Unmanned aerial vehicles' remote identification: A tutorial and survey

K Belwafi, R Alkadi, SA Alameri, H Al Hamadi… - IEEE …, 2022 - ieeexplore.ieee.org
UAV remote identification is an emerging technology that allows ground observers to identify
a drone in the airspace and obtain information about it and its operator. The goal is to …

A review on software-based and hardware-based authentication mechanisms for the Internet of Drones

ET Michailidis, D Vouyioukas - Drones, 2022 - mdpi.com
During the last few years, a wide variety of Internet of Drones (IoD) applications have
emerged with numerous heterogeneous aerial and ground network elements …

A verifiably secure ECC based authentication scheme for securing IoD using FANET

SU Jan, IA Abbasi, F Algarni, AS Khan - IEEE Access, 2022 - ieeexplore.ieee.org
Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee
secure communication through unfavorable and unsafe channels. The speedy development …

Privacy-aware remote identification for unmanned aerial vehicles: current solutions, potential threats, and future directions

P Tedeschi, FA Al Nuaimi, AI Awad… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The Federal Aviation Administration (FAA) recently introduced a new standard, namely,
remote identification, to improve accountability for unmanned aerial vehicles (UAVs) …

Lmas-shs: A lightweight mutual authentication scheme for smart home surveillance

SU Jan, IA Abbasi, MA Alqarni - IEEE Access, 2022 - ieeexplore.ieee.org
The network-enabled smart objects are evolving everywhere in the modern era to solve
numerous problems like real-world data collection from the environment, communication …

Smart flood detection with AI and blockchain integration in Saudi Arabia using drones

A Alsumayt, N El-Haggar, L Amouri, ZM Alfawaer… - Sensors, 2023 - mdpi.com
Global warming and climate change are responsible for many disasters. Floods pose a
serious risk and require immediate management and strategies for optimal response times …

Game theory-based optimal cooperative path planning for multiple uavs

L Van Nguyen, MD Phung, QP Ha - IEEE Access, 2022 - ieeexplore.ieee.org
This paper presents new cooperative path planning algorithms for multiple unmanned aerial
vehicles (UAVs) using Game theory-based particle swarm optimization (GPSO). First, the …

Public blockchain-envisioned security scheme using post quantum lattice-based aggregate signature for internet of drones applications

P Bagchi, R Maheshwari, B Bera… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Due to high effectiveness and robust security protocols, lattice-based cryptography becomes
a very broadly applicable optimistic post-quantum technique that is recently used in public …

Secure UAV (Drone) and the Great Promise of AI

B Zolfaghari, M Abbasmollaei, F Hajizadeh… - ACM Computing …, 2024 - dl.acm.org
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …

A novel parallel heuristic method to design a sustainable medical waste management system

A Amirteimoori, EB Tirkolaee, A Amirteimoori… - Journal of Cleaner …, 2024 - Elsevier
Efficient management of waste generated in healthcare systems is crucial to minimize its
environmental impact and ensure public health. Sustainable medical waste management …