A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
Thanks to the rapidly develo** technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …
complete a number of tasks in cooperation with each other without need for human …
Security threats and mitigation techniques in UAV communications: A comprehensive survey
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …
applications and services, including military and rescue operations, aerial surveillance …
When UAV meets IRS: Expanding air-ground networks via passive reflection
Thanks to their flexibility and mobility, unmanned aerial vehicles (UAVs) have been widely
applied in wireless networks. However, UAV communications may suffer from blockage and …
applied in wireless networks. However, UAV communications may suffer from blockage and …
Joint optimization for secure intelligent reflecting surface assisted UAV networks
This letter proposes a novel secure intelligent reflecting surface (IRS)-assisted unmanned
aerial vehicle (UAV) system, where the UAV sends confidential messages to a legitimate …
aerial vehicle (UAV) system, where the UAV sends confidential messages to a legitimate …
Aerial intelligent reflecting surface-enabled terahertz covert communications in beyond-5G Internet of Things
Unmanned aerial vehicles (UAVs) are envisioned to be extensively employed for assisting
wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz) …
wireless communications in the Internet of Things (IoT). On the other hand, terahertz (THz) …
Deep-graph-based reinforcement learning for joint cruise control and task offloading for aerial edge Internet of Things (EdgeIoT)
This article puts forth an aerial edge Internet of Things (EdgeIoT) system, where an
unmanned aerial vehicle (UAV) is employed as a mobile-edge server to process mission …
unmanned aerial vehicle (UAV) is employed as a mobile-edge server to process mission …
Secure 3D mobile UAV relaying for hybrid satellite-terrestrial networks
In this paper, we propose a novel decode-and-forward (DF)-based secure 3D mobile
unmanned aerial vehicle (UAV) relaying for hybrid satellite-terrestrial networks (HSTNs) in …
unmanned aerial vehicle (UAV) relaying for hybrid satellite-terrestrial networks (HSTNs) in …
Joint optimization of trajectory, propulsion, and thrust powers for covert UAV-on-UAV video tracking and surveillance
Autonomous tracking of suspicious unmanned aerial vehicles (UAVs) by legitimate
monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to …
monitoring UAVs (or monitors) can be crucial to public safety and security. It is non-trivial to …
Secrecy performance analysis of RIS-aided communication system with randomly flying eavesdroppers
In this letter, we analyze the secrecy performance of a reconfigurable intelligent surface
(RIS)-aided communication system with spatially random unmanned aerial vehicles (UAVs) …
(RIS)-aided communication system with spatially random unmanned aerial vehicles (UAVs) …
Physical layer security for UAV communications: A comprehensive survey
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …
unprecedented interest in both military and civil applications to enable agile and ubiquitous …