IEEE/CAA Journal of Automatica Sinica
Citation: | H. Zhang, J. W. Sun, X. Wang, and C. L. Gong, “Achieving physical layer security against location unknown eavesdroppers via friendly jammer,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 10, pp. 2038–2040, Oct. 2023. doi: 10.1109/JAS.2023.123258 |
[1] |
J. Chen, J. Sun, and G. Wang, “From unmanned systems to autonomous intelligent systems,” Engineering, vol. 12, pp. 16–19, 2022. doi: 10.1016/j.eng.2021.10.007
|
[2] |
Z. Zuo, C. Liu, Q.-L. Han, and J. Song, “Unmanned aerial vehicles: Control methods and future challenges,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 4, pp. 601–614, 2022. doi: 10.1109/JAS.2022.105410
|
[3] |
H. Zhang and W. X. Zheng, “Denial-of-service power dispatch against linear quadratic control via a fading channel,” IEEE Trans. Autom. Control, vol. 63, no. 9, pp. 3032–3039, 2018. doi: 10.1109/TAC.2018.2789479
|
[4] |
H. Zhang, Y. Qi, J. Wu, L. Fu, and L. He, “DoS attack energy management against remote state estimation,” IEEE Trans. Control Netw. Syst., vol. 5, no. 1, pp. 383–394, 2018. doi: 10.1109/TCNS.2016.2614099
|
[5] |
M. Liu, C. Zhao, Z. Zhang, R. Deng, P. Cheng, and J. Chen, “Converter-based moving target defense against deception attacks in DC microgrids,” IEEE Trans. Smart Grid, vol. 13, pp. 3984–3996, 2021.
|
[6] |
Y. Zhu, H. Zhang, H. Li, J. Zhang, and D. Zhang, “Optimal jamming strategy against two-state switched system,” IEEE Commun. Lett., vol. 26, no. 3, pp. 706–710, 2022. doi: 10.1109/LCOMM.2022.3142080
|
[7] |
J. Wang, C. Jiang, Z. Han, Y. Ren, R. G. Maunder, and L. Hanzo, “Taking drones to the next level: Cooperative distributed unmanned-aerial-vehicular networks for small and mini drones,” IEEE Veh. Technol. Mag., vol. 12, no. 3, pp. 73–82, 2017. doi: 10.1109/MVT.2016.2645481
|
[8] |
H. Tran and C. So-In, “Enhanced intrusion detection system for an EH IoT architecture using a cooperative UAV relay and friendly UAV jammer,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 11, pp. 1786–1799, 2021. doi: 10.1109/JAS.2021.1004171
|
[9] |
H. El Hammouti, D. Hamza, B. Shihada, M.-S. Alouini, and J. S. Shamma, “The optimal and the greedy: Drone association and positioning schemes for internet of UAVs,” IEEE Internet Things J., vol. 8, no. 18, pp. 14066–14079, 2021. doi: 10.1109/JIOT.2021.3070209
|
[10] |
Y. Zhou, P. L. Yeoh, H. Chen, Y. Li, R. Schober, L. Zhuo, and B. Vucetic, “Improving physical layer security via a UAV friendly jammer for unknown eavesdropper location,” IEEE Trans. Veh. Technol., vol. 67, no. 11, pp. 11280–11284, 2018. doi: 10.1109/TVT.2018.2868944
|
[11] |
X. Zhou, Q. Wu, S. Yan, F. Shu, and J. Li, “UAV-enabled secure communications: Joint trajectory and transmit power optimization,” IEEE Trans. Veh. Technol., vol. 68, no. 4, pp. 4069–4073, 2019. doi: 10.1109/TVT.2019.2900157
|
[12] |
A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal lap altitude for maximum coverage,” IEEE Wireless Commun. Lett., vol. 3, no. 6, pp. 569–572, 2014. doi: 10.1109/LWC.2014.2342736
|