Swarm of UAVs for network management in 6G: A technical review

MA Khan, N Kumar, SAH Mohsan… - … on Network and …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …

A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics

F Noor, MA Khan, A Al-Zahrani, I Ullah, KA Al-Dhlan - Drones, 2020 - mdpi.com
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military
applications, are presently finding their way in many civilian and commercial applications. If …

A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems

MA Khan, I Ullah, A Alkhalifah… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving
the safety and reliability of transportation systems, particularly where data traffic is …

Mobility in the sky: Performance and mobility analysis for cellular-connected UAVs

R Amer, W Saad, N Marchetti - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Providing connectivity to unmanned aerial vehicle-user equipment (UAV-UE), such as
drones or flying taxis, is a major challenge for tomorrow's cellular systems. In this paper, the …

Bio-inspired approaches for energy-efficient localization and clustering in UAV networks for monitoring wildfires in remote areas

MY Arafat, S Moh - IEEE Access, 2021 - ieeexplore.ieee.org
In dynamic unmanned aerial vehicle (UAV) networks, localization and clustering are
fundamental functions for cooperative control. In this article, we propose bio-inspired …

A lightweight authentication scheme for 6G-IoT enabled maritime transport system

SA Chaudhry, A Irshad, MA Khan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional
communication services but also additional processing, caching, sensing, and control …

[HTML][HTML] On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions

SZ Khan, M Mohsin, W Iqbal - PeerJ Computer Science, 2021 - peerj.com
Abstract Unmanned Aerial Systems (UAVs, Drones), initially known only for their military
applications, are getting increasingly popular in the civil sector as well. Over the military …

Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

Neural combinatorial deep reinforcement learning for age-optimal joint trajectory and scheduling design in UAV-assisted networks

A Ferdowsi, MA Abd-Elmagid, W Saad… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
In this article, an unmanned aerial vehicle (UAV)-assisted wireless network is considered in
which a battery-constrained UAV is assumed to move towards energy-constrained ground …

UAV-assisted attack prevention, detection, and recovery of 5G networks

AS Abdalla, K Powell, V Marojevic… - IEEE Wireless …, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many
applications and services, such as precision agriculture, search and rescue, temporary …