Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (390)

Search Parameters:
Keywords = unmanned aerial vehicle (UAV) security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 3297 KiB  
Article
Secrecy Rate Maximization via Joint Robust Beamforming and Trajectory Optimization for Mobile User in ISAC-UAV System
by Lvxin Xu, Zhi Zhang and Liuguo Yin
Drones 2025, 9(8), 536; https://doi.org/10.3390/drones9080536 - 30 Jul 2025
Viewed by 160
Abstract
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for integrated sensing and communication (ISAC) due to their mobility and deployment flexibility. By adaptively adjusting their flight trajectories, UAVs can maintain favorable line-of-sight (LoS) communication links and sensing angles, thus enhancing overall [...] Read more.
Unmanned aerial vehicles (UAVs) have emerged as a promising platform for integrated sensing and communication (ISAC) due to their mobility and deployment flexibility. By adaptively adjusting their flight trajectories, UAVs can maintain favorable line-of-sight (LoS) communication links and sensing angles, thus enhancing overall system performance in dynamic and complex environments. However, ensuring physical layer security (PLS) in such UAV-assisted ISAC systems remains a significant challenge, particularly in the presence of mobile users and potential eavesdroppers. This manuscript proposes a joint optimization framework that simultaneously designs robust transmit beamforming and UAV trajectories to secure downlink communication for multiple ground users. At each time slot, the UAV predicts user positions and maximizes the secrecy sum-rate, subject to constraints on total transmit power, multi-target sensing quality, and UAV mobility. To tackle this non-convex problem, we develop an efficient optimization algorithm based on successive convex approximation (SCA) and constrained optimization by linear approximations (COBYLA). Numerical simulations validate that the proposed framework effectively enhances the secrecy performance while maintaining high-quality sensing, achieving near-optimal performance under realistic system constraints. Full article
Show Figures

Figure 1

19 pages, 1307 KiB  
Article
Three-Dimensional Non-Stationary MIMO Channel Modeling for UAV-Based Terahertz Wireless Communication Systems
by Kai Zhang, Yongjun Li, Xiang Wang, Zhaohui Yang, Fenglei Zhang, Ke Wang, Zhe Zhao and Yun Wang
Entropy 2025, 27(8), 788; https://doi.org/10.3390/e27080788 - 25 Jul 2025
Viewed by 201
Abstract
Terahertz (THz) wireless communications can support ultra-high data rates and secure wireless links with miniaturized devices for unmanned aerial vehicle (UAV) communications. In this paper, a three-dimensional (3D) non-stationary geometry-based stochastic channel model (GSCM) is proposed for multiple-input multiple-output (MIMO) communication links between [...] Read more.
Terahertz (THz) wireless communications can support ultra-high data rates and secure wireless links with miniaturized devices for unmanned aerial vehicle (UAV) communications. In this paper, a three-dimensional (3D) non-stationary geometry-based stochastic channel model (GSCM) is proposed for multiple-input multiple-output (MIMO) communication links between the UAVs in the THz band. The proposed channel model considers not only the 3D scattering and reflection scenarios (i.e., reflection and scattering fading) but also the atmospheric molecule absorption attenuation, arbitrary 3D trajectory, and antenna arrays of both terminals. In addition, the statistical properties of the proposed GSCM (i.e., the time auto-correlation function (T-ACF), space cross-correlation function (S-CCF), and Doppler power spectrum density (DPSD)) are derived and analyzed under several important UAV-related parameters and different carrier frequencies, including millimeter wave (mmWave) and THz bands. Finally, the good agreement between the simulated results and corresponding theoretical ones demonstrates the correctness of the proposed GSCM, and some useful observations are provided for the system design and performance evaluation of UAV-based air-to-air (A2A) THz-MIMO wireless communications. Full article
Show Figures

