Show simple item record

dc.contributor.authorFang Xu
dc.contributor.authorSajed Ahmad
dc.contributor.authorMuhammad Naveed khan
dc.contributor.authorManzoor Ahmed
dc.contributor.authorSalman Raza
dc.contributor.authorFeroz Khan
dc.contributor.authorYi Ma
dc.contributor.authorWali Ullah Khan
dc.contributor.otherSchool of Computer and Information Science, Hubei Engineering University, Xiaogan 432000, China; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan 432000, China
dc.contributor.otherThe College of Computer Science and Technology, Qingdao University, Qingdao 266071, China
dc.contributor.otherThe College of Computer Science and Technology, Qingdao University, Qingdao 266071, China
dc.contributor.otherSchool of Computer and Information Science, Hubei Engineering University, Xiaogan 432000, China; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan 432000, China; Corresponding author at: School of Computer and Information Science, Hubei Engineering University, Xiaogan 432000, China.
dc.contributor.otherDepartment of Computer Science, National Textile University, Faisalabad 37610, Pakistan
dc.contributor.otherBalochistan University of Information Technology Engineering & Management Sciences, Quetta 1800, Pakistan
dc.contributor.otherSchool of Computer and Information Science, Hubei Engineering University, Xiaogan 432000, China; Artificial Intelligence Industrial Technology Research Institute, Hubei Engineering University, Xiaogan 432000, China
dc.contributor.otherInterdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg, Luxembourg City L-1359, Luxembourg
dc.date.accessioned2025-10-09T05:32:57Z
dc.date.available2025-10-09T05:32:57Z
dc.date.issued01-09-2023
dc.identifier.urihttp://www.sciencedirect.com/science/article/pii/S1319157823002719
dc.identifier.urihttp://digilib.fisipol.ugm.ac.id/repo/handle/15717717/41154
dc.description.abstractUnmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses because of their high mobility and adaptable deployment capabilities in open spaces. They facilitate agile communications and ubiquitous connectivity. UAVs benefit from dominant line-of-sight communication links but are more susceptible to adversary eavesdropping attacks. Since upper-layer cryptography methods may be insufficient, physical-layer security (PLS) is an attractive alternative. PLS capitalizes on the inherent randomness of wireless channels to improve information confidentiality, particularly in UAV systems. This article provides a comprehensive overview of PLS in the context of UAV systems, examining various communication channels, including ground-to-air (G2A), ground-to-ground (G2G), air-to-ground (A2G), and air-to-air (A2A). First, we give a general review of UAV communications, emphasizing its functions as user equipment, base station (BS), and mobile relay. Following that, we provide an overview of PLS and its forms. The survey organizes the most advanced PLS techniques against passive wireless eavesdropping regarding the channels they are designed to protect. These schemes are further categorized into optimization and secrecy performance analysis. We examine technical aspects within each sub-category and classify core contributions based on approaches and objectives to improve secrecy performance. Moreover, we added summary tables of the identified schemes considering optimization and secrecy performance analysis domains for each category, providing an in-depth understanding of their technical aspects. In addition, we discuss open research issues and identify future research directions to address evolving threats and requirements in UAV communications to improve information confidentiality.
dc.language.isoEN
dc.publisherElsevier
dc.subject.lccElectronic computers. Computer science
dc.titleBeyond encryption: Exploring the potential of physical layer security in UAV networks
dc.typeArticle
dc.description.keywordsUAV communications
dc.description.keywordsPhysical layer security
dc.description.keywordsInformation confidentiality
dc.description.keywordsG2A
dc.description.keywordsG2G
dc.description.keywordsA2G
dc.description.doi10.1016/j.jksuci.2023.101717
dc.title.journalJournal of King Saud University: Computer and Information Sciences
dc.identifier.oaioai:doaj.org/journal:1c3a0d7161494cefb5bde078c54618cd
dc.journal.infoVolume 35, Issue 8


This item appears in the following Collection(s)

Show simple item record