UAV-assisted IoT applications, cybersecurity threats, AI-enabled solutions, open challenges with future research directions

M Adil, H Song, S Mastorakis… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Unnamed Ariel Vehicle-assisted-Internet of Things (UAV-assisted IoT) applications have
emerged as a powerful integrated technology, showcasing remarkable results in many …

Physical layer security for UAV communications: A comprehensive survey

J Wang, X Wang, R Gao, C Lei, W Feng… - China …, 2022 - ieeexplore.ieee.org
Due to its high mobility and flexible deployment, unmanned aerial vehicle (UAV) is drawing
unprecedented interest in both military and civil applications to enable agile and ubiquitous …

Intelligent trajectory design for secure full-duplex MIMO-UAV relaying against active eavesdroppers: A model-free reinforcement learning approach

MT Mamaghani, Y Hong - IEEE Access, 2020 - ieeexplore.ieee.org
Unmanned aerial vehicle (UAV) assisted wireless communication has recently been
recognized as an inevitably promising component of future wireless networks. Particularly …

Terahertz meets untrusted UAV-relaying: Minimum secrecy energy efficiency maximization via trajectory and communication co-design

MT Mamaghani, Y Hong - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) and Terahertz (THz) technology are envisioned to play
paramount roles in next-generation wireless communications. In this paper, we present a …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …

Physical layer security for UAV communications in 5G and beyond networks

J Wang, X Wang, R Gao, C Lei, W Feng, N Ge… - ar** UAV
V Soltaninia, S Talati, MR Hasani Ahangar… - Electronic and Cyber …, 2023 - ecdj.ihu.ac.ir
This paper proposes the use of a trusted decoder and forward (DF) Unmanned Aerial
Vehicle (UAV) relay to establish a covert communication between a terrestrial transmitter …

Graph Neural Networks for Physical-Layer Security in Multi-User Flexible-Duplex Networks

T Perera, S Atapattu, Y Fang… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
This paper explores Physical-Layer Security (PLS) in Flexible Duplex (FlexD) networks,
considering scenarios involving eavesdroppers. Our investigation revolves around the …