Figure 1

21 pages, 6149 KiB  
Article
Multiscale Remote Sensing Data Integration for Gully Erosion Monitoring in Southern Brazil: Case Study
by Fábio Marcelo Breunig, Malva Andrea Mancuso, Ana Clara Amalia Coimbra, Leonardo José Cordeiro Santos, Tais Cristina Hempe, Elaine de Cacia de Lima Frick, Edenilson Roberto do Nascimento, Tony Vinicius Moreira Sampaio, William Gaida, Elias Fernando Berra, Romário Trentin, Arsalan Ahmed Othman and Veraldo Liesenberg
AgriEngineering 2025, 7(7), 212; https://doi.org/10.3390/agriengineering7070212 - 2 Jul 2025
Viewed by 487
Abstract
The degradation and loss of arable soils pose significant challenges to global food security, requiring advanced mapping and monitoring techniques to improve soil and crop management. This study evaluates the integration of Unmanned Aerial Vehicles (UAVs) and orbital sensor data for monitoring and [...] Read more.
The degradation and loss of arable soils pose significant challenges to global food security, requiring advanced mapping and monitoring techniques to improve soil and crop management. This study evaluates the integration of Unmanned Aerial Vehicles (UAVs) and orbital sensor data for monitoring and quantifying gullies with low-cost data. The research focuses on a gully in southern Brazil, utilizing high-spatial-resolution imagery to analyze its evolution over a 25-year period (2000–2024). Photointerpretation and manual delineation procedures were adopted to define gully shoulder lines, based on low-cost and multiple-spatial-resolution data from Google Earth Pro (GEP), UAVs and conventional aerial photographs. Planimetric, volumetric, climatic, and pedological parameters were assessed and evaluated over time. Field inspections supported our interpretations. The results show that gully expansion can be effectively mapped and monitored by combining high-spatial-resolution GEP data with aerial imagery. The gully area has increased by more than 50% over the past two decades, based on GEP data, which were corroborated by submeter-resolution UAV data. The findings indicate that the erosive process remains active, progressing toward the base level. These results provide critical insights for land managers, policymakers, and agricultural stakeholders to implement targeted soil recovery strategies and mitigate further land degradation. Full article
Show Figures

Figure 1

18 pages, 2820 KiB  
Article
Winter Wheat Nitrogen Content Prediction and Transferability of Models Based on UAV Image Features
by Jing Zhang, Gong Cheng, Shaohui Huang, Junfang Yang, Yunma Yang, Suli Xing, Jingxia Wang, Huimin Yang, Haoliang Nie, Wenfang Yang, Kang Yu and Liangliang Jia
Agriculture 2025, 15(13), 1373; https://doi.org/10.3390/agriculture15131373 - 26 Jun 2025
Viewed by 336
Abstract
Accurate and timely monitoring of plant nitrogen content (PNC) is essential for precision agriculture (PA) and food security. While multispectral unmanned aerial vehicle (UAV) imagery has shown promise in PNC estimation, the optimal feature combination methods of spectral and texture features remain underexplored, [...] Read more.
Accurate and timely monitoring of plant nitrogen content (PNC) is essential for precision agriculture (PA) and food security. While multispectral unmanned aerial vehicle (UAV) imagery has shown promise in PNC estimation, the optimal feature combination methods of spectral and texture features remain underexplored, and model transferability across different agricultural practices is poorly understood. This study aims to present an innovative approach by integrating 40 texture features and 22 spectral features from UAV multispectral images with machine learning (ML) methods (RF, SVR, and XGBoost) for winter wheat nitrogen content prediction. In addition, through analysis of an 8-year long-term field experiment with rigorous data, the results indicated that (1) the RF and XGboost models incorporating both spectral and texture features achieved good prediction accuracy, with R2 values of 0.98 and 0.99, respectively, RMSE values of 0.10 and 0.07, and MAE values of 0.07and 0.05; (2) models trained on Farmers’ Practice (FP) data showed superior transferability to Ecological Intensification (EI) conditions (R2 = 0.98, RMSE = 0.08, and MAE = 0.05 for XGBoost), while EI-trained models performed less well when applied to FP conditions (R2 = 0.89, RMSE = 0.45, and MAE = 0.35 for XGBoost). These findings established an effective framework for UAV-based PNC monitoring, demonstrating that fused spectral–textural features with FP-trained XGboost can achieve both high accuracy and practical transferability, offering valuable decision-support tools for precision nitrogen management in different farming systems. Full article
(This article belongs to the Section Artificial Intelligence and Digital Agriculture)
Show Figures

