He et al., 2016 - Google Patents
Communication security of unmanned aerial vehiclesHe et al., 2016
- Document ID
- 11106441236905701112
- Author
- He D
- Chan S
- Guizani M
- Publication year
- Publication venue
- IEEE wireless communications
External Links
Snippet
Communication security is critically important for the success of Unmanned Aerial Vehicles (UAVs). With the increasing use of UAVs in military and civilian applications, they often carry sensitive information that adversaries might try to get hold of. While UAVs consist of various …
- 238000004891 communication 0 title abstract description 19
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| He et al. | Communication security of unmanned aerial vehicles | |
| Shafique et al. | Survey of security protocols and vulnerabilities in unmanned aerial vehicles | |
| Kwon et al. | Empirical analysis of mavlink protocol vulnerability for attacking unmanned aerial vehicles | |
| He et al. | Drone-assisted public safety networks: The security aspect | |
| Yu et al. | Cybersecurity of unmanned aerial vehicles: A survey | |
| Altawy et al. | Security, privacy, and safety aspects of civilian drones: A survey | |
| Iqbal | A study on UAV operating system security and future research challenges | |
| CN104885427A (en) | Context aware network security monitoring for threat detection | |
| Shashok | Analysis of vulnerabilities in modern unmanned aircraft systems | |
| Niyonsaba et al. | A survey on cybersecurity in unmanned aerial vehicles: Cyberattacks, defense techniques and future research directions | |
| Butt et al. | The deployment of autonomous drones during the COVID-19 pandemic | |
| Sayeed et al. | Safeguarding unmanned aerial systems: An approach for identifying malicious aerial nodes | |
| Srirangam et al. | Safety and security issues in employing drones | |
| Shoufan et al. | eSIM‐Based Authentication Protocol for UAV Remote Identification | |
| Zhang et al. | Security in 6g-based autonomous vehicular networks: Detecting network anomalies with decentralized federated learning | |
| Alzahrani et al. | Protecting attacks on unmanned aerial vehicles using homomorphic encryption | |
| Li et al. | A survey on attack resilient of UAV motion planning | |
| Sanghavi et al. | A comprehensive study on cyber security in unmanned aerial vehicles | |
| Babu et al. | Enhancing Security for Unmanned Aircraft Systems in IoT Environments: Defense Mechanisms and Mitigation Strategies | |
| Ghosh et al. | UAV security threats, requirements and solutions | |
| Nunez et al. | Protecting the unmanned aerial vehicle from cyberattacks | |
| KR101827101B1 (en) | Method for verifying status of drone | |
| Xie et al. | Cybersecurity trends in low-altitude air traffic management | |
| Kwon | Vulnerability analysis of the Mavlink protocol for Unmanned Aerial Vehicles | |
| Sabuwala et al. | Drones: architecture, vulnerabilities, attacks and countermeasures |