Securing UAV flying base station for mobile networking: A review

SY Chang, K Park, J Kim, J Kim - Future Internet, 2023 - mdpi.com
A flying base station based on an unmanned aerial vehicle (UAV) uses its mobility to extend
its connectivity coverage and improve its communication channel quality to achieve a …

An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks

MA Khan, I Ullah, N Kumar, OS Oubbati… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single
large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the …

Protecting secure communication under UAV smart attack with imperfect channel estimation

C Li, Y Xu, J Xia, J Zhao - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we investigate a secure communication system, where one transmitter sends
some confidential message to one receiver, under the smart attack from one unmanned …

Intelligent agent and optimization‐based deep residual network to secure communication in UAV network

VF Sangeetha Francelin, J Daniel… - International Journal of …, 2022 - Wiley Online Library
Abstract Unmanned Aerial Vehicle (UAV) is adapted as a novel unit in upcoming wireless
infrastructures wherein UAVs can play various roles in different applications. The UAV is …

Revealing your mobile password via WiFi signals: Attacks and countermeasures

Y Meng, J Li, H Zhu, X Liang, Y Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In this study, we present WindTalker, a novel and practical keystroke inference framework
that can be used to infer the sensitive keystrokes on a mobile device through WiFi-based …

Learning based power control for mmWave massive MIMO against jamming

Z Xiao, B Gao, S Liu, L Xiao - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Millimeter-wave (mmWave) massive multiple-input multiple-output (MIMO) systems have to
address smart jammers that use smart radio devices to choose the jamming policy with the …

Reputation based attacker identification policy for multi-access edge computing in internet of things

YS Sandal, AE Pusane, GK Kurt… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In the recent years, there has been an explosive growth of smart devices applications with
high computational demands and critical latency. The Internet of Things (IoT) multi-access …

Opponent's dynamic prediction model-based power control scheme in secure transmission and smart jamming game

H Wang, Q Wang, Q Chen - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
In this article, we propose a novel power control scheme for secure transmission and smart
jamming game to solve the problem of the decline of anti-jamming performance due to the …

Beamforming made Malicious: Manipulating Wi-Fi Traffic via Beamforming Feedback Forgery

M Xu, Y He, X Li, J Hu, Z Chen, F Xiao… - Proceedings of the 30th …, 2024 - dl.acm.org
New Wi-Fi systems have leveraged beamforming to manage a significant portion of traffic for
achieving high throughput and reliability. Unfortunately, this has amplified certain security …

WHACK: Adversarial Beamforming in MU-MIMO Through Compressed Feedback Poisoning

F Meneghello, F Restuccia… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Multi-user MIMO is a key component of modern wireless networks. As such, investigating the
related security weaknesses is a compelling necessity. A major issue unveiled by existing …