5G and 6G technologies; A2A; A2G; G2A; G2G; Information confidentiality; Physical layer security; UAV communications; Computer Science (all); General Computer Science
Abstract :
[en] Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses because of their high mobility and adaptable deployment capabilities in open spaces. They facilitate agile communications and ubiquitous connectivity. UAVs benefit from dominant line-of-sight communication links but are more susceptible to adversary eavesdropping attacks. Since upper-layer cryptography methods may be insufficient, physical-layer security (PLS) is an attractive alternative. PLS capitalizes on the inherent randomness of wireless channels to improve information confidentiality, particularly in UAV systems. This article provides a comprehensive overview of PLS in the context of UAV systems, examining various communication channels, including ground-to-air (G2A), ground-to-ground (G2G), air-to-ground (A2G), and air-to-air (A2A). First, we give a general review of UAV communications, emphasizing its functions as user equipment, base station (BS), and mobile relay. Following that, we provide an overview of PLS and its forms. The survey organizes the most advanced PLS techniques against passive wireless eavesdropping regarding the channels they are designed to protect. These schemes are further categorized into optimization and secrecy performance analysis. We examine technical aspects within each sub-category and classify core contributions based on approaches and objectives to improve secrecy performance. Moreover, we added summary tables of the identified schemes considering optimization and secrecy performance analysis domains for each category, providing an in-depth understanding of their technical aspects. In addition, we discuss open research issues and identify future research directions to address evolving threats and requirements in UAV communications to improve information confidentiality.
Disciplines :
Electrical & electronics engineering
Author, co-author :
Xu, Fang; School of Computer and Information Science, Hubei Engineering University, Xiaogan, China ; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan, China
Ahmad, Sajed; The College of Computer Science and Technology, Qingdao University, Qingdao, China
khan, Muhammad Naveed; The College of Computer Science and Technology, Qingdao University, Qingdao, China
Ahmed, Manzoor; School of Computer and Information Science, Hubei Engineering University, Xiaogan, China ; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan, China
Raza, Salman; Department of Computer Science, National Textile University, Faisalabad, Pakistan
Khan, Feroz; Balochistan University of Information Technology Engineering & Management Sciences, Quetta, Pakistan
Ma, Yi; School of Computer and Information Science, Hubei Engineering University, Xiaogan, China ; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan, China
KHAN, Wali Ullah ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SigCom
External co-authors :
yes
Language :
English
Title :
Beyond encryption: Exploring the potential of physical layer security in UAV networks
Publication date :
September 2023
Journal title :
Journal of King Saud University - Computer and Information Sciences
This research was supported by the National Natural Science Foundation of China (61972136), the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (T201410, T2020017), the Natural Science Foundation of Xiaogan City (XGKJ2022010095).
Abdalla, A.S., Behfarnia, A., Marojevic, V., Uav trajectory and multi-user beamforming optimization for clustered users against passive eavesdropping attacks with unknown csi. IEEE Trans. Veh. Technol., 2023.
Abughalwa, M., Hasna, M.O., 2019. A comparative secrecy study of flying and ground eavesdropping in uav based communication systems. In: 2019 International Conference on Information and Communication Technology Convergence (ICTC), IEEE. pp. 416–421.
Ahmed, M., Alshahrani, H.M., Alruwais, N., Asiri, M.M., Duhayyim, M.A., Khan, W.U., khurshaid, T., Nauman, A., Joint optimization of uav-irs placement and resource allocation for wireless powered mobile edge computing networks. J. King Saud Univ.- Comput. Infr. Sci., 35, 2023, 101646, 10.1016/j.jksuci.2023.101646 URL: https://www.sciencedirect.com/science/article/pii/S1319157823002008.
Ahmed, M., Li, Y., Yinxiao, Z., Sheraz, M., Xu, D., Jin, D., Secrecy ensured socially aware resource allocation in device-to-device communications underlaying hetnet. IEEE Trans. Veh. Technol. 68 (2019), 4933–4948, 10.1109/TVT.2019.2890879.
Ahmed, M., Shi, H., Chen, X., Li, Y., Waqas, M., Jin, D., Socially aware secrecy-ensured resource allocation in d2d underlay communication: An overlapping coalitional game scheme. IEEE Trans. Wireless Commun. 17 (2018), 4118–4133, 10.1109/TWC.2018.2820693.
Ahmed, M., Wahid, A., Laique, S.S., Khan, W.U., Ihsan, A., Xu, F., Chatzinotas, S., Han, Z., A survey on star-ris: Use cases, recent advances, and future research challenges. IEEE Internet Things J., 1–1, 2023, 10.1109/JIOT.2023.3279357.
Ahmed, S., Bash, B.A., 2019. Average worst-case secrecy rate maximization via uav and base station resource allocation. In: 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), IEEE. pp. 1176–1181.
Ahmed, S., Chowdhury, M.Z., Sabuj, S., Jang, Y., 2020a. Joint worst case secrecy rate and uav propulsion energy optimization via robust resource allocation in uncertain adversarial networks. arXiv e-prints, arXiv–2006.
Ahmed, S., Chowdhury, M.Z., Sabuj, S., Jang, Y., 2020b. Joint worst case secrecy rate and uav propulsion energy optimization via robust resource allocation in uncertain adversarial networks. arXiv e-prints, arXiv–2006.
Alali, A., Rawat, D.B., 2021. Combating distance limitation in sub-terahertz frequency band for physical layer security in uav communications. In: IEEE INFOCOM 2021-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE. pp. 1–6.
