Safeguarding wireless network with UAVs: A physical layer security perspective
Integrating unmanned aerial vehicles (UAVs) into future wireless systems such as the fifth-
generation cellular network is anticipated to bring significant benefits for both the UAV and …
generation cellular network is anticipated to bring significant benefits for both the UAV and …
5G device-to-device communication security and multipath routing solutions
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …
throughput, enhance the coverage, and reduce the power consumption of cellular …
Joint communication and control for wireless autonomous vehicular platoon systems
Autonomous vehicular platoons will play an important role in improving on-road safety in
tomorrow's smart cities. Vehicles in an autonomous platoon can exploit vehicle-to-vehicle …
tomorrow's smart cities. Vehicles in an autonomous platoon can exploit vehicle-to-vehicle …
Engineering radio maps for wireless resource management
The term'radio map'in general refers to the geographical signal power spectrum density,
formed by the superposition of concurrent wireless transmissions, as a function of location …
formed by the superposition of concurrent wireless transmissions, as a function of location …
Proactive eavesdropping via cognitive jamming in fading channels
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …
legitimately monitor suspicious communication links for preventing intended crimes and …
Energy efficient legitimate wireless surveillance of UAV communications
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …
Cell-free massive MIMO surveillance of multiple untrusted communication links
A cell-free massive multiple-input-multiple-output (CF-mMIMO) system is considered for
enhancing the monitoring performance of wireless surveillance, where a large number of …
enhancing the monitoring performance of wireless surveillance, where a large number of …
Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength
D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …
Shannon's coding theorem is not applicable for short packet communications, and the …
Proactive eavesdropping in UAV-aided suspicious communication systems
This paper considers a new wireless information surveillance scenario, where a legitimate
monitor tries to eavesdrop on the suspicious messages sent by an unmanned aerial vehicle …
monitor tries to eavesdrop on the suspicious messages sent by an unmanned aerial vehicle …
Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems
Thanks to their quick placement and high flexibility, unmanned aerial vehicles (UAVs) can
be very useful in the current and future wireless communication systems. With a growing …
be very useful in the current and future wireless communication systems. With a growing …