A Machine Learning-Based Hybrid Approach for Safeguarding VLC-Enabled Drone Systems
This paper explores the physical layer security performance of collaborative drone fleets enabled by visible light communication (VLC) in a multi-eavesdropper scenario, where multiple drones leverage VLC to serve terrestrial users. To strengthen system security, we formulate a sum worst-case secrecy...
| Published in: | Drones |
|---|---|
| Main Authors: | Ge Shi, Hongyang Zhou, Huixin Wu, Fupeng Wei, Wei Cheng |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2025-10-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2504-446X/9/10/721 |
Similar Items
Cyber Attacks on Commercial Drones: A Review
by: Bruno Branco, et al.
Published: (2025-01-01)
by: Bruno Branco, et al.
Published: (2025-01-01)
Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
by: Vikas Sihag, et al.
Published: (2023-06-01)
by: Vikas Sihag, et al.
Published: (2023-06-01)
Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization
by: Mengqiu Chai, et al.
Published: (2025-03-01)
by: Mengqiu Chai, et al.
Published: (2025-03-01)
Resource Allocation for Secure UAV-Assisted SWIPT Systems
by: Xianggong Hong, et al.
Published: (2019-01-01)
by: Xianggong Hong, et al.
Published: (2019-01-01)
Blockchain-Enabled M2M Communications for UAV-Assisted Data Transmission
by: Abdulaziz Aldaej, et al.
Published: (2023-05-01)
by: Abdulaziz Aldaej, et al.
Published: (2023-05-01)
STRENGTHENING REGULATION OF UNMANNED AIRCRAFT (DRONE) THROUGH LAW
by: Mukhlis Al Huda
Published: (2021-05-01)
by: Mukhlis Al Huda
Published: (2021-05-01)
DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services
by: Mohamed Amine Ferrag, et al.
Published: (2019-08-01)
by: Mohamed Amine Ferrag, et al.
Published: (2019-08-01)
Secure and energy-efficient transmission in UAV-assisted intelligent reflecting surface networks
by: Jianbin Xue, et al.
Published: (2025-10-01)
by: Jianbin Xue, et al.
Published: (2025-10-01)
Deep reinforcement learning aided secure UAV communications in the presence of moving eavesdroppers
by: Gongchao Su, et al.
Published: (2024-04-01)
by: Gongchao Su, et al.
Published: (2024-04-01)
Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers
by: Lingfeng Shen, et al.
Published: (2025-05-01)
by: Lingfeng Shen, et al.
Published: (2025-05-01)
UAV-assisted NOMA secure communications: joint transmit power and trajectory optimization
by: Ruibo Han, et al.
Published: (2023-09-01)
by: Ruibo Han, et al.
Published: (2023-09-01)
THz-Enabled UAV Communications Under Pointing Errors: Tractable Statistical Channel Modeling and Security Analysis
by: Mohammad Javad Saber, et al.
Published: (2025-01-01)
by: Mohammad Javad Saber, et al.
Published: (2025-01-01)
A Q-Learning-Based Two-Layer Cooperative Intrusion Detection for Internet of Drones System
by: Moran Wu, et al.
Published: (2023-08-01)
by: Moran Wu, et al.
Published: (2023-08-01)
A Hybrid Optimization Framework for Dynamic Drone Networks: Integrating Genetic Algorithms with Reinforcement Learning
by: Mustafa Ulaş, et al.
Published: (2025-05-01)
by: Mustafa Ulaş, et al.
Published: (2025-05-01)
The Development of Drone Techology and its Regulation in the European Union
by: Szira Zoltán, et al.
Published: (2023-12-01)
by: Szira Zoltán, et al.
Published: (2023-12-01)
Drones in California research and extension
by: Maggi Kelly
Published: (2017-02-01)
by: Maggi Kelly
Published: (2017-02-01)
A Drone-Enabled Approach for Gas Leak Detection Using Optical Flow Analysis
by: Parham Nooralishahi, et al.
Published: (2021-02-01)
by: Parham Nooralishahi, et al.
Published: (2021-02-01)
Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems
by: Changjian Qin, et al.
Published: (2024-07-01)
by: Changjian Qin, et al.
Published: (2024-07-01)
Historicizing medical drones in Africa: a focus on Ghana
by: Самуэль Аду-Гьямфи, et al.
Published: (2021-06-01)
by: Самуэль Аду-Гьямфи, et al.
Published: (2021-06-01)
Security-driven service caching and computation offloading strategy in air-ground collaborative edge computing networks
by: WU Mengru, et al.
Published: (2025-07-01)
by: WU Mengru, et al.
Published: (2025-07-01)
AI-Driven Aerial Relay Placement and Power Allocation for Enhanced Secrecy in Untrusted UAV-Enabled Networks
by: Lefteris Tsipi, et al.