Figure 1

20 pages, 5393 KiB  
Article
A Semantic Segmentation Dataset and Real-Time Localization Model for Anti-UAV Applications
by Sang-Chul Kim and Yeong Min Jang
Appl. Sci. 2025, 15(13), 7183; https://doi.org/10.3390/app15137183 - 26 Jun 2025
Viewed by 440
Abstract
With the rapid development of the unmanned aerial vehicle (UAV) industry and applications, the integration of UAVs into daily life has increased significantly. However, this growing presence raises security concerns, leading to the emergence of anti-UAV technologies. Most existing anti-UAV systems rely on [...] Read more.
With the rapid development of the unmanned aerial vehicle (UAV) industry and applications, the integration of UAVs into daily life has increased significantly. However, this growing presence raises security concerns, leading to the emergence of anti-UAV technologies. Most existing anti-UAV systems rely on object detection techniques. Yet, these methods often struggle to detect small-sized UAVs accurately. Semantic segmentation, which predicts object locations at the pixel level, offers improved localization for such small targets. Due to the lack of existing datasets for anti-UAV semantic segmentation, we propose a new dataset comprising both infrared (IR) and visible light images. Our dataset includes a total of 605,045 paired UAV images and corresponding segmentation masks. To enhance object diversity and improve model robustness, the dataset integrates multiple existing sources. In addition to the dataset, we evaluate the performance of several baseline models on the semantic segmentation task. We also propose a lightweight model to demonstrate the feasibility of real-time UAV localization using semantic segmentation on VL and IR data. Full article
Show Figures

Figure 1

15 pages, 1949 KiB  
Article
High-Performance and Lightweight AI Model with Integrated Self-Attention Layers for Soybean Pod Number Estimation
by Qian Huang
AI 2025, 6(7), 135; https://doi.org/10.3390/ai6070135 - 24 Jun 2025
Viewed by 530
Abstract
Background: Soybean is an important global crop in food security and agricultural economics. Accurate estimation of soybean pod counts is critical for yield prediction, breeding programs, precision farming, etc. Traditional methods, such as manual counting, are slow, labor-intensive, and prone to errors. With [...] Read more.
Background: Soybean is an important global crop in food security and agricultural economics. Accurate estimation of soybean pod counts is critical for yield prediction, breeding programs, precision farming, etc. Traditional methods, such as manual counting, are slow, labor-intensive, and prone to errors. With rapid advancements in artificial intelligence (AI), deep learning has enabled automatic pod number estimation in collaboration with unmanned aerial vehicles (UAVs). However, existing AI models are computationally demanding and require significant processing resources (e.g., memory). These resources are often not available in rural regions and small farms. Methods: To address these challenges, this study presents a set of lightweight, efficient AI models designed to overcome these limitations. By integrating model simplification, weight quantization, and squeeze-and-excitation (SE) self-attention blocks, we develop compact AI models capable of fast and accurate soybean pod count estimation. Results and Conclusions: Experimental results show a comparable estimation accuracy of 84–87%, while the AI model size is significantly reduced by a factor of 9–65, thus making them suitable for deployment in edge devices, such as Raspberry Pi. Compared to existing models such as YOLO POD and SoybeanNet, which rely on over 20 million parameters to achieve approximately 84% accuracy, our proposed lightweight models deliver a comparable or even higher accuracy (84.0–86.76%) while using fewer than 2 million parameters. In future work, we plan to expand the dataset by incorporating diverse soybean images to enhance model generalizability. Additionally, we aim to explore more advanced attention mechanisms—such as CBAM or ECA—to further improve feature extraction and model performance. Finally, we aim to implement the complete system in edge devices and conduct real-world testing in soybean fields. Full article
Show Figures

