Beschreibung
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.
The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.
Autorenportrait
Bin Duo received his Ph.D. degrees in information and communication engineering from Harbin Institute of Technology, China in 2014 and from the University of Sydney, Australia, in 2016, respectively. From 2018 to 2019, he visited the Department of Electrical and Computer Engineering, National University of Singapore, Singapore. Since 2018, he has been with the National Laboratory of Science and Technology on Communications, the University of Electronic Science and Technology of China, as a Research Fellow. He is currently a Professor with the College of Computer Science and Cyber Security, Chengdu University of Technology, Chengdu, China. His research interests include convex optimization theory, UAV communications for 6G and physical layer security.
Xiaojun Yuan received the Ph.D. degree in Electrical Engineering from the City University of Hong Kong in 2008. From 2009 to 2011, he was a research fellow at the Department of Electronic Engineering, the City University of Hong Kong. He was also a visiting scholar at the Department of Electrical Engineering, the University of Hawaii at Manoa in spring and summer 2009, as well as in the same period of 2010. From 2011 to 2014, he was a research assistant professor with the Institute of Network Coding, The Chinese University of Hong Kong. From 2014 to 2017, he was an assistant professor with the School of Information Science and Technology, ShanghaiTech University. He is now a professor with the University of Electronic Science and Technology of China. His research interests cover a broad range of wireless communications, statistical signal processing, and information theory including multi-antenna techniques, network coding, cooperative communications, compressed sensing, etc. He has published over 220 peer-reviewed research papers in the leading international journals and conferences, and has served on a number of technical programs for international conferences. He is now serving as an editorof IEEE Transactions on Wireless Communications, as well as of IEEE Transactions on Communications. He was a co-recipient of a number of Best Paper Awards of IEEE journals and conferences.
Yifan Liu received the B.E. degree in IoT Engineering from Chengdu University of Technology, China, in 2015. He is currently pursuing his M.S. degree at Chengdu University of Technology, in the School of Electrical and Mechanical Engineering. His research interests include convex optimization theory, UAV communications, and reconfigurable intelligent surfaces.
Inhalt
1 Overview.- 2 Air-to-Ground Channel Modeling and Generalized Algorithms.- 3 Securing UAV Networks for Rural Areas.- 4 Securing UAV Networks for Urban Areas.- 5 Securing UAV Networks for Dense Urban Areas.- 6 Conclusions and Open Issues.
Informationen zu E-Books
Herzlichen Glückwunsch zum Kauf eines Ebooks bei der BUCHBOX! Hier nun ein paar praktische Infos.
Adobe-ID
Hast du E-Books mit einem Kopierschutz (DRM) erworben, benötigst du dazu immer eine Adobe-ID. Bitte klicke einfach hier und trage dort Namen, Mailadresse und ein selbstgewähltes Passwort ein. Die Kombination von Mailadresse und Passwort ist deine Adobe-ID. Notiere sie dir bitte sorgfältig.
Achtung: Wenn du kopiergeschützte E-Books OHNE Vergabe einer Adobe-ID herunterlädst, kannst du diese niemals auf einem anderen Gerät außer auf deinem PC lesen!!
Lesen auf dem Tablet oder Handy
Wenn du auf deinem Tablet lesen möchtest, verwende eine dafür geeignete App.
Für iPad oder Iphone etc. hole dir im iTunes-Store die Lese-App Bluefire
Lesen auf einem E-Book-Reader oder am PC / MAC
Um die Dateien auf deinen PC herunter zu laden und auf dein E-Book-Lesegerät zu übertragen gibt es die Software ADE (Adobe Digital Editions).
Andere Geräte / Software
Kindle von Amazon. Wir empfehlen diese Geräte NICHT.
EPUB mit Adobe-DRM können nicht mit einem Kindle von Amazon gelesen werden. Weder das Dateiformat EPUB, noch der Kopierschutz Adobe-DRM sind mit dem Kindle kompatibel. Umgekehrt können alle bei Amazon gekauften E-Books nur auf dem Gerät von Amazon gelesen werden. Lesegeräte wie der Tolino sind im Gegensatz hierzu völlig frei: Du kannst bei vielen tausend Buchhandlungen online Ebooks für den Tolino kaufen. Zum Beispiel hier bei uns.
Software für Sony-E-Book-Reader
Computer/Laptop mit Unix oder Linux
Die Software Adobe Digital Editions ist mit Unix und Linux nicht kompatibel. Mit einer WINE-Virtualisierung kommst du aber dennoch an deine E-Books.