{"id":"https://openalex.org/W4389104846","doi":"https://doi.org/10.1109/tvt.2023.3337154","title":"Improving Physical Layer Security for multi-UAV Systems Against Hybrid Wireless Attacks","display_name":"Improving Physical Layer Security for multi-UAV Systems Against Hybrid Wireless Attacks","publication_year":2023,"publication_date":"2023-11-28","ids":{"openalex":"https://openalex.org/W4389104846","doi":"https://doi.org/10.1109/tvt.2023.3337154"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2023.3337154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2023.3337154","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101464812","display_name":"Yichao Chen","orcid":"https://orcid.org/0000-0001-5725-1351"},"institutions":[{"id":"https://openalex.org/I4210110458","display_name":"Institute of Electronics","ror":"https://ror.org/01z143507","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210110458"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yichao Chen","raw_affiliation_strings":["Nanjing Research Institute of Electronic Engineering, Nanjing, China","Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, China","institution_ids":["https://openalex.org/I4210110458"]},{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I4210110458"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075545284","display_name":"Liu Guanbang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210110458","display_name":"Institute of Electronics","ror":"https://ror.org/01z143507","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210110458"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guanbang Liu","raw_affiliation_strings":["Nanjing Research Institute of Electronic Engineering, Nanjing, China","Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, China","institution_ids":["https://openalex.org/I4210110458"]},{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I4210110458"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390213","display_name":"Zhen Zhang","orcid":"https://orcid.org/0000-0003-4698-8125"},"institutions":[{"id":"https://openalex.org/I4210110458","display_name":"Institute of Electronics","ror":"https://ror.org/01z143507","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210110458"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Zhang","raw_affiliation_strings":["Nanjing Research Institute of Electronic Engineering, Nanjing, China","Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, China","institution_ids":["https://openalex.org/I4210110458"]},{"raw_affiliation_string":"Nanjing Research Institute of Electronic Engineering, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I4210110458"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011397784","display_name":"Lidong He","orcid":"https://orcid.org/0000-0001-7432-7223"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lidong He","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China","School of Automation, Nanjing University of Science and Technology, Nanjing, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]},{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068195118","display_name":"Shibo He","orcid":"https://orcid.org/0000-0002-1505-6766"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shibo He","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]},{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, College of Control Science and Engineering, Zhejiang University, Hangzhou, Zhejiang, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101464812"],"corresponding_institution_ids":["https://openalex.org/I4210110458"],"apc_list":null,"apc_paid":null,"fwci":8.8406,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.97530379,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"73","issue":"5","first_page":"7034","last_page":"7048"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8495010137557983},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.836564302444458},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.820331335067749},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.707390308380127},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6687072515487671},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5826935172080994},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5295751094818115},{"id":"https://openalex.org/keywords/non-line-of-sight-propagation","display_name":"Non-line-of-sight propagation","score":0.49239909648895264},{"id":"https://openalex.org/keywords/nakagami-distribution","display_name":"Nakagami distribution","score":0.45726972818374634},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.42321592569351196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4188656806945801},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.4178803265094757},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.37385642528533936},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3087753653526306},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.23670056462287903}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8495010137557983},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.836564302444458},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.820331335067749},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.707390308380127},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6687072515487671},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5826935172080994},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5295751094818115},{"id":"https://openalex.org/C154910267","wikidata":"https://www.wikidata.org/wiki/Q1740982","display_name":"Non-line-of-sight propagation","level":3,"score":0.49239909648895264},{"id":"https://openalex.org/C115098869","wikidata":"https://www.wikidata.org/wiki/Q3258347","display_name":"Nakagami