Figure 1

15 pages, 432 KiB  
Article
Efficient and Scalable Authentication Framework for Internet of Drones (IoD) Networks
by Hyunseok Kim
Electronics 2025, 14(12), 2435; https://doi.org/10.3390/electronics14122435 - 15 Jun 2025
Viewed by 414
Abstract
The accelerated uptake of unmanned aerial vehicles (UAVs) has significantly altered communication and data exchange landscapes but has also introduced substantial security challenges, especially in open-access UAV communication environments. To address these, Elliptic curve cryptography (ECC) offers robust security with computational efficiency, ideal [...] Read more.
The accelerated uptake of unmanned aerial vehicles (UAVs) has significantly altered communication and data exchange landscapes but has also introduced substantial security challenges, especially in open-access UAV communication environments. To address these, Elliptic curve cryptography (ECC) offers robust security with computational efficiency, ideal for resource-constrained Internet of Drones (IoD) systems. This study proposes a Secure and Efficient Three-Way Key Exchange (SETKE) protocol using ECC, specifically tailored for IoD. The SETKE protocol’s security was rigorously analyzed within an extended Bellare–Pointcheval–Rogaway (BPR) model under the random oracle assumption, demonstrating its resilience. Formal verification using the AVISPA tool confirmed the protocol’s safety against man-in-the-middle (MITM) attacks, and formal proofs establish its Authenticated Key Exchange (AKE) security. In terms of performance, SETKE is highly efficient, requiring only 3 ECC scalar multiplications for the Service Requester drone, 4 for the Service Provider drone, and 3 for the Control Server, which is demonstrably lower than several existing schemes. My approach achieves this robust protection with minimal communication overhead (e.g., a maximum payload of 844 bits per session), ensuring its practicality for resource-limited IoD environments. The significance of this work for the IoD field lies in providing a provably secure, lightweight, and computationally efficient key exchange mechanism vital for addressing critical security challenges in IoD systems. Full article
(This article belongs to the Special Issue Parallel, Distributed, Edge Computing in UAV Communication)
Show Figures

Figure 1

20 pages, 2661 KiB  
Article
Cooperative Jamming for RIS-Assisted UAV-WSN Against Aerial Malicious Eavesdropping
by Juan Li, Gang Wang, Weijia Wu, Jing Zhou, Yingkun Liu, Yangqin Wei and Wei Li
Drones 2025, 9(6), 431; https://doi.org/10.3390/drones9060431 - 13 Jun 2025
Viewed by 442
Abstract
As the low-altitude economy undergoes rapid growth, unmanned aerial vehicles (UAVs) have served as mobile sink nodes in wireless sensor networks (WSNs), significantly enhancing data collection efficiency. However, the open nature of wireless channels and spectrum scarcity pose severe challenges to data security, [...] Read more.
As the low-altitude economy undergoes rapid growth, unmanned aerial vehicles (UAVs) have served as mobile sink nodes in wireless sensor networks (WSNs), significantly enhancing data collection efficiency. However, the open nature of wireless channels and spectrum scarcity pose severe challenges to data security, particularly when legitimate UAVs (UAV-L) receive confidential information from ground sensor nodes (SNs), which is vulnerable to interception by eavesdropping UAVs (UAV-E). In response to this challenge, this study presents a cooperative jamming (CJ) scheme for Reconfigurable Intelligent Surfaces (RIS)-assisted UAV-WSN to combat aerial malicious eavesdropping. The multi-dimensional optimization problem (MDOP) of system security under quality of service (QoS) constraints is addressed by collaboratively optimizing the transmit power (TP) of SNs, the flight trajectories (FT) of the UAV-L, the frame length (FL) of time slots, and the phase shift matrix (PSM) of the RIS. To address the challenge, we put forward a Cooperative Jamming Joint Optimization Algorithm (CJJOA) scheme. Specifically, we first apply the block coordinate descent (BCD) to decompose the original MDOP into several subproblems. Then, each subproblem is convexified by successive convex approximation (SCA). The numerical results demonstrate that the designed algorithm demonstrates extremely strong stability and reliability during the convergence process. At the same time, it shows remarkable advantages compared with traditional benchmark testing methods, effectively and practically enhancing security. Full article
(This article belongs to the Special Issue UAV-Assisted Mobile Wireless Networks and Applications)
Show Figures

