Safeguarding UAV IoT Communication Systems Against Randomly Located Eavesdroppers
暂无分享,去创建一个
Mohamed-Slim Alouini | Imran Shafique Ansari | Di Wang | Hongjiang Lei | Jing Jiang | Gaofeng Pan | Ki-Hong Park | I. S. Ansari | Mohamed-Slim Alouini | Hongjiang Lei | Gaofeng Pan | Kihong Park | Jing Jiang | Diquan Wang
[1] Xianwei Zhou,et al. Resource Allocation in Unmanned Aerial Vehicle (UAV)-Assisted Wireless-Powered Internet of Things , 2019, Sensors.
[2] Julian Cheng,et al. Asymptotic Error Rate Analysis of Selection Combining on Generalized Correlated Nakagami-m Channels , 2012, IEEE Transactions on Communications.
[3] Victor Adamchik,et al. The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system , 1990, ISSAC '90.
[4] Halim Yanikomeroglu,et al. Efficient 3-D placement of an aerial base station in next generation cellular networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[5] M. Abramowitz,et al. Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .
[6] Sofie Pollin,et al. Ultra Reliable UAV Communication Using Altitude and Cooperation Diversity , 2017, IEEE Transactions on Communications.
[7] He Chen,et al. Improving Physical Layer Security via a UAV Friendly Jammer for Unknown Eavesdropper Location , 2018, IEEE Transactions on Vehicular Technology.
[8] Feng Lyu,et al. 3D Multi-Drone-Cell Trajectory Design for Efficient IoT Data Collection , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[9] Jie Yang,et al. DSF-NOMA: UAV-Assisted Emergency Communication Technology in a Heterogeneous Internet of Things , 2019, IEEE Internet of Things Journal.
[10] Qihui Wu,et al. An Amateur Drone Surveillance System Based on the Cognitive Internet of Things , 2017, IEEE Communications Magazine.
[11] Tarik Taleb,et al. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.
[12] M. Cenk Gursoy,et al. Downlink Analysis in Unmanned Aerial Vehicle (UAV) Assisted Cellular Networks With Clustered Users , 2018, IEEE Access.
[13] Mohamed-Slim Alouini,et al. Digital Communication Over Fading Channels: A Unified Approach to Performance Analysis , 2000 .
[14] Salman Durrani,et al. Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments , 2018, IEEE Internet of Things Journal.
[15] Zhiguo Ding,et al. Secure UAV-to-UAV Systems With Spatially Random UAVs , 2019, IEEE Wireless Communications Letters.
[16] Xiao Liu,et al. Optimizing Trajectory of Unmanned Aerial Vehicles for Efficient Data Acquisition: A Matrix Completion Approach , 2019, IEEE Internet of Things Journal.
[17] Yue Chen,et al. Multiple Antenna Aided NOMA in UAV Networks: A Stochastic Geometry Approach , 2018, IEEE Transactions on Communications.
[18] Jing Huang,et al. Secure Transmission With Antenna Selection in MIMO Nakagami- $m$ Fading Channels , 2014, IEEE Transactions on Wireless Communications.
[19] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[20] Inkyu Lee,et al. UAV-Aided Secure Communications With Cooperative Jamming , 2018, IEEE Transactions on Vehicular Technology.
[21] Jun Zhang,et al. Joint Beamforming and Power Allocation for UAV-Enabled Full-Duplex Relay , 2019, IEEE Transactions on Vehicular Technology.
[22] Harpreet S. Dhillon,et al. Downlink Coverage Analysis for a Finite 3-D Wireless Network of Unmanned Aerial Vehicles , 2017, IEEE Transactions on Communications.
[23] Lingyang Song,et al. UAV Offloading: Spectrum Trading Contract Design for UAV Assisted 5G Networks , 2017, ArXiv.
[24] Justin P. Coon,et al. Secrecy Performance Analysis of Wireless Communications in the Presence of UAV Jammer and Randomly Located UAV Eavesdroppers , 2019, IEEE Transactions on Information Forensics and Security.
[25] Zhi Chen,et al. Joint Power and Trajectory Design for Physical-Layer Secrecy in the UAV-Aided Mobile Relaying System , 2018, IEEE Access.
[26] Justin P. Coon,et al. Secrecy Outage Analysis for Downlink Transmissions in the Presence of Randomly Located Eavesdroppers , 2017, IEEE Transactions on Information Forensics and Security.
[27] Hui-Ming Wang,et al. Combating the Control Signal Spoofing Attack in UAV Systems , 2018, IEEE Transactions on Vehicular Technology.
[28] Qingqing Wu,et al. UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel , 2018, IEEE Wireless Communications Letters.
[29] Simon L. Cotton,et al. Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications , 2015, IEEE Trans. Commun..
[30] Geoffrey Ye Li,et al. Dual-UAV-Enabled Secure Communications: Joint Trajectory Design and User Scheduling , 2018, IEEE Journal on Selected Areas in Communications.
[31] Rui Zhang,et al. Network-Connected UAV: 3-D System Modeling and Coverage Performance Analysis , 2019, IEEE Internet of Things Journal.
[32] Derrick Wing Kwan Ng,et al. Robust Trajectory and Transmit Power Design for Secure UAV Communications , 2018, IEEE Transactions on Vehicular Technology.
[33] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[34] Qinghe Du,et al. A Review of Physical Layer Security Techniques for Internet of Things: Challenges and Solutions , 2018, Entropy.
[35] Musaed Alhussein,et al. Joint Placement and Device Association of UAV Base Stations in IoT Networks , 2019, Sensors.
[36] Kandeepan Sithamparanathan,et al. Optimal LAP Altitude for Maximum Coverage , 2014, IEEE Wireless Communications Letters.
[37] Ning Zhang,et al. RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks , 2019, IEEE Internet of Things Journal.
[38] Mohamed-Slim Alouini,et al. Joint Trajectory and Precoding Optimization for UAV-Assisted NOMA Networks , 2019, IEEE Transactions on Communications.
[39] Tony Q. S. Quek,et al. Safeguarding UAV Communications Against Full-Duplex Active Eavesdropper , 2019, IEEE Transactions on Wireless Communications.
[40] Jia-Cheng Jiang,et al. UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions , 2019, IEEE Wireless Communications.
[41] Anh T. Pham,et al. Mixed mmWave RF/FSO Relaying Systems Over Generalized Fading Channels With Pointing Errors , 2017, IEEE Photonics Journal.
[42] Thomas Lagkas,et al. UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things” , 2018, Sensors.
[43] Walid Saad,et al. Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs , 2015, IEEE Transactions on Wireless Communications.
[44] Rui Zhang,et al. Cellular-Connected UAV: Potential, Challenges, and Promising Technologies , 2018, IEEE Wireless Communications.
[45] Gan Zheng,et al. Secrecy Rate Analysis of UAV-Enabled mmWave Networks Using Matérn Hardcore Point Processes , 2018, IEEE Journal on Selected Areas in Communications.
[46] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[47] I. S. Ansari,et al. Secrecy Capacity Analysis Over $\alpha - \mu $ Fading Channels , 2017, IEEE Communications Letters.
[48] Jianhua Lu,et al. UAV-Aided MIMO Communications for 5G Internet of Things , 2019, IEEE Internet of Things Journal.