Unmanned aerial vehicle (UAV) can be utilized as a relay to connect nodes with long distance, which can achieve significant throughput gain owing to its mobility and line-of-sight (LoS) channel with ground nodes. However, such LoS channels make UAV transmission easy to eavesdrop. In this paper, we propose a novel scheme to guarantee the security of UAV-relayed wireless networks with caching via jointly optimizing the UAV trajectory and time scheduling. For every two users that have cached the required file for the other, the UAV broadcasts the files together to these two users and the eavesdropping can be disrupted. For the users without caching, we maximize their minimum average secrecy rate by jointly optimizing the trajectory and schedul...
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless ne...
Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible ...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibil...
In this paper, we consider a wireless network setting where a base station (BS) employs a single unm...
Unmanned aerial vehicles (UAVs) are widely considered as key enablers for future wireless networks d...
Natural Science Foundation of Sichuan under Grant 2022NSFSC0887; Fundamental Research Funds for the ...
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search ...
Unmanned aerial vehicles (UAVs) can help smallcell base stations (SBSs) offload traffic via wireless...
Unmanned aerial vehicle (UAV) assisted wireless communications has recently been recognized as an in...
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless ne...
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission prot...
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information secu...
Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned ...
The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next...
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless ne...
Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible ...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...
Unmanned aerial vehicles (UAVs) have attracted considerable attention, thanks to their high flexibil...
In this paper, we consider a wireless network setting where a base station (BS) employs a single unm...
Unmanned aerial vehicles (UAVs) are widely considered as key enablers for future wireless networks d...
Natural Science Foundation of Sichuan under Grant 2022NSFSC0887; Fundamental Research Funds for the ...
Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search ...
Unmanned aerial vehicles (UAVs) can help smallcell base stations (SBSs) offload traffic via wireless...
Unmanned aerial vehicle (UAV) assisted wireless communications has recently been recognized as an in...
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless ne...
This paper proposes a novel cooperative secure unmanned aerial vehicle (UAV) aided transmission prot...
Although Unmanned Aerial Vehicles (UAVs) are capable of significantly improving the information secu...
Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned ...
The unmanned aerial vehicles (UAVs) are also known as drones. Recently, UAVs have attracted the next...
Unmanned aerial vehicle (UAV) assisted communication is a promising technique for future wireless ne...
Despite the wide utilization of unmanned aerial vehicles (UAVs), UAV communications are susceptible ...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...