Figure 1

19 pages, 1345 KiB  
Article
Mutual Identity Authentication Based on Dynamic Identity and Hybrid Encryption for UAV–GCS Communications
by Lin Lin, Runzong Shangguan, Hongjuan Ge, Yinchuan Liu, Yuefei Zhou and Yanbo Zhou
Drones 2025, 9(6), 422; https://doi.org/10.3390/drones9060422 - 10 Jun 2025
Viewed by 631
Abstract
In order to solve the problems of identity solidification, key duration, and lack of anonymity in communications between unmanned aerial vehicles (UAVs) and ground control stations (GCSs), a mutual secure communication scheme named Dynamic Identity and Hybrid Encryption is proposed in this paper. [...] Read more.
In order to solve the problems of identity solidification, key duration, and lack of anonymity in communications between unmanned aerial vehicles (UAVs) and ground control stations (GCSs), a mutual secure communication scheme named Dynamic Identity and Hybrid Encryption is proposed in this paper. By constructing an identity update mechanism and a lightweight hybrid encryption system, the anonymity and untraceability of the communicating parties can be realized within a resource-limited environment, and threats such as man-in-the-middle (MITM) attacks, identity forgery, and message tampering can be effectively resisted. Dynamic Identity and Hybrid Encryption (DIHE) uses a flexible encryption strategy to balance security and computing cost and satisfies security attributes such as mutual authentication and forward security through formal verification. Our experimental comparison shows that, compared with the traditional scheme, the calculation and communication costs of DIHE are lower, making it especially suitable for the communication environment between UAVs and GCSs with limited computing power, thus providing a feasible solution for secure low-altitude Internet of Things (IoT) communication. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

17 pages, 1647 KiB  
Proceeding Paper
Enhanced Drone Detection Model for Edge Devices Using Knowledge Distillation and Bayesian Optimization
by Maryam Lawan Salisu, Farouk Lawan Gambo, Aminu Musa and Aminu Aliyu Abdullahi
Eng. Proc. 2025, 87(1), 71; https://doi.org/10.3390/engproc2025087071 - 4 Jun 2025
Viewed by 655
Abstract
The emergence of Unmanned Aerial Vehicles (UAVs), commonly known as drones, has presented numerous transformative opportunities across sectors such as agriculture, commerce, and security surveillance systems. However, the proliferation of these technologies raises significant concerns regarding security and privacy, as they could potentially [...] Read more.
The emergence of Unmanned Aerial Vehicles (UAVs), commonly known as drones, has presented numerous transformative opportunities across sectors such as agriculture, commerce, and security surveillance systems. However, the proliferation of these technologies raises significant concerns regarding security and privacy, as they could potentially be exploited for unauthorized surveillance or even targeted attacks. Various research endeavors have proposed drone detection models for security purposes. Yet, deploying these models on edge devices proves challenging due to resource constraints, which limit the feasibility of complex deep learning models. The need for lightweight models capable of efficient deployment on edge devices becomes evident, particularly for the anonymous detection of drones in various disguises to prevent potential intrusions. This study introduces a lightweight deep learning-based drone detection model (LDDm-CNN) by fusing knowledge distillation with Bayesian optimization. Knowledge distillation (KD) is utilized to transfer knowledge from a complex model (teacher) to a simpler one (student), preserving performance while reducing computational complexity, thereby achieving a lightweight model. However, selecting optimal hyper-parameters for knowledge distillation is challenging due to a large number of search space and complexity requirements. Therefore, through the integration of Bayesian optimization with knowledge distillation, we present an enhanced CNN-KD model. This novel approach employs an optimization algorithm to determine the most suitable hyper-parameters, enhancing the efficiency and effectiveness of the drone detection model. Validation on a dedicated drone detection dataset illustrates the model’s efficacy, achieving a remarkable accuracy of 96% while significantly reducing computational and memory requirements. With just 102,000 parameters, the proposed model is five times smaller than the teacher model, underscoring its potential for practical deployment in real-world scenarios. Full article
(This article belongs to the Proceedings of The 5th International Electronic Conference on Applied Sciences)
Show Figures

