Tedeschi et al., 2019 - Google Patents
Leveraging jamming to help drones complete their missionTedeschi et al., 2019
View PDF- Document ID
- 12007743566722441197
- Author
- Tedeschi P
- Oligeri G
- Di Pietro R
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
We propose JAM-ME, an autonomous jamming-assisted navigation system that allows a drone to accomplish its mission even in the presence of an anti-drone jamming protection system. In this contribution, we review the current state-of-the-art highlighting how current …
- 238000011160 research 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tedeschi et al. | Leveraging jamming to help drones complete their mission | |
| Pandey et al. | Security threats and mitigation techniques in UAV communications: A comprehensive survey | |
| He et al. | Communication security of unmanned aerial vehicles | |
| Noh et al. | Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing | |
| Guvenc et al. | Detection, tracking, and interdiction for amateur drones | |
| Jansen et al. | Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks | |
| Kong | A survey of cyberattack countermeasures for unmanned aerial vehicles | |
| Manesh et al. | Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system | |
| Kang et al. | A survey on satellite communication system security | |
| Yuan et al. | Secrecy performance of terrestrial radio links under collaborative aerial eavesdropping | |
| Bada et al. | A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs | |
| KR20210006490A (en) | Anti-drone system using unmanned aerial vehicle | |
| Di Pietro et al. | Jam-me: Exploiting jamming to accomplish drone mission | |
| Cohen et al. | Security analysis of radar systems | |
| Huang et al. | Navigation of a UAV team for collaborative eavesdropping on multiple ground transmitters | |
| Čisar et al. | Principles of anti-drone defense | |
| Haq et al. | Need of UAVs and physical layer security in next-generation non-terrestrial wireless networks: potential challenges and open issues | |
| Nguyen et al. | Understanding privacy risks of high-accuracy radio positioning and sensing in wireless networks | |
| Chibi et al. | Drone cyber-attack: An intrusion detection technique based on RSSI and trilateration | |
| Li et al. | Proactive eavesdropping via jamming for trajectory tracking of UAVs | |
| Yu et al. | Electronic Warfare Cyberattacks, Countermeasures and Modern Defensive Strategies of UAV Avionics: A Survey | |
| Michailidis et al. | Software-Defined Radio Deployments in UAV-Driven Applications: A Comprehensive Review | |
| Sun et al. | Drone privacy shield: A WiFi based defense | |
| Al-Bkree | Managing the cyber-physical security for unmanned aerial vehicles used in perimeter surveillance | |
| Ahmed et al. | A Comprehensive Survey on RIS-Enhanced Physical Layer Security in UAV-Assisted Networks |