Amodu, O.A., Busari, S.A., Othman, M., Physical layer aspects of terahertz-enabled uav communications: Challenges and opportunities. Vehi. Commun., 2022, 100540.
Angjo, J., Shayea, I., Ergen, M., Mohamad, H., Alhammadi, A., Daradkeh, Y.I., Handover management of drones in future mobile networks: 6g technologies. IEEE Access 9 (2021), 12803–12823.
Azari, M.M., Rosas, F., Chiumento, A., Pollin, S., 2017. Coexistence of terrestrial and aerial users in cellular networks. In: 2017 IEEE Globecom Workshops (GC Wkshps), IEEE. pp. 1–6.
Azari, M.M., Solanki, S., Chatzinotas, S., Kodheli, O., Sallouha, H., Colpaert, A., Mendoza Montoya, J.F., Pollin, S., Haqiqatnejad, A., Mostaani, A., Lagunas, E., Ottersten, B., Evolution of non-terrestrial networks from 5G to 6G: A survey. IEEE Commun. Sur. Tutorials 24 (2022), 2633–2672, 10.1109/COMST.2022.3199901.
Bankey, V., Upadhyay, P.K., 2020. Improving secrecy performance of land mobile satellite systems via a uav friendly jammer. In: 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), IEEE. pp. 1–4.
Bao, T., Zhu, J., Yang, H.C., Hasna, M.O., Secrecy outage performance of ground-to-air communications with multiple aerial eavesdroppers and its deep learning evaluation. IEEE Wireless Commun. Lett., 2020.
Bastami, H., Letafati, M., Moradikia, M., Abdelhadi, A., Behroozi, H., Hanzo, L., On the physical layer security of the cooperative rate-splitting aided downlink in uav networks. IEEE Trans. Inf. Forensics Secur., 2021.
Benaya, A., Ismail, M.H., Ibrahim, A.S., Salem, A.A., Physical layer security enhancement via intelligent omni-surfaces and uav-friendly jamming. IEEE Access 11 (2023), 2531–2544.
Bloch, M., Barros, J., Physical-layer Security: From Information Theory to Security Engineering. 2011, Cambridge University Press.
Cabezas, X.F., Osorio, D.M., Latva-Aho, M., Distributed uav-enabled zero-forcing cooperative jamming scheme for safeguarding future wireless networks. 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2021, IEEE, 739–744.
Cabezas, X.F., Osorio, D.M., Latva-aho, M., 2021b. Weighted secrecy coverage analysis and the impact of friendly jamming over uav-enabled networks. In: 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit), IEEE. pp. 124–129.
Cai, Y., Wei, Z., Li, R., Ng, D.W.K., Yuan, J., Joint trajectory and resource allocation design for energy-efficient secure uav communication systems. IEEE Trans. Commun., 2020.
Cao, B., Li, M., Liu, X., Zhao, J., Cao, W., Lv, Z., Many-objective deployment optimization for a drone-assisted camera network. IEEE Trans. Network Sci. Eng. 8 (2021), 2756–2764, 10.1109/TNSE.2021.3057915.
Cao, K., Wang, B., Ding, H., Lv, L., Dong, R., Cheng, T., Gong, F., Improving physical layer security of uplink NOMA via energy harvesting jammers. IEEE Trans. Inf. Forensics Secur. 16 (2021), 786–799, 10.1109/TIFS.2020.3023277.
Chandrasekharan, S., Gomez, K., Al-Hourani, A., Kandeepan, S., Rasheed, T., Goratti, L., Reynaud, L., Grace, D., Bucaille, I., Wirth, T., et al. Designing and implementing future aerial communication networks. IEEE Commun. Mag. 54 (2016), 26–34.
Chen, P., Luo, X., Guo, D., Sun, Y., Xie, J., Zhao, Y., Zhou, R., Secure task offloading for mec-aided-uav system. IEEE Trans. Intell. Vehicl., 2022.
Chen, X., Yang, Z., Zhao, N., Chen, Y., Wang, J., Ding, Z., Yu, F.R., Secure transmission via power allocation in noma-uav networks with circular trajectory. IEEE Trans. Veh. Technol. 69 (2020), 10033–10045.
Chen, Y., Feng, W., Zheng, G., Optimum placement of uav as relays. IEEE Commun. Lett. 22 (2017), 248–251.
Chen, Y., Zhang, Z., Uav-aided secure transmission in misome wiretap channels with imperfect csi. IEEE Access 7 (2019), 98107–98121.
Cicek, C.T., Gultekin, H., Tavli, B., Yanikomeroglu, H., 2019. Uav base station location optimization for next generation wireless networks: Overview and future research directions. In: 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS), IEEE. pp. 1–6.
Diao, D., Wang, B., Secrecy performance analysis of uav wireless powered communications against full-duplex proactive eavesdropping. 2021 International Conference on Communications, Information System and Computer Engineering (CISCE), 2021, IEEE, 192–199.
Diao, D., Wang, B., Cao, K., Weng, J., Dong, R., Cheng, T., Secure wireless-powered noma communications in multi-uav systems. IEEE Trans. Green Commun. Network., 2023.
Dong, R., Wang, B., Cao, K., Security enhancement of uav swarm enabled relaying systems with joint beamforming and resource allocation. China Commun. 18 (2021), 71–87.
Dong, R., Wang, B., Tian, J., Cheng, T., Diao, D., Deep reinforcement learning based uav for securing mmwave communications. IEEE Trans. Veh. Technol. 72 (2022), 5429–5434.
