Jamil et al., 2024 - Google Patents
Intelligent transportation systems for IoT-based UAV networksJamil et al., 2024
- Document ID
- 16176334870867073263
- Author
- Jamil M
- Haider U
- Khan I
- Bhatia T
- Publication year
- Publication venue
- Cyber Security for Next-Generation Computing Technologies
External Links
Snippet
The world is entering a new era where all things could be dramatically changed in intelligent transportation systems. This network system will break all the traditional ways of living. All the limitations and problems in various domains of application will need to be well …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Chen et al. | PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs | |
| Stellios et al. | A survey of iot-enabled cyberattacks: Assessing attack paths to critical infrastructures and services | |
| Hafeez et al. | Blockchain-assisted UAV communication systems: A comprehensive survey | |
| Ceviz et al. | A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions | |
| Ijaz et al. | Smart cities: A survey on security concerns | |
| US8254847B2 (en) | Distributed wireless communications for tactical network dominance | |
| Hai et al. | A lightweight intrusion detection framework for wireless sensor networks | |
| Mohammed et al. | Wireless sensor network security: approaches to detecting and avoiding wormhole attacks | |
| Farjamnia et al. | Review of the techniques against the wormhole attacks on wireless sensor networks | |
| Bangash et al. | Security Issues and Challenges in Wireless Sensor Networks: A Survey. | |
| Wang et al. | A survey on security of UAV swarm networks: attacks and countermeasures | |
| Mostefa et al. | A survey of wireless sensor network security in the context of Internet of Things | |
| Jacobsen et al. | Security threats analysis of the unmanned aerial vehicle system | |
| Li et al. | A survey on attack resilient of UAV motion planning | |
| Rahman et al. | Detection of security attacks using intrusion detection system for UAV networks: A survey | |
| Tychola et al. | Cyberthreats and security measures in drone-assisted agriculture | |
| Vishwas et al. | Recent Trends in Localization, Routing, and Security for Wireless Sensor Networks | |
| Abdalla* et al. | AI at the Physical Layer for Wireless Network Security and Privacy | |
| Ali et al. | Improving the resilience of Wireless Sensor Networks against security threats: A survey and open research issues | |
| Sanghavi et al. | A comprehensive study on cyber security in unmanned aerial vehicles | |
| Gorrepati et al. | Dronemap: an IoT network security in internet of drones | |
| Jamil et al. | Intelligent transportation systems for IoT-based UAV networks | |
| Wan et al. | Optimizing Effectiveness and Defense of Drone Surveillance Missions via Honey Drones | |
| Sora | Security Issues in Wireless Sensor Networks. | |
| Carvalho et al. | Collaborative approach for a MANET intrusion detection system using multilateration |