sensors-logo

Journal Browser

Journal Browser

UAV Secure Communication for IoT Applications

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 October 2025 | Viewed by 4636

Special Issue Editors


E-Mail Website
Guest Editor
School of Electronics and Information, Northwestern Polytechnical University, Xi'an 710072, China
Interests: cognitive radio; IoT; security; NOMA

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) stands at the forefront of technological progress, poised to become the backbone of future 6G networks. The IoT has the potential to enable ubiquitous connectivity and intelligence, thus orchestrating a harmonious and efficient future society. As billions of IoT devices interweave various applications, there is an expectation of massive data to be collected, transmitted, and further interpreted. In this respect, IoT data communication security is fundamental and thus of paramount importance. However, the evident vulnerability of IoT devices and networks exposes them to various security threats that jeopardize information secrecy, service continuity, personal privacy, and even infrastructure operations.

In this landscape, unmanned aerial vehicles (UAVs) present a transformative dimension in effective IoT data acquisition and dissemination. With unparalleled mobility and accessibility, UAVs traverse diverse landscapes, reaching remote areas and offering geographic advantages for attack detection and mitigation. The synergy between UAVs and IoT also provides new opportunities for security provisioning. As UAVs can conveniently approach the vicinity of IoT nodes, the geographic advantages can be effectively exploited for attack detection and mitigation, enabling resource-efficient security design. Particularly, with UAV-facilitated IoT communication, the channel advantage can be reconstructed and enhanced at the physical layer towards improved secrecy. Moreover, the broader security paradigms can also be extended with UAVs to guarantee data integrity and privacy through schemes such as the joint design of UAVs and blockchains. Therefore, by integrating UAVs into the security infrastructure, we transcend the limitations of traditional approaches, embracing a proactive and adaptive framework and strategies towards security-enhanced IoT communications.

This Special Issue aims to advance discussions on UAV-facilitated secure IoT communications. We invite submissions exploring multifaceted security concerns, and encompassing authentication, secrecy, privacy, and trust. Serving as a platform to unravel the interplay between UAVs, sensors, and evolving security paradigms, this Special Issue steers the discourse towards a future with secure and resilient IoT systems. We encourage submissions from researchers and practitioners on a wide range of topics, including but not limited to the following:

  • UAV-facilitated physical layer security for IoT communications;
  • UAV-facilitated anti-jamming communications for IoT;
  • UAV-facilitated blockchain system design for IoT;
  • Interference management in UAV-facilitated IoT communications;
  • Cross-layer security optimization in UAV-facilitated IoT communications;
  • Security protocols for UAV-facilitated IoT communications;
  • Machine learning in UAV-facilitated secure IoT communications;
  • Techno-economic analysis of UAV-facilitated secure IoT communications;
  • Prototype and testbed implementation for UAV-facilitated secure IoT communications.

Dr. Xiao Tang
Dr. Wei Liang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • UAV
  • IoT communications
  • security protocols

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 688 KiB  
Article
Delay Minimization for BAC-NOMA Offloading in UAV Networks
by Haodong Li, Zhengkai Yin and Changsheng Chen
Sensors 2025, 25(1), 84; https://doi.org/10.3390/s25010084 - 26 Dec 2024
Viewed by 648
Abstract
The rapid deployment and enhanced communication capabilities of unmanned aerial vehicles (UAVs) have enabled numerous real-time sensing applications. These scenarios often necessitate task offloading and execution under stringent transmission delay constraints, particularly for time-critical applications such as disaster rescue and environmental monitoring. This [...] Read more.
The rapid deployment and enhanced communication capabilities of unmanned aerial vehicles (UAVs) have enabled numerous real-time sensing applications. These scenarios often necessitate task offloading and execution under stringent transmission delay constraints, particularly for time-critical applications such as disaster rescue and environmental monitoring. This paper investigates the improvement of MEC-based task offloading services in energy-constrained UAV networks using backscatter communication (BackCom) with non-orthogonal multiple access (BAC-NOMA). The proposed BAC-NOMA protocol allows uplink UAVs to utilize downlink signals for backscattering tasks instead of transmitting through uplink NOMA. A resource allocation problem is formulated, aimed at minimizing offloading delays for uplink users. By converting the initially non-convex problem into a convex one, an iterative algorithm is developed to solve it. Simulation results demonstrate that the proposed protocol significantly reduces offloading delays relative to existing benchmarks. Full article
(This article belongs to the Special Issue UAV Secure Communication for IoT Applications)
Show Figures

Figure 1

22 pages, 894 KiB  
Article
Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof
by Athanasios Koulianos, Panagiotis Paraskevopoulos, Antonios Litke and Nikolaos K. Papadakis
Sensors 2024, 24(17), 5838; https://doi.org/10.3390/s24175838 - 8 Sep 2024
Cited by 2 | Viewed by 2404
Abstract
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public [...] Read more.
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We generated zk-SNARK proofs using the Zokrates tool on a Raspberry Pi, simulating a drone environment, and analyzed power consumption and CPU utilization. The results are promising, especially in the case of larger drones with higher battery capacities. Ethereum was chosen as the public blockchain platform, with smart contracts developed in Solidity and tested on the Sepolia testnet using Remix IDE. This novel proposed approach paves the way for a new path of research in the UAV area. Full article
(This article belongs to the Special Issue UAV Secure Communication for IoT Applications)
Show Figures

Figure 1

29 pages, 9197 KiB  
Article
An Adaptive 3D Neighbor Discovery and Tracking Algorithm in Battlefield Flying Ad Hoc Networks with Directional Antennas
by Yunjie Yuan, Gongye Ren, Xingyu Cai and Xuguang Li
Sensors 2024, 24(17), 5655; https://doi.org/10.3390/s24175655 - 30 Aug 2024
Cited by 1 | Viewed by 944
Abstract
Neighbor discovery and tracking with directional antennas in flying ad hoc networks (FANETs) is a challenging issue because of dispersed node distribution and irregular maneuvers in three-dimensional (3D) space. In this paper, we propose an adaptive 3D neighbor discovery and tracking algorithm in [...] Read more.
Neighbor discovery and tracking with directional antennas in flying ad hoc networks (FANETs) is a challenging issue because of dispersed node distribution and irregular maneuvers in three-dimensional (3D) space. In this paper, we propose an adaptive 3D neighbor discovery and tracking algorithm in battlefield FANETs with directional antennas. With time synchronization, a flying node transmits/receives the neighbor discovery packets sequentially in each beam around it to execute a two-way handshake for neighbor discovery. The transmitting or receiving status of each discovery slot depends on the binary code corresponding to the identification of the node. Discovered neighbor nodes exchange their 3D positions in tracking slots periodically for node tracking, and the maximum tracking period is determined by node velocity, beamwidth, and the minimum distance between nodes. By configuring the relevant parameters, the proposed algorithm can also apply to two-dimensional planar ad hoc networks. The simulation results suggest that the proposed algorithm can achieve shorter neighbor discovery time and longer link survival time in comparison with the random scanning algorithm in scenarios with narrow beamwidth and wide moving area. When the frame length increases, the protocol overhead decreases but the average neighbor discovery time increases. The suitable frame length should be determined based on the network range, node count, beamwidth, and node mobility characteristics. Full article
(This article belongs to the Special Issue UAV Secure Communication for IoT Applications)
Show Figures

Figure 1

Back to TopTop