Duo, B., Hu, H., Li, Y., Yuan, X., 2021. Joint trajectory and power design in probabilistic los channel for uav-enabled cooperative jamming. In: ICC 2021-IEEE International Conference on Communications, IEEE. pp. 1–6.
Duo, B., Wu, Q., Yuan, X., Zhang, R., Energy efficiency maximization for full-duplex uav secrecy communication. IEEE Trans. Veh. Technol. 69 (2020), 4590–4595.
Fan, W., Wu, Y., Ju, S., Zhang, K., Yang, W., Secure uav communication with robust communication and trajectory design. 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), 2019, IEEE, 1–5.
Fan, X., Huang, C., Chen, X., Wen, S., Fu, B., Delay-constrained throughput maximization in uav-assisted vanets. International Conference on Wireless Algorithms, Systems, and Applications, 2018, Springer, 115–126.
Fu, F., Jiao, Q., Yu, F.R., Zhang, Z., Du, J., 2021. Securing uav-to-vehicle communications: A curiosity-driven deep q-learning network (c-dqn) approach. In: 2021 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE. pp. 1–6.
Galletta, A., Taheri, J., Celesti, A., Fazio, M., Villari, M., Investigating the applicability of nested secret share for drone fleet photo storage. IEEE Trans. Mob. Comput., 1–13, 2023, 10.1109/TMC.2023.3263115.
Gu, X., Zhang, G., Wang, M., Duan, W., Wen, M., Ho, P.H., Uav-aided energy efficient edge computing networks: Security offloading optimization. IEEE Internet Things J., 2021.
Gupta, L., Jain, R., Vaszkun, G., Survey of important issues in uav communication networks. IEEE Commun. Surv. Tutorials 18 (2016), 1123–1152, 10.1109/COMST.2015.2495297.
Hadi, H.J., Cao, Y., Nisa, K.U., Jamil, A.M., Ni, Q., A comprehensive survey on security, privacy issues and emerging defence technologies for uavs. J. Network Comput. Appl., 213, 2023, 103607.
Hamamreh, J.M., Furqan, H.M., Arslan, H., Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutorials 21 (2018), 1773–1828.
Hamamreh, J.M., Furqan, H.M., Arslan, H., Classifications and applications of physical layer security techniques for confidentiality: A comprehensive survey. IEEE Commun. Surv. Tutorials 21 (2019), 1773–1828, 10.1109/COMST.2018.2878035.
Hasan, T., Malik, J., Bibi, I., Khan, W.U., Al-Wesabi, F.N., Dev, K., Huang, G., Securing industrial internet of things against botnet attacks using hybrid deep learning approach. IEEE Trans. Network Sci. Eng., 1–1, 2022, 10.1109/TNSE.2022.3168533.
Hayat, S., Yanmaz, E., Muzaffar, R., Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint. IEEE Commun. Surv. Tutorials 18 (2016), 2624–2661.
He, D., Sha, Z., Liu, H., Mao, T., Wang, Z., Uav-assisted satellite-terrestrial secure communication using large-scale antenna array with one-bit adcs/dacs. IEEE Trans. Commun. 71 (2022), 580–594.
Illi, E., Qaraqe, M., El Bouanani, F., Al-Kuwari, S., On the physical layer security of a dual-hop uav-based network in the presence of per-hop eavesdropping and imperfect csi. IEEE Internet Things J., 2022.
Jameel, F., Khan, W.U., Chang, Z., Ristaniemi, T., Liu, J., 2019. Secrecy analysis and learning-based optimization of cooperative NOMA SWIPT systems. In: 2019 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6. https://doi.org/10.1109/ICCW.2019.8756894.
Jameel, F., Zeb, S., Khan, W.U., Hassan, S.A., Chang, Z., Liu, J., NOMA-enabled backscatter communications: Toward battery-free IoT networks. IEEE Internet Things Mag. 3 (2020), 95–101, 10.1109/IOTM.0001.2000055.
Jang, G., You, B., Lee, I.H., Jung, H., Shin, H., Secrecy rate degradation of ground-to-air collaborative beamforming due to uav jitter. IEEE Trans. Veh. Technol., 2023.
Ji, B., Li, Y., Cao, D., Li, C., Wang, D., et al. Secrecy performance analysis of uav assisted relay transmission for cognitive network with energy harvesting. IEEE Trans. Veh. Technol., 2020.
Ji, B., Li, Y., Chen, S., Han, C., Li, C., Wen, H., Secrecy outage analysis of uav assisted relay and antenna selection for cognitive network under nakagami-m channel. IEEE Trans. Cognit. Commun. Network., 2020.
Ji, Y., Yu, K., Qiu, J., Yu, J., Massive mimo and secrecy guard zone based improving physical layer security in uav-enabled urllc networks. IEEE Trans. Veh. Technol., 2022.
Jiang, X., Sheng, M., Zhao, N., Xing, C., Lu, W., Wang, X., Green uav communications for 6g: A survey. Chinese J. Aeronaut., 2021.
Kaamin, M., Sarif, A., Husin, N., Supar, K., Razali, S., Sahat, S., Mokhtar, M., 2020. Advanced techniques in as-built survey by using uav technology. In: Journal of Physics: Conference Series, IOP Publishing. p. 032110.
Khadem, B., Mohebalizadeh, S., 2020. Efficient uav physical layer security based on deep learning and artificial noise. arXiv preprint arXiv:2004.01343.
