A review on UAV wireless charging: Fundamentals, applications, charging techniques and standards

PK Chittoor, B Chokkalingam, L Mihet-Popa - IEEE access, 2021 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) are becoming increasingly popular for applications such
as inspections, delivery, agriculture, surveillance, and many more. It is estimated that, by …

Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction

FF Ashrif, EA Sundararajan, R Ahmad… - Journal of Network and …, 2023 - Elsevier
The advent of the Internet of Things (IoT) technology and the term “connect everything to
everything” bring up a new standard for IPv6 over Low-power Wireless Personal Area …

Security and privacy for reconfigurable intelligent surface in 6G: A review of prospective applications and challenges

F Naeem, M Ali, G Kaddoum, C Huang… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
While sixth-generation (6G) wireless systems are expected to bring about an explosion of
accessible user information and novel technologies, along with new threats to terrestrial and …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead

P Yue, J An, J Zhang, J Ye, G Pan… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Low Earth Orbit (LEO) satellites undergo a period of rapid development driven by ever-
increasing user demands, reduced costs, and technological progress. Since there is a lack …

Mitigating jamming attack in 5G heterogeneous networks: A federated deep reinforcement learning approach

H Sharma, N Kumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Jamming attack is one of the serious security breaches in the upcoming fifth-generation
heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such …

[HTML][HTML] Cyber4drone: A systematic review of cyber security and forensics in next-generation drones

V Sihag, G Choudhary, P Choudhary, N Dragoni - Drones, 2023 - mdpi.com
Cyber Security and forensics for Unmanned Aerial Vehicles (UAVs) pose unique
requirements, solutions, and challenges. As UAVs become increasingly prevalent for …

Security of satellite-terrestrial communications: Challenges and potential solutions

I Ahmad, J Suomalainen, P Porambage, A Gurtov… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …

IoT Zigbee device security: A comprehensive review

A Zohourian, S Dadkhah, ECP Neto, H Mahdikhani… - Internet of Things, 2023 - Elsevier
Zigbee is a well-known wireless network communications protocol designed specifically for
low-cost, low-power, low-rate IoT devices, networks and applications. It has become one of …

A survey on cryptographic methods to secure communications for UAV traffic management

R Aissaoui, JC Deneuville, C Guerber… - Vehicular …, 2023 - Elsevier
Abstract Unmanned Aerial Systems (UAS) have a wide variety of applications, and their
development in terms of capabilities is continuously evolving. Many missions performed by …