Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IEEE Communications ...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
IEEE Communications Magazine
Article . 2019 . Peer-reviewed
License: IEEE Copyright
Data sources: Crossref
DBLP
Article . 2020
Data sources: DBLP
versions View all 2 versions
addClaim

Unmanned Aerial Vehicle Meets Vehicle-to-Everything in Secure Communications

Authors: Bodong Shang; Lingjia Liu 0001; Junchao Ma; Pingzhi Fan;

Unmanned Aerial Vehicle Meets Vehicle-to-Everything in Secure Communications

Abstract

Enabling vehicles to communicate with other vehicles, infrastructure, pedestrians, and everything for use cases such as road safety, automatic driving, and infotainment is important for the future cellular networks. However, some vehicle-to-everything (V2X) services need secure transmissions and should be prevented from eavesdropping. Physical layer security, an information- theoretical framework, utilizes the randomness of underlying channels to ensure secrecy in the physical layer. Different from ground communications, unmanned aerial vehicles (UAVs) create line-of-sight connections to vehicles and mobile users making them an ideal platform to conduct physical layer security strategies. In this article, we embrace UAV to V2X communications to enhance the V2X security from the physical layer security's perspective. To be specific, we present security problems in V2X systems, highlight security threats in V2X networks, and illustrate some potential applications of UAVs in V2X security. Open problems for UAV-assisted V2X secure communications are also discussed.

Related Organizations
  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    59
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 1%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 1%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
59
Top 1%
Top 10%
Top 1%
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!