HA Hashim - Results in Engineering, 2024 - Elsevier
Avionics systems of an Unmanned Aerial Vehicle (UAV) or drone are the critical electronic components found onboard that regulate, navigate, and control UAV travel while ensuring …
L Jia, N Qi, Z Su, F Chu, S Fang… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Due to the inherently open and shared nature of the wireless channels, wireless communication networks are vulnerable to jamming attacks, and effective anti-jamming …
Existing public safety networks (PSNs) are not designed to cope with disasters such as terrorist attacks, consequently leading to long delays and intolerable response times. First …
A Almasoud - Complex & Intelligent Systems, 2023 - Springer
Radio jamming represents a serious threat in wireless networks that can cause denial of service (DoS) attacks for the network users. The jammer transmits jamming signals to disrupt …
H Wu, M Li, Q Gao, Z Wei, N Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Despite its advantages of flexility and low-cost networking, unmanned aerial vehicle (UAV) communications face various attacks such as eavesdropping. Existing studies on secure …
B Wu, B Zhang, D Guo, H Wang… - China …, 2022 - ieeexplore.ieee.org
This paper investigates the anti-jamming trajectory design to safeguard the effective data collection, where a unmanned aerial vehicle (UAV) is dispatched to collect data over …
A Atayev, J Fliege, A Zemkoho - Optimization and Engineering, 2024 - Springer
We consider a type of routing problems common in defence and security, in which we control a fleet of unmanned aerial vehicles (UAVs) that have to reach one or more target …
Y Du, Y Zhang, P Qian, P He, W Wang… - IET …, 2024 - Wiley Online Library
Reactive jammers select jamming strategies according to the users' responses; thus, conventional anti‐jamming methods such as frequency hopping are inadequate to defeat …
Z Su, Q Wu, N Qi, L Jia, Z Du - IET Communications, 2022 - Wiley Online Library
Although unmanned aerial vehicle (UAV) relay can provide auxiliary communication due to its flexible mobility, it is vulnerable to jamming attacks. This paper considers the UAV relay …