Figure 1

27 pages, 1103 KiB  
Systematic Review
Authentication Techniques in Internet of Drones (IoD): Taxonomy, Open Challenges and Future Directions
by Alanoud F. Aldweesh and Abdullah M. Almuhaideb
J. Sens. Actuator Netw. 2025, 14(3), 57; https://doi.org/10.3390/jsan14030057 - 27 May 2025
Viewed by 825
Abstract
Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through [...] Read more.
Recently, Internet of Drones (IoD) applications have grown in various fields, including the military, healthcare, smart agriculture, and traffic monitoring. Drones are equipped with computation resources, communication units, and embedded systems that allow them to sense, collect, and deliver data in real-time through public communication channels. However, this fact introduces the risk of attack on data transmitted over unsecured public channels. Addressing several security threats is crucial to ensuring the secure operation of IoD networks. Robust authentication protocols play a vital role in establishing secure processes in the IoD environment. However, designing efficient and lightweight authentication solutions is a complex task due to the unique characteristics of the IoD and the limitations of drones in terms of their communication and computational capabilities. There is a need to review the role of authentication processes in controlling security threats in the IoD due to the increasing complexity and frequency of security breaches. This review will present the primary issues and future path directions for authentication schemes in the IoD and provide a framework for relevant existing schemes to facilitate future research into the IoD. Consequently, in this paper, we review the literature to highlight the research conducted in this area of the IoD. This study reviews several existing methods for authenticating entities in the IoD environment. Moreover, this study discusses security requirements and highlights several challenges encountered with the authentication schemes used in the IoD. The findings of this paper suggest future directions for research to consider in order for this domain to continue to evolve. Full article
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)
Show Figures

Figure 1

46 pages, 2208 KiB  
Review
A Survey on Free-Space Optical Communication with RF Backup: Models, Simulations, Experience, Machine Learning, Challenges and Future Directions
by Sabai Phuchortham and Hakilo Sabit
Sensors 2025, 25(11), 3310; https://doi.org/10.3390/s25113310 - 24 May 2025
Viewed by 1978
Abstract
As sensor technology integrates into modern life, diverse sensing devices have become essential for collecting critical data that enables human–machine interfaces such as autonomous vehicles and healthcare monitoring systems. However, the growing number of sensor devices places significant demands on network capacity, which [...] Read more.
As sensor technology integrates into modern life, diverse sensing devices have become essential for collecting critical data that enables human–machine interfaces such as autonomous vehicles and healthcare monitoring systems. However, the growing number of sensor devices places significant demands on network capacity, which is constrained by the limitations of radio frequency (RF) technology. RF-based communication faces challenges such as bandwidth congestion and interference in densely populated areas. To overcome these challenges, a combination of RF with free-space optical (FSO) communication is presented. FSO is a laser-based wireless solution that offers high data rates and secure communication, similar to fiber optics but without the need for physical cables. However, FSO is highly susceptible to atmospheric turbulence and conditions such as fog and smoke, which can degrade performance. By combining the strengths of both RF and FSO, a hybrid FSO/RF system can enhance network reliability, ensuring seamless communication in dynamic urban environments. This review examines hybrid FSO/RF systems, covering both theoretical models and real-world applications. Three categories of hybrid systems, namely hard switching, soft switching, and relay-based mechanisms, are proposed, with graphical models provided to improve understanding. In addition, multi-platform applications, including autonomous, unmanned aerial vehicles (UAVs), high-altitude platforms (HAPs), and satellites, are presented. Finally, the paper identifies key challenges and outlines future research directions for hybrid communication networks. Full article
(This article belongs to the Special Issue Sensing Technologies and Optical Communication)
Show Figures

