2023
DOI: 10.1109/jiot.2023.3262697
|View full text |Cite
|
Sign up to set email alerts
|

Joint Trajectory Design and User Scheduling for Secure Aerial Underlay IoT Systems

Abstract: Unmanned aerial vehicles (UAVs) have been widely employed to enhance the end-to-end performance of wireless communications since the links between UAVs and terrestrial nodes are line-of-sight (LoS) with high probability. However, the broadcast characteristics of signal propagation in LoS links make them vulnerable to being wiretapped by malicious eavesdroppers, which poses a considerable challenge to the security of wireless communications. In this work, we investigate the security of aerial underlay Internet … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 41 publications
(64 reference statements)
0
5
0
Order By: Relevance
“…While the aforementioned works that considered the case where the UAV is used as a mobile relay or BS, [8][9][10][11][12][13][14][15][16][17][19][20][21][22][23] the works of Li et al [24][25][26][27] regarded the UAV as a mobile and friendly jammer to enhance the PL security by injecting the jamming signals over wiretap channels, which is also a promising application direction of UAVs. Specially, the work of Li et al 24 considered the case where two UAVs transmit confidential messages to their special ground destinations in the presence of a ground Eve.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…While the aforementioned works that considered the case where the UAV is used as a mobile relay or BS, [8][9][10][11][12][13][14][15][16][17][19][20][21][22][23] the works of Li et al [24][25][26][27] regarded the UAV as a mobile and friendly jammer to enhance the PL security by injecting the jamming signals over wiretap channels, which is also a promising application direction of UAVs. Specially, the work of Li et al 24 considered the case where two UAVs transmit confidential messages to their special ground destinations in the presence of a ground Eve.…”
Section: Related Workmentioning
confidence: 99%
“…This work introduced an improvement scheme of PL security because the two UAVs inherently act as mutually cooperative jammers for each other. However, the EE was not exploited in the work of Li et al 24 The dual-UAV system was also investigated in the work of Lei et al 25 The difference from the work of Li et al 24 is that the work of Lei et al 25 considered an aerial IoT system under underlay CR. Therefore, by considering the interference temperature at primary receiver, the work of Lei et al obtained the optimal UAV trajectory and user scheduling scheme.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations