Security in internet of drones: A comprehensive review

S Samanth, P KV, M Balachandra - Cogent Engineering, 2022 - Taylor & Francis
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …

Securing multimedia using a deep learning based chaotic logistic map

C Rupa, M Harshitha, G Srivastava… - IEEE Journal of …, 2022 - ieeexplore.ieee.org
Telemedicine and online consultations with doctors has become very popular during the
pandemic and involves the transmission of medical data through the internet. Thus this …

[HTML][HTML] Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT

L Wang, Y Tian, J Xiong - Digital Communications and Networks, 2022 - Elsevier
Widespread applications of 5G technology have prompted the outsourcing of computation
dominated by the Internet of Things (IoT) cloud to improve transmission efficiency, which has …

[PDF][PDF] An interactive Study on secure data sharing in the IOT through Blockchain

ST Balkrushna, TS Jaysing, DM Ramesh, AS Dumbre - 2022 - academia.edu
At the same time as the information age is growing exponentially, the amount of data
produced by users is growing at an equally rapid pace. It is obvious that the storage space …