Physical layer security and covert communication in UAV-ISAC networks: A comprehensive survey

  • Haowen Yang*
  • , Yuan Liu
  • , Xuran Li
  • , Zhiquan Bai
  • , Liang Yang
  • , Gaofeng Pan
  • , Hongwu Liu
  • *Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

Abstract

Under the rapid development of the low-altitude economy, while unmanned aerial vehicle-assisted integrated sensing and communication (UAV-ISAC) significantly enhances perception accuracy and communication reliability in dynamic network environments, it also faces security threats from information leakage and malicious interference in open electromagnetic environments, making physical layer security (PLS) and covert communication technologies particularly crucial. This work reviews recent advances in PLS and covert communication techniques for UAV-ISAC networks. It first introduces the basic architecture and typical application scenarios of UAV-ISAC networks, and then discusses two main aspects: For PLS, key technologies are highlighted. including channel characteristic-based design, cooperative communication, resource allocation, and reconfigurable intelligent surface (RIS)-assisted approaches. For covert communication, representative solutions are summarized across spatial domain, power domain, time-frequency domain, RIS, and artificial intelligence (AI)-aided methods, along with their technical characteristics and system performance under complex scenarios. Finally, the current challenges in PLS and covert communication for UAV-ISAC networks are analyzed, and the future development potential of network security in UAV-ISAC systems is discussed.

Original languageEnglish
Article number312
JournalJournal of King Saud University - Computer and Information Sciences
Volume37
Issue number10
DOIs
Publication statusPublished - Dec 2025
Externally publishedYes

Keywords

  • Anmanned aerial vehicle
  • Covert communication
  • Integrated sensing and communication
  • Physical layer security

Fingerprint

Dive into the research topics of 'Physical layer security and covert communication in UAV-ISAC networks: A comprehensive survey'. Together they form a unique fingerprint.

Cite this