Khan, M.A., Kumar, N., Mohsan, S.A.H., Khan, W.U., Nasralla, M.M., Alsharif, M.H., Zywiolek, J., Ullah, I., Swarm of UAVs for network management in 6G: A technical review. IEEE Trans. Netw. Serv. Manage. 20 (2023), 741–761, 10.1109/TNSM.2022.3213370.
Khan, W.U., Ali, Z., Lagunas, E., Chatzinotas, S., Ottersten, B., 2022a. Rate splitting multiple access for cognitive radio GEO-LEO co-existing satellite networks. In: GLOBECOM 2022–2022 IEEE Global Communications Conference, pp. 5165–5170. https://doi.org/10.1109/GLOBECOM48099.2022.10000999.
Khan, W.U., Ali, Z., Lagunas, E., Mahmood, A., Asif, M., Ihsan, A., Chatzinotas, S., Ottersten, B., Dobre, O.A., Rate splitting multiple access for next generation cognitive radio enabled LEO satellite networks. IEEE Trans. Wireless Commun., 1–1, 2023, 10.1109/TWC.2023.3263116.
Khan, W.U., Jameel, F., Ristaniemi, T., Khan, S., Sidhu, G.A.S., Liu, J., Joint spectral and energy efficiency optimization for downlink NOMA networks. IEEE Trans. Cognit. Commun. Network. 6 (2020), 645–656, 10.1109/TCCN.2019.2945802.
Khan, W.U., Jamshed, M.A., Lagunas, E., Chatzinotas, S., Li, X., Ottersten, B., Energy efficiency optimization for backscatter enhanced NOMA cooperative V2X communications under imperfect CSI. IEEE Trans. Intell. Transp. Syst., 1–12, 2022, 10.1109/TITS.2022.3187567.
Khan, W.U., Lagunas, E., Ali, Z., Javed, M.A., Ahmed, M., Chatzinotas, S., Ottersten, B., Popovski, P., Opportunities for physical layer security in uav communication enhanced with intelligent reflective surfaces. IEEE Wirel. Commun. 29 (2022), 22–28.
Khan, W.U., Lagunas, E., Mahmood, A., Chatzinotas, S., Ottersten, B., 2023c. Energy-efficient RIS-enabled NOMA communication for 6G LEO satellite networks. arXiv preprint arXiv:2303.05588.
Khan, W.U., Lagunas, E., Mahmood, A., Chatzinotas, S., Ottersten, B., 2023d. RIS-assisted energy-efficient LEO satellite communications with NOMA. arXiv preprint arXiv:2306.10422.
Khan, W.U., Liu, J., Jameel, F., Khan, M.T.R., Ahmed, S.H., Jäntti, R., 2020b. Secure backscatter communications in multi-cell NOMA networks: Enabling link security for massive IoT networks. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 213–218. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162938.
Khowaja, S.A., Khuwaja, P., Dev, K., Lee, I.H., Khan, W.U., Wang, W., Qureshi, N.M.F., Magarini, M., A secure data sharing scheme in community segmented vehicular social networks for 6G. IEEE Trans. Industr. Inf. 19 (2023), 890–899, 10.1109/TII.2022.3188963.
Krayani, A., Alam, A.S., Marcenaro, L., Nallanathan, A., Regazzoni, C., An emergent self-awareness module for physical layer security in cognitive uav radios. IEEE Trans. Cognit. Commun. Network. 8 (2022), 888–906.
Lei, C., Feng, W., Chen, Y., Ge, N., Secrecy rate maximization for 6g cognitive satellite-uav networks. China Commun. 20 (2023), 246–260.
Lei, H., Wang, D., Park, K.H., Ansari, I.S., Jiang, J., Pan, G., Alouini, M.S., Safeguarding uav iot communication systems against randomly located eavesdroppers. IEEE Internet Things J. 7 (2019), 1230–1244.
Lei, H., Wang, D., Park, K.H., Ansari, I.S., Pan, G., Alouini, M.S., 2019b. On secure uav communication systems with randomly located eavesdroppers. In: 2019 IEEE/CIC International Conference on Communications in China (ICCC), IEEE. pp. 201–206.
Li, B., Li, Q., Zeng, Y., Rong, Y., Zhang, R., 3D trajectory optimization for energy-efficient UAV communication: A control design perspective. IEEE Trans. Wireless Commun. 21 (2022), 4579–4593, 10.1109/TWC.2021.3131384.
Li, B., Zhou, X., Ning, Z., Guan, X., Yiu, K.F.C., Dynamic event-triggered security control for networked control systems with cyber-attacks: A model predictive control approach. Inf. Sci. 612 (2022), 384–398.
Li, J., Kang, H., Sun, G., Liang, S., Liu, Y., Zhang, Y., 2021a. Physical layer secure communications based on collaborative beamforming for uav networks: A multi-objective optimization approach, 1–10.
Li, J., Sun, G., Kang, H., Wang, A., Liang, S., Liu, Y., Zhang, Y., Multi-objective optimization approaches for physical layer secure communications based on collaborative beamforming in uav networks. IEEE/ACM Trans. Network., 2023.
Li, M., Tao, X., Li, N., Wu, H., Xu, J., Secrecy energy efficiency maximization in uav-enabled wireless sensor networks without eavesdropper's csi. IEEE Internet Things J., 2021.
Li, R., Wei, Z., Yang, L., Ng, D.W.K., Yuan, J., An, J., Resource allocation for secure multi-uav communication systems with multi-eavesdropper. IEEE Trans. Commun., 2020.
Li, Y., Fang, Y., Qiu, L., 2021c. Joint computation offloading and communication design for secure uav-enabled mec systems, 1–6.
