4.5 Article

Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment

Lejun Zhang et al.

Summary: The combined covert communication model using smart contracts in the blockchain environment improves the concealment and security of communication, providing a tamper-resistant and low complexity solution.

IEEE SYSTEMS JOURNAL (2022)

Article Automation & Control Systems

Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices

Weizheng Wang et al.

Summary: The Industrial Internet of Things (IIoT) has significantly transformed personal lifestyles and society operations, sparking interest in areas such as intelligent logistics, smart grids, and smart cities. To address security concerns in IIoT, researchers have proposed a novel certificateless signature scheme using blockchain technology and smart contracts, demonstrating its advantages in security and efficiency.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Hardware & Architecture

SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles

Randhir Kumar et al.

Summary: The current development of UAVs and IoT devices is revolutionizing traditional agriculture into precision agriculture, but also facing challenges in terms of internet security and data privacy. This research proposes the SP2F framework, featuring two main engines - a two-level privacy engine and a deep learning-based anomaly detection engine, which strengthen data authentication and prevent data poisoning attacks by introducing blockchain and smart contracts.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Resource allocation and trust computing for blockchain-enabled edge computing system

Lejun Zhang et al.

Summary: This paper proposes a reliable and efficient system based on edge computing and blockchain, covering innovations in group-agent strategy, task sorting mechanism, and content model. Simulation results demonstrate that the proposed scheme has better computational efficiency and higher reliability compared with existing methods.

COMPUTERS & SECURITY (2021)

Article Telecommunications

Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing

Lejun Zhang et al.

Summary: This article proposes a secure and efficient data storage and sharing scheme based on blockchain mobile-edge computing. By decomposing the signature private key into multiple key shares and performing data signature and homomorphic encryption at the edge node, the challenges of data storage and sharing in the Internet of Things are addressed, achieving low-latency message response and ensuring data integrity and authenticity.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

Secure and efficient mutual authentication protocol for smart grid under blockchain

Weizheng Wang et al.

Summary: Smart grid is recognized as the next-generation intelligent network that optimizes energy efficiency through bidirectional communication. However, security issues arise with its widespread deployment, especially regarding identity authentication. In this study, an authentication protocol combining blockchain, ECC, dynamic Join-and-Exit mechanism, and batch verification is proposed to address these issues, with assured security through computational hard problem assumptions.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Information Systems

DistLog: A distributed logging scheme for IoT forensics

Hassan N. Noura et al.

AD HOC NETWORKS (2020)

Article Computer Science, Hardware & Architecture

Security and Privacy Issues of UAV: A Survey

Yueyan Zhi et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Article Telecommunications

Capture of UAVs Through GPS Spoofing Using Low-Cost SDR Platforms

Joao Gaspar et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Review Computer Science, Hardware & Architecture

Communication and networking technologies for UAVs: A survey

Abhishek Sharma et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System

Murtaza Ahmed Siddiqi et al.

ELECTRONICS (2020)

Article Computer Science, Information Systems

Security and privacy of UAV data using blockchain technology

Rupa Ch et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Multidisciplinary Sciences

UAV communication system integrated into network traversal with mobility

Maher Aljehani et al.

SN APPLIED SCIENCES (2020)

Review Computer Science, Information Systems

Security analysis of drones systems: Attacks, limitations, and recommendations

Jean-Paul Yaacoub et al.

INTERNET OF THINGS (2020)

Article Engineering, Electrical & Electronic

Securing UAV Communications via Joint Trajectory and Power Control

Guangchi Zhang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Review Computer Science, Information Systems

5G Ultra-Reliable Low-Latency Communication Implementation Challenges and Operational Issues with IoT Devices

Murtaza Ahmed Siddiqi et al.

ELECTRONICS (2019)

Article Computer Science, Information Systems

5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases

Hanif Ullah et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems

Mohammad Mozaffari et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges

Azade Fotouhi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges

Hazim Shakhatreh et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis

Igor Bisio et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Proceedings Paper Green & Sustainable Science & Technology

Progress on Drone Technology and their Applications: A Comprehensive Review

K. W. Chan et al.

GREEN DESIGN AND MANUFACTURE: ADVANCED AND EMERGING APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges

Yong Zeng et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Computer Science, Information Systems

Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint

Samira Hayat et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Chemistry, Analytical

Extracting Objects for Aerial Manipulation on UAVs Using Low Cost Stereo Sensors

Pablo Ramon Soria et al.

SENSORS (2016)

Article Engineering, Multidisciplinary

Security of unmanned aerial vehicle systems against cyber-physical attacks

Chaitanya Rani et al.

JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS (2016)

Article Engineering, Multidisciplinary

A study on cyber-security of autonomous and unmanned vehicles

Eray Yagdereli et al.

JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS (2015)

Article Engineering, Electrical & Electronic

Realities and challenges of nextgen air traffic management: the case of ADS-B

Martin Strohmeier et al.

IEEE COMMUNICATIONS MAGAZINE (2014)

Article Computer Science, Artificial Intelligence

GPS coordinates estimation and camera calibration from solar shadows

Imran N. Junejo et al.

COMPUTER VISION AND IMAGE UNDERSTANDING (2010)

Article Computer Science, Information Systems

A hierarchical, objectives-based framework for the digital investigations process

Nicole Lang Beebe et al.

DIGITAL INVESTIGATION (2005)