2022
DOI: 10.23919/jcc.2022.09.007
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer security for UAV communications: A comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The authors discussed the various practical aspects of UAV cellular communications, including standardization, regulation, challenges of integrating UAVs into existing cellular networks, the need for new protocols and standards, and the potential security risks associated with UAV cellular communications. In [7], the authors conducted an extensive survey of the current advancements in UAV-physical layer security (PLS), covering fundamental concepts, static and mobile deployment scenarios, air-to-ground (A2G) channels, and various UAV roles. They reviewed secrecy performance analysis and enhancement techniques for static UAV systems and scenarios involving UAV mobility.…”
Section: A Recent Relevant Review Articlesmentioning
confidence: 99%
“…The authors discussed the various practical aspects of UAV cellular communications, including standardization, regulation, challenges of integrating UAVs into existing cellular networks, the need for new protocols and standards, and the potential security risks associated with UAV cellular communications. In [7], the authors conducted an extensive survey of the current advancements in UAV-physical layer security (PLS), covering fundamental concepts, static and mobile deployment scenarios, air-to-ground (A2G) channels, and various UAV roles. They reviewed secrecy performance analysis and enhancement techniques for static UAV systems and scenarios involving UAV mobility.…”
Section: A Recent Relevant Review Articlesmentioning
confidence: 99%
“…These schemes effectively utilize UAV mobility to enhance communication security. However, physical layer-based security schemes primarily serve as a supplement to traditional cryptography-based security protection schemes [10]. Such schemes cannot guarantee the integrity of the transmitted information or the legitimacy of both communication parties' identities.…”
Section: Reference Reviewmentioning
confidence: 99%
“…Step 2-5: Control station uses impkey as key to encrypt sesskey to generate enckey according to algorithm. Calculation method of enckey follows Formula (10). enckey = enc(impkey, sesskey)…”
Section: Protocol Execution Processmentioning
confidence: 99%
“…As a planar antenna array (PAA), VAA has the ability to transmit narrow beams, which can help to obtain a higher gain beam pattern and generate lower sidelobe level (SLL) 4 . In addition, since it has the advantage of invariant and symmetrical beam pattern and flexible array synthesis, VAA has been widely studied and applied.…”
Section: Introductionmentioning
confidence: 99%