Li, Y., Jing, C., Zhao, Y., 2021d. Joint power allocation and relay selection scheme in untrusted uav relays system 5, 210–216.
Li, Y., Zhang, R., Zhang, J., Gao, S., Yang, L., Cooperative jamming for secure uav communications with partial eavesdropper information. IEEE Access 7 (2019), 94593–94603.
Liang, W., Shi, J., Tie, Z., Yang, F., Performance analysis for uav-jammer aided covert communication. IEEE Access 8 (2020), 111394–111400.
Liu, H., Kwak, K.S., 2017. Secrecy outage probability of uav-aided selective relaying networks. In: 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), IEEE. pp. 24–29.
Liu, H., Yoo, S.J., Kwak, K.S., Opportunistic relaying for low-altitude uav swarm secure communications with multiple eavesdroppers. J. Commun. Networks 20 (2018), 496–508.
Liu, J., Yang, W., Xu, S., Liu, J., Zhang, Q., 2019. Q-learning based uav secure communication in presence of multiple uav active eavesdroppers. In: 2019 11th International Conference on Wireless Communications and Signal Processing (WCSP), IEEE. pp. 1–6.
Liu, Y., Chen, H.H., Wang, L., Physical layer security for next generation wireless networks: Theories, technologies, and challenges. IEEE Commun. Surv. Tutorials 19 (2017), 347–376, 10.1109/COMST.2016.2598968.
Liu, Y., Xiong, K., Gao, B., Zhang, Y., Fan, P., Letaief, K.B., 2020. Multi-uav assisted communication networks: Towards max-min secrecy rate. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE. pp. 641–646.
Long, H., Chen, M., Yang, Z., Wang, B., Li, Z., Yun, X., Shikh-Bahaei, M., 2020. Reflections in the sky: Joint trajectory and passive beamforming design for secure uav networks with reconfigurable intelligent surface. arXiv preprint arXiv:2005.10559.
Long, N.Q., Dang, V.H., So-In, C., Nguyen, A.N., Tran, H., et al., 2021. Physical layer security in cognitive radio networks for iot using uav with reconfigurable intelligent surfaces. In: 2021 18th International Joint Conference on Computer Science and Software Engineering (JCSSE), IEEE. pp. 1–5.
Lu, Y., Xue, Z., Xia, G.S., Zhang, L., A survey on vision-based uav navigation. Geo-spatial Infr. Sci. 21 (2018), 21–32.
Lu, Z., Sun, L., Zhang, S., Zhou, X., Lin, J., Cai, W., Wang, J., Lu, J., Shu, F., Optimal power allocation for secure directional modulation networks with a full-duplex uav user. Sci. China Infr. Sci., 62, 2019, 80304.
Lueth, K.L., State of the iot 2020: 12 billion iot connections, surpassing non-iot for the first time. [Online]. Available= https://iot-analytics.com/state-of-the-iot-2020-12-billion-iotconnections-surpassing-non_iot-for-the-first-time/.
Lyu, J., Wang, H.M., Secure uav random networks with minimum safety distance. IEEE Trans. Veh. Technol. 70 (2021), 2856–2861.
Maeng, S.J., Yapıcı, Y., Güvenç, İ., Dai, H., Bhuyan, A., 2020. Precoder design for mmwave uav communications with physical layer security. arXiv preprint arXiv:2002.06760.
Mamaghani, M.T., Hong, Y., Improving phy-security of uav-enabled transmission with wireless energy harvesting: Robust trajectory design and communications resource allocation. IEEE Trans. Veh. Technol., 2020.
Mamaghani, M.T., Hong, Y., Intelligent trajectory design for secure full-duplex mimo-uav relaying against active eavesdroppers: A model-free reinforcement learning approach. IEEE Access 9 (2020), 4447–4465.
Mamaghani, M.T., Hong, Y., Joint trajectory and power allocation design for secure artificial noise aided uav communications. IEEE Trans. Veh. Technol. 70 (2021), 2850–2855.
Mei, M., Yang, Q., Yao, M., Qin, M., Kwak, K.S., Performance of secure uav transmission: Delay-secrecy analysis with channel uncertainty. 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, IEEE, 1–6.
Miao, J., Li, H., Zheng, Z., Wang, C., Secrecy energy efficiency maximization for uav swarm assisted multi-hop relay system: Joint trajectory design and power control. IEEE Access 9 (2021), 37784–37799.
Miao, J., Zheng, Z., Cooperative jamming for secure uav-enabled mobile relay system. IEEE Access 8 (2020), 48943–48957.
Mozaffari, M., Saad, W., Bennis, M., Nam, Y.H., Debbah, M., A tutorial on uavs for wireless networks: Applications, challenges, and open problems. IEEE Communi. Surv. Tutorials 21 (2019), 2334–2360.
Mozaffari, M., Saad, W., Bennis, M., Nam, Y.H., Debbah, M., A tutorial on uavs for wireless networks: Applications, challenges, and open problems. IEEE Commun. Surv. Tutorials 21 (2019), 2334–2360.
Nguyen, P.X., Nguyen, V.D., Nguyen, H.V., Shin, O.S., 2020. Uav-assisted secure communications in terrestrial cognitive radio networks: Joint power control and 3d trajectory optimization. arXiv preprint arXiv:2003.09677.
Nguyen, P.X., Nguyen, V.D., Nguyen, H.V., Shin, O.S., Uav-assisted secure communications in terrestrial cognitive radio networks: Joint power control and 3d trajectory optimization. IEEE Trans. Veh. Technol. 70 (2021), 3298–3313.
