Article
Telecommunications
Jue Wang, Xuanxuan Wang, Ruifeng Gao, Chengleyang Lei, Wei Feng, Ning Ge, Shi Jin, Tony Q. S. Quek
Summary: This paper provides a comprehensive survey on the current achievements of physical layer security in unmanned aerial vehicle (UAV) systems. It covers the analysis of secrecy performance and enhancement techniques for both statically deployed UAV systems and those with mobility. The paper also discusses potential research directions and challenges in this area.
CHINA COMMUNICATIONS
(2022)
Article
Engineering, Electrical & Electronic
Shiguo Wang, Linzhi Li, Rukhsana Ruby, Xiukai Ruan, Jianming Zhang, Yongjian Zhang
Summary: This article presents a UAV-enabled relay system for wireless communication, taking into account factors such as UAV speed, trajectory, allowable power, and time scheduling. The achievable secrecy energy-efficiency is formulated and solved using the block coordinate descent (BCD) method, successive convex approximation (SCA), and Dinkelbach algorithm. Simulation results demonstrate that the proposed schemes outperform existing baseline schemes in terms of secrecy energy-efficiency.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Article
Computer Science, Hardware & Architecture
Rui Han, Lin Bai, Chunxiao Jiang, Jianwei Liu, Jinho Choi
Summary: This article proposes a secure architecture to enhance the security of Space Information Networks (SINs) by deploying relays and hopped beams to mitigate jamming attacks and combat eavesdropping attacks. The use of spatial diversity and data aggregation successfully improves the security of SINs in the presence of jamming and eavesdropping threats.
Article
Computer Science, Information Systems
Shida Xia, Xiaofeng Tao, Na Li, Shiji Wang, Jin Xu
Summary: This paper investigates the issue of identity verification in UAV relay networks and proposes a physical layer authentication scheme that can authenticate mobile UAV relays in real time to prevent unauthorized access to user information or network services.
SCIENCE CHINA-INFORMATION SCIENCES
(2022)
Article
Telecommunications
Tianshun Wang, Yang Li, Yuan Wu
Summary: This paper explores the application of UAVs in cellular networks to provide efficient data access for cell-edge users through cooperative computation offloading. Optimization of UAV's hovering position, transmit power, and computation rate allocation, as well as CEUs' transmission duration and computation offloading, aiming to minimize energy consumption. The research results demonstrate the effectiveness of the proposed algorithms and the performance advantage.
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING
(2021)
Article
Computer Science, Hardware & Architecture
Wei Wang, Weiping Zhao, Dingcheng Yang, An Li, Yapeng Wang, Lin Xiao
Summary: This research proposes a novel two-way secure communication system that enables multiple pairs of ground users to communicate with each other through an untrusted UAV relay. The security of communication is ensured by using slot pairing and joint path design. Numerical results demonstrate the convergence and efficacy of the proposed scheme.
Article
Telecommunications
Junyu Zhang, Fahui Wu, Yutao Zhu, Lin Xiao, Dingcheng Yang
Summary: This paper investigates the achievable average secrecy rate for a mobile jammer-aided secure unmanned aerial vehicle (UAV) relaying system, proposing an optimization problem for jointly optimizing time scheduling, transmit power, and UAV trajectory to enhance security against eavesdropping. Simulation results demonstrate the effectiveness of the proposed algorithm compared with benchmark algorithms.
VEHICULAR COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Manjing Zhu, Yuhao Wang, Xiaodong Liu, Zhengbao Qi, Xuanbang Chen, Jin-Yuan Wang
Summary: This paper investigates the physical layer security (PLS) performance of a decode-and-forward (DF) relay-aided visible light communication (VLC) system, aiming to evaluate the security risks introduced by the relay technology. The theoretical expressions of the upper and lower bounds of the security outage probability (SOP) are derived based on stochastic geometry analysis, and validated through Monte Carlo simulation. The simulation results reveal the degraded security outage performance of the DF relay-aided VLC system compared to the non-relay VLC system. The impacts of eavesdroppers' distribution density, LED source radiation radius, relay radiation radius, and deployment height on the SOP are also investigated, and the optimal deployment height of the relay is determined for achieving the optimum security outage performance. These findings provide effective guidance for the design of secure relay-aided VLC systems.
IEEE PHOTONICS JOURNAL
(2023)
Article
Telecommunications
Siqi Chen, Cong Sun
Summary: This paper discusses a physical layer security model in wireless communications, where relay beamforming weights are designed to minimize relay transmit power while ensuring users' Quality of Service and preventing eavesdropping. By simplifying the original problem and designing an iterative algorithm, the proposed method outperforms existing techniques.
CHINA COMMUNICATIONS
(2021)
Article
Engineering, Electrical & Electronic
Changeez Amini, Paeiz Azmi, Seyed Sadra Kashef
Summary: This study investigates a visible light communication (VLC) system with an improved noise model applied to physical layer security (PLS), using secure beamforming signals with superposition coding. The improved model ensures that the output signal follows a signal-dependent Gaussian distribution. Two different methods are proposed to obtain lower and upper bounds on the secrecy rate of the strong user in direct transmission. Closed-form expressions for the lower and upper bounds on secrecy rate regions for various relaying schemes are derived, considering constraints and scenarios of blockage/outside coverage. The results show that the lower and upper bounds on secrecy rate regions are tight, and cooperative jamming outperforms other relaying schemes.
IEEE TRANSACTIONS ON COMMUNICATIONS
(2023)
Article
Engineering, Civil
Zhisheng Yin, Min Jia, Nan Cheng, Wei Wang, Feng Lyu, Qing Guo, Xuemin Shen
Summary: This paper investigates UAV-assisted physical layer security to enhance the security of satellite links in vehicle communications. By maximizing secrecy rate, optimizing satellite beamforming and UAV power allocation, while ensuring service quality for other users in different beams. An iterative optimization algorithm is proposed to address the nonconvex problem, with analysis on the tightness of SDR and complexity of the approach.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Xin He, Meixu Lin
Summary: With the advancement of drone technology, the use of drones in agriculture and communication transmission has become a new application. However, the transmission rate and user experience of drones are hindered. Therefore, this paper studies the impact of edge caching technology on the performance of mobile relay systems and proposes optimization design methods to provide higher-quality communication services and support the broad application of drones.
COMPUTER COMMUNICATIONS
(2022)
Article
Engineering, Aerospace
Ziwei Yuan, Yanping Yang, Dong Wang, Xiaoping Ma
Summary: This paper investigates a joint safety information interaction scheme for low-altitude UAV-enabled network, which involves trajectory planning, energy efficiency optimization, and physical-layer security. The simulation concludes that the joint optimization of trajectory and power allocation maximizes the information secure energy efficiency.
Article
Computer Science, Information Systems
Zhen Wang, Jichang Guo, Zhiqiong Chen, Lisu Yu, Yuhao Wang, Hong Rao
Summary: This paper investigates the application of unmanned aerial vehicles (UAVs) in addressing physical layer security issues. By optimizing the trajectories and power of UAV relays, along with the use of jamming signals, the security performance of the relay network can be enhanced.
JOURNAL OF COMMUNICATIONS AND NETWORKS
(2022)
Article
Computer Science, Information Systems
Yong Ning, Rushan Chen
Summary: This article focuses on the system of using unmanned aerial vehicles to relay confidential messages between unconnected ground nodes. A joint optimization algorithm is proposed to maximize secure throughput, and simulation results show significant performance gains.
IEEE SYSTEMS JOURNAL
(2022)