Blockchain and deep learning empowered secure data sharing framework for softwarized UAVs

P Kumar, R Kumar, A Kumar… - 2022 IEEE …, 2022 - ieeexplore.ieee.org
Softwarized Unmanned Aerial Vehicles (UAVs) use network programmability concept of
Software-Defined Network (SDN) to separate the hardware control layer from the data layer …

5g and beyond private military communication: Trend, requirements, challenges and enablers

R Bajracharya, R Shrestha, SA Hassan, H Jung… - IEEE …, 2023 - ieeexplore.ieee.org
Communication networks are becoming increasingly important in military operations, with
task fields like time-critical targeting, covert special operations, command and control …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …

Intrusion detection system attack detection and classification model with feed-forward lstm gate in conventional dataset

PR Kshirsagar, RK Yadav… - … Learning Applications in …, 2022 - yashikajournals.com
With the increased network scale, intrusion detection is more frequent, advanced, and
volatile for capturing large scale is challenging. The increased malicious attacks in the …

A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning

Z Li, Q Chen, J Li, J Huang, W Mo, DS Wong… - Computer Standards & …, 2024 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) are highly versatile and efficient tools utilized
across diverse industries for data collection. However, they are vulnerable to wireless …

Autonomous vehicles with a 6g-based intelligent cybersecurity model

AM Algarni, V Thayananthan - Ieee Access, 2023 - ieeexplore.ieee.org
Sixth-generation (6G)-based communications have many applications and are emerging as
a new system to utilize existing vehicles and communication devices in autonomous …

Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)

F Tlili, S Ayed, LC Fourati - Computers & Security, 2024 - Elsevier
Distributed intrusion detection systems (DIDS) are a specialized subset of conventional IDSs
designed for implementation in distributed environments. Each IDS is integrated into distinct …

Blockchain-based secure and intelligent data dissemination framework for uavs in battlefield applications

NK Jadav, T Rathod, R Gupta, S Tanwar… - IEEE …, 2023 - ieeexplore.ieee.org
The modern warfare scenario has immense challenges that can risk personnel's lives,
highlighting the need for data acquisition to win a military operation successfully. In this …

Cognitive Lightweight Logistic Regression‐Based IDS for IoT‐Enabled FANET to Detect Cyberattacks

K Rahman, MA Aziz, N Usman, T Kiren… - Mobile Information …, 2023 - Wiley Online Library
In recent few years, flying ad hoc networks are utilized more for interconnectivity. In the
topological scenario of FANETs, IoT nodes are available on ground where UAVs collect …

A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication

K Cengiz, S Lipsa, RK Dash, N Ivković… - IEEE access, 2024 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) are increasingly being deployed in crucial missions for
the armed forces, law enforcement, industrial control monitoring, and other sectors …