Sybil attack refers to the situation when a malicious node falsely claims to have numerous identities and is known to be one of the security threats to the Internet of Things (IoT). Due to …
MA Lopez, GNN Barbosa… - 2022 1st International …, 2022 - ieeexplore.ieee.org
The next generation of mobile telecommunication networks should support an increasing number of smart devices, such as cell phones and sensors, provide real-time applications …
An optical inter-agent communication integrated into a relative localization system designed for the stabilization of teams of Unmanned Aerial Vehicles (UAVs) is introduced in this …
H Singh, S Verma, A Adhya - 2022 5th International …, 2022 - ieeexplore.ieee.org
The use of Unmanned Aerial Vehicles (UAVs) has grown in almost every field especially the defense and commercial sectors to accomplish a variety of tasks and services. These UAVs …
This paper investigates the robustness of the received signal strength (RSS)-based physical layer authentication (PLA) for wireless mesh networks, through experimental results …
The evolution and popular adaptation of drone technology in diverse applications has necessitated advancement of UAV communication framework. UAVs inherently support …
Jamming attacks, as a form of a denial-of-service attack, significantly degrade the performance of wireless communication systems and can lead to significant overhead in …
J Colter, M Kinnison, A Henderson… - 2022 IEEE/AIAA 41st …, 2022 - ieeexplore.ieee.org
An often overlooked but equally important aspect of unmanned aerial system (UAS) design is the security of their networking protocols and how they deal with cyberattacks. In this …
R Rotta, P Mykytyn - arXiv preprint arXiv:2401.11915, 2024 - arxiv.org
Unmanned Aerial Vehicles (UAVs) are evolving as adaptable platforms for a wide range of applications such as precise inspections, emergency response, and remote sensing …