Safeguarding wireless network with UAVs: A physical layer security perspective

Q Wu, W Mei, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
Integrating unmanned aerial vehicles (UAVs) into future wireless systems such as the fifth-
generation cellular network is anticipated to bring significant benefits for both the UAV and …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

Joint communication and control for wireless autonomous vehicular platoon systems

T Zeng, O Semiari, W Saad… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Autonomous vehicular platoons will play an important role in improving on-road safety in
tomorrow's smart cities. Vehicles in an autonomous platoon can exploit vehicle-to-vehicle …

Engineering radio maps for wireless resource management

S Bi, J Lyu, Z Ding, R Zhang - IEEE Wireless Communications, 2019 - ieeexplore.ieee.org
The term'radio map'in general refers to the geographical signal power spectrum density,
formed by the superposition of concurrent wireless transmissions, as a function of location …

Proactive eavesdropping via cognitive jamming in fading channels

J Xu, L Duan, R Zhang - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
To enhance the national security, there is a growing need for authorized parties to
legitimately monitor suspicious communication links for preventing intended crimes and …

Energy efficient legitimate wireless surveillance of UAV communications

K Li, RC Voicu, SS Kanhere, W Ni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and
military applications. Criminals or terrorists can potentially use UAVs for committing crimes …

Cell-free massive MIMO surveillance of multiple untrusted communication links

Z Mobini, HQ Ngo, M Matthaiou… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
A cell-free massive multiple-input-multiple-output (CF-mMIMO) system is considered for
enhancing the monitoring performance of wireless surveillance, where a large number of …

Proactive eavesdropping via jamming over short packet suspicious communications with finite blocklength

D Xu, H Zhu - IEEE Transactions on Communications, 2022 - ieeexplore.ieee.org
Short packet communications play key roles in the Internet-of-Things. Conventional
Shannon's coding theorem is not applicable for short packet communications, and the …

Proactive eavesdropping in UAV-aided suspicious communication systems

H Lu, H Zhang, H Dai, W Wu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper considers a new wireless information surveillance scenario, where a legitimate
monitor tries to eavesdrop on the suspicious messages sent by an unmanned aerial vehicle …

Energy management and trajectory optimization for UAV-enabled legitimate monitoring systems

S Hu, Q Wu, X Wang - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
Thanks to their quick placement and high flexibility, unmanned aerial vehicles (UAVs) can
be very useful in the current and future wireless communication systems. With a growing …