distribution","level":4,"score":0.45726972818374634},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.42321592569351196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4188656806945801},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.4178803265094757},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.37385642528533936},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3087753653526306},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.23670056462287903},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2023.3337154","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2023.3337154","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5199999809265137,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7418535098","display_name":null,"funder_award_id":"61973163","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8022898299","display_name":null,"funder_award_id":"U1909207","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1957358593","https://openalex.org/W2031834036","https://openalex.org/W2102654676","https://openalex.org/W2156759922","https://openalex.org/W2268751503","https://openalex.org/W2289204537","https://openalex.org/W2500682881","https://openalex.org/W2601260651","https://openalex.org/W2612291478","https://openalex.org/W2890006332","https://openalex.org/W2901756368","https://openalex.org/W2907860850","https://openalex.org/W2914952404","https://openalex.org/W2932145029","https://openalex.org/W2963385432","https://openalex.org/W2964279222","https://openalex.org/W2969275160","https://openalex.org/W2981262799","https://openalex.org/W2981876784","https://openalex.org/W2982185286","https://openalex.org/W2985719595","https://openalex.org/W2991165022","https://openalex.org/W3015520783","https://openalex.org/W3019060914","https://openalex.org/W3031308674","https://openalex.org/W3050374582","https://openalex.org/W3099255444","https://openalex.org/W3105108969","https://openalex.org/W3112253059","https://openalex.org/W3126347950","https://openalex.org/W3134853632","https://openalex.org/W3156256618","https://openalex.org/W3158062434","https://openalex.org/W3166744561","https://openalex.org/W3188481277","https://openalex.org/W4205336239","https://openalex.org/W4205960603","https://openalex.org/W4210776415","https://openalex.org/W4220663263","https://openalex.org/W4220877892","https://openalex.org/W4225817403","https://openalex.org/W4226057460","https://openalex.org/W4249365614","https://openalex.org/W4250589301","https://openalex.org/W4293775970","https://openalex.org/W4312687534","https://openalex.org/W6631190155"],"related_works":["https://openalex.org/W2766147019","https://openalex.org/W2559313803","https://openalex.org/W4285190504","https://openalex.org/W2807940755","https://openalex.org/W2186145314","https://openalex.org/W4283217267","https://openalex.org/W2508148458","https://openalex.org/W2979883059","https://openalex.org/W4224990296","https://openalex.org/W4388911899"],"abstract_inverted_index":{"Multiple":[0],"unmanned":[1],"aerial":[2,111],"vehicle":[3],"(UAV)":[4],"systems":[5,70],"are":[6],"increasingly":[7],"used":[8],"in":[9,68],"civilian":[10],"and":[11,19,27,33,43,55,90,112,123,151,153,160,178,195,202,231],"military":[12],"applications.":[13],"However,":[14],"due":[15],"to":[16,40,97,133],"the":[17,25,62,105,119,142,155,161,173,214,217],"open":[18],"broadcast":[20],"nature":[21],"of":[22,107,157,189,216],"wireless":[23,49,108],"communications,":[24],"control":[26,35,46,65,99,190],"non-payload":[28],"communication":[29],"(CNPC)":[30],"between":[31,175],"UAVs":[32,96],"ground":[34],"stations":[36],"(GCSs)":[37],"is":[38],"vulnerable":[39],"physical":[41,73,227],"(PHY)":[42],"medium":[44],"access":[45],"(MAC)":[47],"layer":[48,74],"attacks,":[50],"such":[51],"as":[52],"eavesdropping,":[53,149],"jamming,":[54],"spoofing.":[56],"In":[57],"this":[58],"paper,":[59],"we":[60,116,185,212],"investigate":[61],"secure":[63,81],"remote":[64],"(RC)":[66],"issue":[67],"multi-UAV":[69],"from":[71,95,101,110],"a":[72,80,124,221],"security":[75,232],"(PLS)":[76],"perspective.":[77],"We":[78,139],"propose":[79,186],"RC":[82],"mechanism":[83,219],"based":[84,165],"on":[85,166],"John":[86],"Boyd's":[87],"OODA":[88],"loop":[89],"introduce":[91,118],"cooperative":[92],"jamming":[93,150],"(CJ)":[94],"safeguard":[98],"data":[100],"GCS.":[102],"To":[103,171],"quantify":[104],"uncertainty":[106],"attacks":[109,146],"terrestrial":[113],"potential":[114],"attackers,":[115],"first":[117],"Nakagami-m":[120],"fading":[121],"model":[122,132],"mixed":[125],"line-of-sight":[126],"(LoS)":[127],"/":[128],"non-line-of-sight":[129],"(NLoS)":[130],"probability":[131,169],"characterize":[134],"hostile":[135],"air-to-ground":[136],"(A2G)":[137],"channels.":[138],"then":[140],"derive":[141],"conditions":[143],"for":[144,182],"successful":[145],"including":[147],"passive/active":[148],"spoofing,":[152],"formulate":[154],"risks":[156],"each":[158],"attack":[159],"overall":[162],"CJ":[163,179],"efficiency":[164],"secrecy":[167],"outage":[168],"(SOP).":[170],"optimize":[172],"trade-off":[174],"risk":[176],"costs":[177],"power":[180],"consumption":[181],"various":[183],"situations,":[184],"three":[187,204],"levels":[188],"schemes":[191],"(centralized,":[192],"partially":[193],"centralized,":[194],"distributed)":[196],"applicable":[197],"at":[198],"GCS":[199],"or":[200],"UAVs,":[201],"design":[203],"decision-making":[205],"methods":[206],"with":[207],"differing":[208],"complexities.":[209],"Through":[210],"simulations,":[211],"evaluate":[213],"performance":[215],"proposed":[218],"under":[220],"general":[222],"scenario":[223],"that":[224],"provides":[225],"diverse":[226],"conditions,":[228],"threat":[229],"levels,":[230],"requirements.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