Niu, G., Cao, Q., Pun, M.O., Physical layer security communications and path planning for uav base stations. 2023 32nd Wireless and Optical Communications Conference (WOCC), 2023, IEEE, 1–6.
Nnamani, C.O., Khandaker, M.R., Sellathurai, M., Uav-aided jamming for secure ground communication with unknown eavesdropper location. IEEE Access 8 (2020), 72881–72892.
Oubbati, O.S., Atiquzzaman, M., Ahanger, T.A., Ibrahim, A., Softwarization of uav networks: A survey of applications and future trends. IEEE Access 8 (2020), 98073–98125.
Pham, Q.V., Huynh-The, T., Alazab, M., Zhao, J., Hwang, W.J., Sum-rate maximization for uav-assisted visible light communications using noma: Swarm intelligence meets machine learning. IEEE Internet Things J. 7 (2020), 10375–10387.
Pogaku, A.C., Do, D.T., Lee, B.M., Nguyen, N.D., Uav-assisted ris for future wireless communications: A survey on optimization and performance analysis. IEEE Access 10 (2022), 16320–16336.
Rasheed, I., Asif, M., Ihsan, A., Khan, W.U., Ahmed, M., Rabie, K.M., LSTM-based distributed conditional generative adversarial network for data-driven 5G-enabled maritime UAV communications. IEEE Trans. Intell. Transp. Syst. 24 (2023), 2431–2446.
Rezki, Z., Khisti, A., Alouini, M.S., On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation. 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), 2011, IEEE, 952–957.
Salem, A., Hamdi, K.A., Improving physical layer security of af relay networks via beam-forming and jamming. 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), 2016, IEEE, 1–5.
Samara, L., AlAbbasi, A.O., El Shafie, A., Hamila, R., Al-Dhahir, N., Secure af relaying in power-constrained uav networks. 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, IEEE, 1–7.
Sang, N.Q., Kong, H.Y., et al. Secrecy capacity maximization for untrusted uav-assisted cooperative communications with wireless information and power transfer. Wireless Netw., 2020, 1–12.
Shakhatreh, H., Sawalmeh, A.H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., Othman, N.S., Khreishah, A., Guizani, M., Unmanned aerial vehicles (uavs): A survey on civil applications and key research challenges. Ieee Access 7 (2019), 48572–48634.
Sharma, H., Kumar, N., Tekchandani, R.K., Mohammad, N., May, 2022. Deep learning enabled channel secrecy codes for physical layer security of uavs in 5g and beyond networks. In: ICC 2022-IEEE International Conference on Communications, IEEE. pp. 1–6.
Sharma, P.K., Kim, D.I., Secure 3d mobile uav relaying for hybrid satellite-terrestrial networks. IEEE Trans. Wireless Commun. 19 (2020), 2770–2784.
Shen, T., Ochiai, H., A uav-aided selective relaying with cooperative jammers for secure wireless networks over rician fading channels. 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), 2019, IEEE, 1–5.
Shengnan, C., Xiangdong, J., Yixuan, G., Yuhua, Z., Physical layer security communication of cognitive uav mobile relay network. 2021 7th International Symposium on Mechatronics and Industrial Informatics (ISMII), 2021, IEEE, 267–271.
Shu, F., Lu, Z., Lin, J., Sun, L., Zhou, X., Liu, T., Zhang, S., Cai, W., Lu, J., Wang, J., Alternating iterative secure structure between beamforming and power allocation for uav-aided directional modulation networks. Phys. Commun. 33 (2019), 46–53.
Song, Q., Zeng, Y., Xu, J., Jin, S., Feb, 2021. A survey of prototype and experiment for uav communications. Sci. China Inf. Sci.
Stanczak, J., Kovacs, I.Z., Koziol, D., Wigard, J., Amorim, R., Nguyen, H., Mobility challenges for unmanned aerial vehicles connected to cellular lte networks. 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 2018, IEEE, 1–5.
Sun, G., Tao, X., Li, N., Xu, J., Intelligent reflecting surface and uav assisted secrecy communication in millimeter-wave networks. IEEE Trans. Veh. Technol., 2021.
Sun, X., Shen, C., Ng, D.W.K., Zhong, Z., Robust trajectory and resource allocation design for secure uav-aided communications. 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, IEEE, 1–6.
Sun, X., Yang, W., Cai, Y., Wang, M., Secure mmwave uav-enabled swipt networks based on random frequency diverse arrays. IEEE Internet Things J. 8 (2020), 528–540.
Sun, X., Yang, W., Cai, Y., Wang, M., Secure mmwave uav-enabled swipt networks based on random frequency diverse arrays. IEEE Internet Things J. 8 (2020), 528–540.
Tang, J., Chen, G., Coon, J.P., Secrecy performance analysis of wireless communications in the presence of uav jammer and randomly located uav eavesdroppers. IEEE Trans. Inf. Forensics Secur. 14 (2019), 3026–3041.
Tsao, K.Y., Girdler, T., Vassilakis, V.G., A survey of cyber security threats and solutions for uav communications and flying ad-hoc networks. Ad Hoc Netw., 133, 2022, 102894.
Wang, B., Sun, Y., Duong, T.Q., Nguyen, L.D., Zhao, N., Popular matching for security-enhanced resource allocation in social internet of flying things. IEEE Trans. Commun., 2020.
