Fast, reliable, and secure drone communication: A comprehensive survey

V Hassija, V Chamola, A Agrawal… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …

[HTML][HTML] UAV ad hoc network routing algorithms in space–air–ground integrated networks: Challenges and directions

Y Lu, W Wen, KK Igorevich, P Ren, H Zhang, Y Duan… - Drones, 2023 - mdpi.com
With the rapid development of 5G and 6G communications in recent years, there has been
significant interest in space–air–ground integrated networks (SAGINs), which aim to achieve …

Survey of security protocols and vulnerabilities in unmanned aerial vehicles

A Shafique, A Mehmood, M Elhadef - IEEE Access, 2021 - ieeexplore.ieee.org
With the rapid growth in technology, the use of Unmanned Aerial Vehicles (UAVs) have
increased in civil and military applications including rescue operations, disaster recovery …

A blockchain-based secure crowd monitoring system using UAV swarm

W Xiao, M Li, B Alzahrani, R Alotaibi, A Barnawi… - IEEE …, 2021 - ieeexplore.ieee.org
Intelligent UAV-based monitoring systems are becoming an essential apparatus for crowd
monitoring as they have proven to be viable and cost-effective solutions. Applications of …

[HTML][HTML] A data normalization technique for detecting cyber attacks on UAVs

E Basan, A Basan, A Nekrasov, C Fidge, E Abramov… - Drones, 2022 - mdpi.com
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main
modules: a data acquisition module for data processing and a normalization module. One of …

A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions

O Ceviz, P Sadioglu, S Sen - arXiv preprint arXiv:2306.14281, 2023 - arxiv.org
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …

Network wormhole attacks without a traditional wormhole

N Schweitzer, A Dvir, A Stulman - Ad Hoc Networks, 2023 - Elsevier
A prudent attacker tries to maximize profits during an attack, taking into account the
investment cost for carrying out the attack; a cost which always exists. This includes the effort …

Security Analysis of UAV Communication Protocols: Solutions, Prospects, and Encounters

PP Kumar, TA Kumar, P Muthu… - The Internet of …, 2022 - taylorfrancis.com
Unmanned aircraft can be piloted independently or remotely by ground crews, and can save
lives by putting people out of work in unsafe conditions. Typical UAV applications include …

A scalable secure routing protocol for managed-open mobile ad-hoc networks

L Qabajeh - 2022 - scholar.ppu.edu
Mobile Ad-hoc networks are getting progressively more popular. In such networks, nodes
are continuously moving, hence, seeking an efficient route from a particular source to …

Intuitionistic fuzzy VIKOR based routing discovery method for UAV ad hoc networks

JJ Zhou, YA Zhu, L Li, YH Liu - 2022 IEEE 8th International …, 2022 - ieeexplore.ieee.org
The existing reaction routing protocol uses broadcast route request (RREQ) for routing
discovery. However, broadcast RREQ by flooding may cause redundant message relays …