Towards resilient UAV swarms—A breakdown of resiliency requirements in UAV swarms

A Phadke, FA Medrano - Drones, 2022 - mdpi.com
UAVs have rapidly become prevalent in applications related to surveillance, military
operations, and disaster relief. Their low cost, operational flexibility, and unmanned …

Distributed denial of service (DDoS) mitigation using blockchain—A comprehensive insight

S Wani, M Imthiyas, H Almohamedh, KM Alhamed… - Symmetry, 2021 - mdpi.com
Distributed Denial of Service (DDoS) attack is a major threat impeding service to legitimate
requests on any network. Although the first DDoS attack was reported in 1996, the …

Investigation on vulnerabilities, threats and attacks prohibiting UAVs charging and depleting UAVs batteries: Assessments & countermeasures

F Tlili, LC Fourati, S Ayed, B Ouni - Ad hoc networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are the current leading devices used by different sectors.
They open doors to new opportunities for investors and business service providers. Their …

Quantum cryptography-as-a-service for secure UAV communication: applications, challenges, and case study

VK Ralegankar, J Bagul, B Thakkar, R Gupta… - IEEE …, 2021 - ieeexplore.ieee.org
The sudden demand rises in security made researchers come up with solutions that provide
instantaneous safety better than the state of the art solutions. The quest for securing data …

An extensive blockchain based applications survey: Tools, frameworks, opportunities, challenges and solutions

K Agrawal, M Aggarwal, S Tanwar, G Sharma… - IEEE …, 2022 - ieeexplore.ieee.org
Many security standards and cryptographic solutions exist for different applications such as
agriculture, aircraft, banking systems and etc. but a more effective and efficient solution can …

Drone transportation system: Systematic review of security dynamics for smart mobility

SO Ajakwe, DS Kim, JM Lee - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The intelligence and integrity of a real-time cyber–physical system depend on how
trustworthy the data's legitimacy, appropriation, and authorization are during end-to-end …

Towards security automation in software defined networks

NM Yungaicela-Naula, C Vargas-Rosales… - Computer …, 2022 - Elsevier
Abstract Software-Defined Networking (SDN) is a modern paradigm that provides a platform
for implementing reliable, centrally managed, and automated security solutions for …

Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network security

AB Mohammed, LC Fourati, AM Fakhrudeen - Computer Networks, 2023 - Elsevier
Abstract Unmanned Aerial Vehicles (UAVs) have evolved into a pivotal component of
electronic devices deployed across a diverse array of sectors and industries in recent years …

Building integrated photovoltaics 4.0: Digitization of the photovoltaic integration in buildings for a resilient infra at large scale

D Singh, SV Akram, R Singh, A Gehlot, D Buddhi… - Electronics, 2022 - mdpi.com
Building integrated photovoltaic (BIPV) systems have gained a lot of attention in recent years
as they support the United Nations' sustainable development goals of renewable energy …

A self-adaptive intrusion detection system for securing UAV-to-UAV communications based on the human immune system in UAV networks

R Fotohi, M Abdan, S Ghasemi - Journal of Grid Computing, 2022 - Springer
Today, the use of Unmanned aerial vehicles (UAVs) technology has made significant
progress due to its widespread use. UAVs are widely used in agriculture, commercial …