Figure 1

57 pages, 24925 KiB  
Review
AI-Driven Safety and Security for UAVs: From Machine Learning to Large Language Models
by Zheng Yang, Yuting Zhang, Jie Zeng, Yifan Yang, Yufei Jia, Hua Song, Tiejun Lv, Qian Sun and Jianping An
Drones 2025, 9(6), 392; https://doi.org/10.3390/drones9060392 - 23 May 2025
Viewed by 2438
Abstract
As unmanned aerial vehicle (UAV) applications expand across logistics, agriculture, and emergency response, safety and security threats are becoming increasingly complex. Addressing these evolving threats, including physical safety and network security threats, requires continued advancement by integrating traditional artificial intelligence (AI) tools such [...] Read more.
As unmanned aerial vehicle (UAV) applications expand across logistics, agriculture, and emergency response, safety and security threats are becoming increasingly complex. Addressing these evolving threats, including physical safety and network security threats, requires continued advancement by integrating traditional artificial intelligence (AI) tools such as machine learning (ML) and deep learning (DL), which contribute to significantly enhancing UAV safety and security. Large language models (LLMs), a cutting-edge trend in the AI field, are associated with strong capabilities for learning and adapting across various environments. Their emergence reflects a broader trend toward intelligent systems that may eventually demonstrate behavior comparable to human-level reasoning. This paper summarizes the typical safety and security threats affecting UAVs, reviews the progress of traditional AI technologies, as described in the literature, and identifies strategies for reducing the impact of such threats. It also highlights the limitations of traditional AI technologies and summarizes the current application status of LLMs in UAV safety and security. Finally, this paper discusses the challenges and future research directions for improving UAV safety and security with LLMs. By leveraging their advanced capabilities, LLMs offer potential benefits in critical domains such as urban air traffic management, precision agriculture, and emergency response, fostering transformative progress toward adaptive, reliable, and secure UAV systems that address modern operational complexities. Full article
(This article belongs to the Special Issue AI for Cybersecurity in Unmanned Aerial Systems (UAS))
Show Figures

Figure 1

23 pages, 2331 KiB  
Article
A Secure Data Collection Method Based on Deep Reinforcement Learning and Lightweight Authentication
by Yunlong Wang, Jie Zhang, Guangjie Han and Dugui Chen
World Electr. Veh. J. 2025, 16(5), 281; https://doi.org/10.3390/wevj16050281 - 19 May 2025
Viewed by 580
Abstract
Cooperative Unmanned Aerial Vehicle (UAV) technology can significantly improve data acquisition in Internet of Things (IoT) environments, which are characterized by wide distribution and limited capacity of ground-based devices. However, due to the open nature of wireless communications, such applications face security threats [...] Read more.
Cooperative Unmanned Aerial Vehicle (UAV) technology can significantly improve data acquisition in Internet of Things (IoT) environments, which are characterized by wide distribution and limited capacity of ground-based devices. However, due to the open nature of wireless communications, such applications face security threats posed by UAV authentication, especially in scalable IoT environments. To address such challenges, we propose a lightweight chain authentication protocol for scalable IoT environments (LCAP-SIoT), which uses Physical Unclonable Functions (PUFs) and distributed authentication to secure communications, and a secure data collection algorithm, named LS-QMIX, which fuses the LCAP-SIoT and Q-learning Mixer (QMIX) algorithm to optimize the path planning and cooperation efficiency of the multi-UAV system. According to simulation analysis, LCAP-SIoT outperforms existing solutions in terms of computing and communication costs, and LS-QMIX results in superior performance in terms of data collection rate, task completion time, and the success rate of authentication for newly joined UAVs, indicating the feasibility of LS-QMIX in dynamic expansion scenarios. Full article
Show Figures

Figure 1

13 pages, 2276 KiB  
Article
Trajectory Optimization for UAV-Aided IoT Secure Communication Against Multiple Eavesdroppers
by Lingfeng Shen, Jiangtao Nie, Ming Li, Guanghui Wang, Qiankun Zhang and Xin He
Future Internet 2025, 17(5), 225; https://doi.org/10.3390/fi17050225 - 19 May 2025
Viewed by 459
Abstract
This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with multiple eavesdroppers, formulating the optimal UAV [...] Read more.
This study concentrates on physical layer security (PLS) in UAV-aided Internet of Things (IoT) networks and proposes an innovative approach to enhance security by optimizing the trajectory of unmanned aerial vehicles (UAVs). In an IoT system with multiple eavesdroppers, formulating the optimal UAV trajectory poses a non-convex and non-differentiable optimization challenge. The paper utilizes the successive convex approximation (SCA) method in conjunction with hypograph theory to address this challenge. First, a set of trajectory increment variables is introduced to replace the original UAV trajectory coordinates, thereby converting the original non-convex problem into a sequence of convex subproblems. Subsequently, hypograph theory is employed to convert these non-differentiable subproblems into standard convex forms, which can be solved using the CVX toolbox. Simulation results demonstrate the UAV’s trajectory fluctuations under different parameters, affirming that trajectory optimization significantly improves PLS performance in IoT systems. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Back to TopTop