Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems

S Hu, Q Wu, X Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Thanks to their quick placement and high flexibility, unmanned aerial vehicles (UAVs) can
be very useful in the current and future wireless communication systems. With a growing …

UAV-assisted maritime legitimate surveillance: Joint trajectory design and power allocation

L Wu, W Wang, Z Ji, Y Yang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
This paper investigates a novel maritime wireless surveillance scenario, where a legitimate
monitor vessel moves around to eavesdrop the suspicious communication from a suspicious …

Energy-efficient trajectory design for UAV-enabled communication under malicious jamming

Y Wu, W Yang, X Guan, Q Wu - IEEE Wireless Communications …, 2020 - ieeexplore.ieee.org
In this letter, we investigate a UAV-enabled communication system, where a UAV is
deployed to communicate with the ground node (GN) in the presence of multiple jammers …

Joint optimization of position and jamming power for UAV-aided proactive eavesdropping over multiple suspicious communication links

G Hu, Y Cai, Y Cai - IEEE Wireless Communications Letters, 2020 - ieeexplore.ieee.org
This letter studies a novel wireless information surveillance scenario, where a legitimate
monitor aims to eavesdrop the communication of multiple suspicious links with the help of a …

Energy efficient legitimate wireless surveillance of UAV communications

K Li, RC Voicu, SS Kanhere, W Ni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …

Joint trajectory and resource allocation design for energy-efficient secure UAV communication systems

Y Cai, Z Wei, R Li, DWK Ng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we study the trajectory and resource allocation design for downlink energy-
efficient secure unmanned aerial vehicle (UAV) communication systems, where an …

Cooperative UAV jammer for enhancing physical layer security: Robust design for jamming power and trajectory

Y Roh, S Jung, J Kang - MILCOM 2019-2019 IEEE Military …, 2019 - ieeexplore.ieee.org
An unmanned aerial vehicle (UAV)-aided network is becoming a promising application for
the future wireless communication due to the flexible deployment and dominant line-of-sight …

Securing UAV communications via trajectory optimization

G Zhang, Q Wu, M Cui, R Zhang - GLOBECOM 2017-2017 …, 2017 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) communications has drawn significant interest recently due
to many advantages such as low cost, high mobility, and on-demand deployment. This …

Joint trajectory and power optimization for securing UAV communications against active eavesdropping

B Duo, J Luo, Y Li, H Hu, Z Wang - China Communications, 2021 - ieeexplore.ieee.org
Due to both of jamming and eavesdropping, active eavesdroppers can induce more serious
security threats to unmanned aerial vehicle (UAV)-enabled communications. This paper …

Securing energy-constrained UAV communications against both internal and external eavesdropping

Y Gao, H Tang, B Li, X Yuan - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
This letter investigates an unmanned aerial vehicle (UAV) enabled network where an
energy-constrained rotary-wing UAV is employed as a mobile base station to serve multiple …