Wang, B., Zhu, D., Han, L., Gao, H., Gao, Z., Zhang, Y., Adaptive fault-tolerant control of a hybrid canard rotor/wing UAV under transition flight subject to actuator faults and model uncertainties. IEEE Trans. Aerosp. Electron. Syst., 1–16, 2023, 10.1109/TAES.2023.3243580.
Wang, D., Bai, B., Zhang, G., Han, Z., Optimal placement of low-altitude aerial base station for securing communications. IEEE Wireless Commun. Lett. 8 (2019), 869–872.
Wang, H.M., Zhang, Y., Zhang, X., Li, Z., Secrecy and covert communications against uav surveillance via multi-hop networks. IEEE Trans. Commun. 68 (2019), 389–401.
Wang, J., Wang, X., Gao, R., Lei, C., Feng, W., Ge, N., Jin, S., Quek, T.Q., 2021a. Physical layer security for uav communications in 5g and beyond networks. arXiv preprint arXiv:2105.11332.
Wang, J., Wang, X., Gao, R., Lei, C., Feng, W., Ge, N., Jin, S., Quek, T.Q., Physical layer security for uav communications: A comprehensive survey. China Commun. 19 (2022), 77–115.
Wang, N., Wang, P., Alipour-Fanid, A., Jiao, L., Zeng, K., Physical-layer security of 5g wireless networks for iot: Challenges and opportunities. IEEE Internet Things J. 6 (2019), 8169–8181.
Wang, W., Li, X., Wang, R., Cumanan, K., Feng, W., Ding, Z., Dobre, O.A., Robust 3d-trajectory and time switching optimization for dual-uav-enabled secure communications. IEEE J. Sel. Areas Commun., 2021.
Wang, W., Li, X., Zhang, M., Cumanan, K., Ng, D.W.K., Zhang, G., Tang, J., Dobre, O.A., Energy-constrained uav-assisted secure communications with position optimization and cooperative jamming. IEEE Trans. Commun., 2020.
Wang, W., Tang, J., Zhao, N., Liu, X., Zhang, X.Y., Chen, Y., Qian, Y., Joint precoding optimization for secure swipt in uav-aided noma networks. IEEE Trans. Commun. 68 (2020), 5028–5040.
Wang, W., Tian, H., Ni, W., Hua, M., Reconfigurable intelligent surface aided secure uav communications. 2021 IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2021, IEEE, 818–823.
Wang, X., Feng, W., Chen, Y., Ge, N., Power allocation for uav swarm-enabled secure networks using large-scale csi. 2019 IEEE Global Communications Conference (GLOBECOM), 2019, IEEE, 1–6.
Wang, Y., Chen, L., Zhou, Y., Liu, X., Zhou, F., Al-Dhahir, N., Resource allocation and trajectory design in uav-assisted jamming wideband cognitive radio networks. IEEE Trans. Cognitive Commun. Network., 2020.
Wang, Y., Yang, W., Shang, X., Cai, Y., Energy-efficient secure transmission for uav-enabled wireless powered communication. 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), 2018, IEEE, 1–5.
Waqas, M., Ahmed, M., Li, Y., Jin, D., Chen, S., Social-aware secret key generation for secure device-to-device communication via trusted and non-trusted relays. IEEE Trans. Wireless Commun. 17 (2018), 3918–3930, 10.1109/TWC.2018.2817607.
Waqas, M., Ahmed, M., Zhang, J., Li, Y., Confidential information ensurance through physical layer security in device-to-device communication. 2018 IEEE Global Communications Conference (GLOBECOM), 2018, 1–7, 10.1109/GLOCOM.2018.8647343.
Wei, W., Pang, X., Tang, J., Zhao, N., Wang, X., Nallanathan, A., Secure transmission design for aerial irs assisted wireless networks. IEEE Trans. Commun., 2023.
Wen, C., Qiu, L., Liang, X., Securing uav communication with mobile uav eavesdroppers: Joint trajectory and communication design. 2021 IEEE Wireless Communications and Networking Conference (WCNC), 2021, IEEE, 1–6.
Wu, H., Li, H., Wei, Z., Zhang, N., Tao, X., Secrecy performance analysis of air-to-ground communication with uav jitter and multiple random walking eavesdroppers. IEEE Trans. Veh. Technol. 70 (2020), 572–584.
Wu, H., Wen, Y., Zhang, J., Wei, Z., Zhang, N., Tao, X., Energy-efficient and secure air-to-ground communication with jittering uav. IEEE Trans. Veh. Technol. 69 (2020), 3954–3967.
Wu, X., Li, Q., Lu, Y., Poor, H.V., Leung, V.C., Ching, P., Latency-minimized design of secure transmissions in uav-aided communications. ICASSP 2020–2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020, IEEE, 8753–8757.
Wu, Y., Yang, W., Sun, X., Securing uav-enabled millimeter wave communication via trajectory and power optimization. 2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2018, IEEE, 970–975.
Xiao, Z., Dong, H., Bai, L., Wu, D.O., Xia, X.G., Unmanned aerial vehicle base station (uav-bs) deployment with millimeter-wave beamforming. IEEE Internet Things J. 7 (2019), 1336–1349.
Xie, N., Li, Z., Tan, H., A survey of physical layer authentication in wireless communications. IEEE Commun. Surv. Tutorials, 2020.
Xu, F., Hussain, T., Ahmed, M., Ali, K., Mirza, M.A., Khan, W.U., Ihsan, A., Han, Z., The state of ai-empowered backscatter communications: A comprehensive survey. IEEE Internet Things J., 1–1, 2023, 10.1109/JIOT.2023.3299210.
