This paper studies the anti-jamming problem of unmanned aerial vehicle (UAV)-enabled Internet of Things (IoT) communication networks in the presence of a jammer under the accurate probabilistic line-of-sight (LoS) model. Our goal is to maximize the information collection throughput of the system under the assumption that only the jammer’s approximate location is known. To this end, we formulate a throughput maximization problem by optimizing the UAV trajectory, the IoT devices’ transmit power, and communication scheduling under the accurate real-time probabilistic LoS channel. However, the proposed optimization problem is non-convex and coupled, and hence intractable to be solved. In order to tackle the problem, a robust iterative algorithm...
In this paper, we study an Unmanned Aerial Vehicle (UAV) enabled Mobile Edge Computing (MEC) service...
In this paper, we consider a NarrowBand-Internet of Things (NB-IoT) network where an Unmanned Aerial...
International audienceIn this article, we investigate an unmanned aerial vehicle (UAV)-assisted Inte...
Due to the high maneuverability of unmanned aerial vehicles (UAVs), they have been widely deployed t...
The Internet of Things (IoT) aims to connect all things to the internet to facilitate intelligent id...
Abstract. In next generation wireless networks such as 5G and 6G, security is a key concern, for whi...
peer reviewedUnmanned aerial vehicle (UAV) communication hasemerged as a prominent technology f...
Abstract Non-Orthogonal Multiplex Access (NOMA) can be deployed in Unmanned Aerial Vehicle (UAV) net...
Unmanned aerial vehicles (UAVs) have recently attracted significant attention in a wide range of com...
In this paper, we discuss the security and reliability performance of a communication system, where ...
Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since man...
Employing unmanned aerial vehicles (UAVs) as aerial data collectors in Internet-of-Things (IoT) netw...
The age-of-information (AoI) is used to measure the freshness of the data. In IoT networks, the trad...
IEEE Unmanned aerial vehicles (UAVs) have been undergoing fast development for providing broader sig...
Abstract In this paper, we consider a NarrowBand-Internet of Things (NB-IoT) network where an Unman...
In this paper, we study an Unmanned Aerial Vehicle (UAV) enabled Mobile Edge Computing (MEC) service...
In this paper, we consider a NarrowBand-Internet of Things (NB-IoT) network where an Unmanned Aerial...
International audienceIn this article, we investigate an unmanned aerial vehicle (UAV)-assisted Inte...
Due to the high maneuverability of unmanned aerial vehicles (UAVs), they have been widely deployed t...
The Internet of Things (IoT) aims to connect all things to the internet to facilitate intelligent id...
Abstract. In next generation wireless networks such as 5G and 6G, security is a key concern, for whi...
peer reviewedUnmanned aerial vehicle (UAV) communication hasemerged as a prominent technology f...
Abstract Non-Orthogonal Multiplex Access (NOMA) can be deployed in Unmanned Aerial Vehicle (UAV) net...
Unmanned aerial vehicles (UAVs) have recently attracted significant attention in a wide range of com...
In this paper, we discuss the security and reliability performance of a communication system, where ...
Eavesdropping is a critical threat to the security of industrial Internet of things (IIoT) since man...
Employing unmanned aerial vehicles (UAVs) as aerial data collectors in Internet-of-Things (IoT) netw...
The age-of-information (AoI) is used to measure the freshness of the data. In IoT networks, the trad...
IEEE Unmanned aerial vehicles (UAVs) have been undergoing fast development for providing broader sig...
Abstract In this paper, we consider a NarrowBand-Internet of Things (NB-IoT) network where an Unman...
In this paper, we study an Unmanned Aerial Vehicle (UAV) enabled Mobile Edge Computing (MEC) service...
In this paper, we consider a NarrowBand-Internet of Things (NB-IoT) network where an Unmanned Aerial...
International audienceIn this article, we investigate an unmanned aerial vehicle (UAV)-assisted Inte...