[go: up one dir, main page]

Jamil et al., 2024 - Google Patents

Intelligent transportation systems for IoT-based UAV networks

Jamil et al., 2024

Document ID
16176334870867073263
Author
Jamil M
Haider U
Khan I
Bhatia T
Publication year
Publication venue
Cyber Security for Next-Generation Computing Technologies

External Links

Snippet

The world is entering a new era where all things could be dramatically changed in intelligent transportation systems. This network system will break all the traditional ways of living. All the limitations and problems in various domains of application will need to be well …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Similar Documents

Publication Publication Date Title
Chen et al. PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs
Stellios et al. A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services
Hafeez et al. Blockchain-assisted UAV communication systems: A comprehensive survey
Ceviz et al. A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions
Ijaz et al. Smart cities: A survey on security concerns
US8254847B2 (en) Distributed wireless communications for tactical network dominance
Hai et al. A lightweight intrusion detection framework for wireless sensor networks
Mohammed et al. Wireless sensor network security: approaches to detecting and avoiding wormhole attacks
Farjamnia et al. Review of the techniques against the wormhole attacks on wireless sensor networks
Bangash et al. Security Issues and Challenges in Wireless Sensor Networks: A Survey.
Wang et al. A survey on security of UAV swarm networks: attacks and countermeasures
Mostefa et al. A survey of wireless sensor network security in the context of Internet of Things
Jacobsen et al. Security threats analysis of the unmanned aerial vehicle system
Li et al. A survey on attack resilient of UAV motion planning
Rahman et al. Detection of security attacks using intrusion detection system for UAV networks: A survey
Tychola et al. Cyberthreats and security measures in drone-assisted agriculture
Vishwas et al. Recent Trends in Localization, Routing, and Security for Wireless Sensor Networks
Abdalla* et al. AI at the Physical Layer for Wireless Network Security and Privacy
Ali et al. Improving the resilience of Wireless Sensor Networks against security threats: A survey and open research issues
Sanghavi et al. A comprehensive study on cyber security in unmanned aerial vehicles
Gorrepati et al. Dronemap: an IoT network security in internet of drones
Jamil et al. Intelligent transportation systems for IoT-based UAV networks
Wan et al. Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones
Sora Security Issues in Wireless Sensor Networks.
Carvalho et al. Collaborative approach for a MANET intrusion detection system using multilateration