Xu, K., Zhao, M.M., Cai, Y., Hanzo, L., Low-complexity joint power allocation and trajectory design for uav-enabled secure communications with power splitting. IEEE Trans. Commun., 2020.
Xu, K., Zhao, M.M., Cai, Y., Hanzo, L., Low-complexity joint power allocation and trajectory design for uav-enabled secure communications with power splitting. IEEE Trans. Commun. 69 (2020), 1896–1911.
Xu, Y., Zhang, T., Yang, D., Liu, Y., Tao, M., Joint resource and trajectory optimization for security in uav-assisted mec systems. IEEE Trans. Commun. 69 (2020), 573–588.
Yao, J., Xu, J., Secrecy transmission capacity of large-scale uav-enabled wireless networks. 2019 IEEE International Conference on Communications Workshops (ICC Workshops), 2019, IEEE, 1–6.
Yao, J., Xu, J., Joint 3d maneuver and power adaptation for secure uav communication with comp reception. IEEE Trans. Wireless Commun. 19 (2020), 6992–7006.
Yao, J., Xu, J., Joint 3d maneuver and power adaptation for secure uav communication with comp reception. IEEE Trans. Wireless Commun. 19 (2020), 6992–7006.
Yao, Y., Shu, F., Li, Z., Cheng, X., Wu, L., Secure transmission scheme based on joint radar and communication in mobile vehicular networks. IEEE Trans. Intell. Transp. Syst., 1–11, 2023, 10.1109/TITS.2023.3271452.
Yao, Y., Zhao, J., Li, Z., Cheng, X., Wu, L., Jamming and eavesdropping defense scheme based on deep reinforcement learning in autonomous vehicle networks. IEEE Trans. Inf. Forensics Secur. 18 (2023), 1211–1224, 10.1109/TIFS.2023.3236788.
Yapıcı, Y., Rupasinghe, N., Güvenç, I., Dai, H., Bhuyan, A., Physical layer security for noma transmission in mmwave drone networks. IEEE Trans. Veh. Technol. 70 (2021), 3568–3582.
Ye, J., Zhang, C., Lei, H., Pan, G., Ding, Z., Secure uav-to-uav systems with spatially random uavs. IEEE Wireless Commun. Lett. 8 (2018), 564–567.
Ye, J., Zhang, C., Pan, G., Chen, Y., Ding, Z., 2018b. Secrecy analysis for spatially random uav systems. In: 2018 IEEE Globecom Workshops (GC Wkshps), IEEE. pp. 1–6.
Yin, C., Yan, L., Secure beamforming design for the uav-enabled transmission over noma networks. EURASIP J. Wireless Commun. Network. 2020 (2020), 1–11.
Yin, C., Yang, H., Xiao, P., Chu, Z., Garcia-Palacios, E., Resource allocation for uav-assisted wireless powered d2d networks with flying and ground eavesdropping. IEEE Commun. Lett., 2023.
Yin, Z., Jia, M., Cheng, N., Wang, W., Lyu, F., Guo, Q., Shen, X., Uav-assisted physical layer security in multi-beam satellite-enabled vehicle communications. IEEE Trans. Intell. Transp. Syst., 2021.
Yin, Z., Jia, M., Wang, W., Cheng, N., Lyu, F., Shen, X., Max-min secrecy rate for noma-based uav-assisted communications with protected zone. 2019 IEEE Global Communications Conference (GLOBECOM), 2019, IEEE, 1–6.
Yoo, S., Jeong, S., Kang, J., Hybrid uav-enabled secure offloading via deep reinforcement learning. IEEE Wireless Commun. Lett., 2023.
Yuan, Q.s., Hu, Y.j., Wang, C.l., Ma, X.l., 2019. 3d beamforming for improving the security of uav-enabled mobile relaying system. Radioengineering 28, 305.
Zeng, Y., Wu, Q., Zhang, R., Accessing from the sky: A tutorial on uav communications for 5g and beyond. Proc. IEEE 107 (2019), 2327–2375.
Zeng, Y., Wu, Q., Zhang, R., Accessing from the sky: A tutorial on uav communications for 5g and beyond. Proc. IEEE 107 (2019), 2327–2375.
Zhang, H., He, X., Dai, H., Secure uav communication networks via friendly jamming and bandwidth allocation, in. IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2020, IEEE, 894–899.
Zhang, R., Pang, X., Lu, W., Zhao, N., Chen, Y., Niyato, D., Dual-uav enabled secure data collection with propulsion limitation. IEEE Trans. Wireless Commun., 2021.
Zhang, S., Zhang, H., He, Q., Bian, K., Song, L., Joint trajectory and power optimization for uav relay networks. IEEE Commun. Lett. 22 (2017), 161–164.
Zhang, Y., Mou, Z., Gao, F., Jiang, J., Ding, R., Han, Z., Uav-enabled secure communications by multi-agent deep reinforcement learning. IEEE Trans. Veh. Technol. 69 (2020), 11599–11611.
Zhang, Y., Zhuang, Z., Gao, F., Wang, J., Han, Z., 2020c. Multi-agent deep reinforcement learning for secure uav communications. In: 2020 IEEE Wireless Communications and Networking Conference (WCNC), IEEE. pp. 1–5.
Zhang, Z., Zhang, Q., Miao, J., Yu, F.R., Fu, F., Du, J., Wu, T., Energy-efficient secure video streaming in uav-enabled wireless networks: A safe-dqn approach. IEEE Trans. Green Commun. Network., 2021.