Published: (2025-01-01)
by: Lefteris Tsipi, et al.
Published: (2025-01-01)
A Comparative Analysis of the Legislation Evolution for Drone Use in OECD Countries
by: Nikolaos Tsiamis, et al.
Published: (2019-10-01)
by: Nikolaos Tsiamis, et al.
Published: (2019-10-01)
Design of Secure and Lightweight Authentication Scheme for UAV-Enabled Intelligent Transportation Systems Using Blockchain and PUF
by: Seunghwan Son, et al.
Published: (2023-01-01)
by: Seunghwan Son, et al.
Published: (2023-01-01)
Tree Branch Skeleton Extraction from Drone-Based Photogrammetric Point Cloud
by: Wenli Zhang, et al.
Published: (2023-01-01)
by: Wenli Zhang, et al.
Published: (2023-01-01)
Energy Efficient Deployment of VLC-Enabled UAV Using Particle Swarm Optimization
by: Hussam Ibraiwish, et al.
Published: (2024-01-01)
by: Hussam Ibraiwish, et al.
Published: (2024-01-01)
Current Status of the Use of Drones in Education in Croatia
by: Jelena Ćosić Lesičar, et al.
Published: (2021-03-01)
by: Jelena Ćosić Lesičar, et al.
Published: (2021-03-01)
Multi-Camera Networks for Coverage Control of Drones
by: Sunan Huang, et al.
Published: (2022-03-01)
by: Sunan Huang, et al.
Published: (2022-03-01)
Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies
by: Georgia Lykou, et al.
Published: (2020-06-01)
by: Georgia Lykou, et al.
Published: (2020-06-01)
A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones
by: Emmanouel T. Michailidis, et al.
Published: (2022-02-01)
by: Emmanouel T. Michailidis, et al.
Published: (2022-02-01)
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
by: Jung Hee Cheon, et al.
Published: (2018-01-01)
A Novel Cipher for Enhancing MAVLink Security: Design, Security Analysis, and Performance Evaluation Using a Drone Testbed
by: Bhavya Dixit, et al.
Published: (2025-01-01)
by: Bhavya Dixit, et al.
Published: (2025-01-01)
The Use of Drones in Spain: Towards a Platform for Controlling UAVs in Urban Environments
by: Pablo Chamoso, et al.
Published: (2018-05-01)
by: Pablo Chamoso, et al.
Published: (2018-05-01)
A Robot Operating System Framework for Secure UAV Communications
by: Hyojun Lee, et al.
Published: (2021-02-01)
by: Hyojun Lee, et al.
Published: (2021-02-01)
A GRASP Approach for the Energy-Minimizing Electric Vehicle Routing Problem with Drones
by: Nikolaos A. Kyriakakis, et al.
Published: (2023-12-01)
by: Nikolaos A. Kyriakakis, et al.
Published: (2023-12-01)
D3S: A Drone Security Scoring System
by: Bruno Branco, et al.
Published: (2024-12-01)
by: Bruno Branco, et al.
Published: (2024-12-01)
Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications
by: Amit Kumar Mishra, et al.
Published: (2023-08-01)
by: Amit Kumar Mishra, et al.
Published: (2023-08-01)
Key features and applications of military drones: a case study from the Portuguese military ground forces
by: João Pedro Barros, et al.
Published: (2024-12-01)
by: João Pedro Barros, et al.
Published: (2024-12-01)
Review of Biomimetic Approaches for Drones
by: Saori Tanaka, et al.
Published: (2022-10-01)
by: Saori Tanaka, et al.
Published: (2022-10-01)
Sensing-to-Sky Intermittent Connectivity Realization for LTE-Enabled Drone Platforms: Embedded Design, Measurement Study, and Positioning Applications
by: Junyoung Kim, et al.
Published: (2024-01-01)
by: Junyoung Kim, et al.
Published: (2024-01-01)
Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
by: Alanoud F. Aldweesh, et al.
Published: (2025-05-01)
by: Alanoud F. Aldweesh, et al.
Published: (2025-05-01)
Similar Items
-
Cyber Attacks on Commercial Drones: A Review
by: Bruno Branco, et al.
Published: (2025-01-01) -
Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
by: Vikas Sihag, et al.
Published: (2023-06-01) -
Enhancing Physical-Layer Security in UAV-Assisted Communications: A UAV-Mounted Reconfigurable Intelligent Surface Scheme for Secrecy Rate Optimization
by: Mengqiu Chai, et al.
Published: (2025-03-01) -
Resource Allocation for Secure UAV-Assisted SWIPT Systems
by: Xianggong Hong, et al.
Published: (2019-01-01) -
Blockchain-Enabled M2M Communications for UAV-Assisted Data Transmission
by: Abdulaziz Aldaej, et al.
Published: (2023-05-01)
