-enabled …

Average worst-case secrecy rate maximization via UAV and base station resource allocation

S Ahmed, BA Bash - 2019 57th Annual Allerton Conference on …, 2019 - ieeexplore.ieee.org
In this paper, we consider a wireless network setting where a base station (BS) employs a
single unmanned aerial vehicle (UAV) mobile relay to disseminate information to multiple …

Secrecy and covert communications against UAV surveillance via multi-hop networks

HM Wang, Y Zhang, X Zhang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The deployment of unmanned aerial vehicle (UAV) for surveillance and monitoring gives
rise to the confidential information leakage challenge in both civilian and military …

Cooperative jamming for secure UAV communications with partial eavesdropper information

Y Li, R Zhang, J Zhang, S Gao, L Yang - IEEE Access, 2019 - ieeexplore.ieee.org
The broadcast nature of air-to-ground line-of-sight (LoS) wireless channel imposes a great
challenge in secure unmanned aerial vehicle (UAV) communications. To address this issue …

Secure uav communication with robust communication and trajectory design

W Fan, Y Wu, S Ju, K Zhang… - … Conference on Computer …, 2019 - ieeexplore.ieee.org
This paper proposes a communication system for UAVs to send confidential information to
multiple legal receivers in the presence of multiple eavesdroppers with uncertain location …

Joint uplink and downlink scheduling and UAV trajectory design in the presence of multiple unfriendly jammers and eavesdroppers

Z Sheng, H Fu, AA Nasir, R Wang, AH Muqaibel… - Physical …, 2022 - Elsevier
In this paper, we investigate secure uplink and downlink communications between an
unmanned aerial vehicle (UAV) and multiple user equipments (UEs) in the presence of …

Joint trajectory and communication design for secure UAV networks

Z Li, M Chen, C Pan, N Huang, Z Yang… - IEEE …, 2019 - ieeexplore.ieee.org
This letter investigates a joint optimization problem of unmanned aerial vehicle (UAV) flight
trajectory, downlink transmission power, and ground terminals (GTs) association under …