Security threats and mitigation techniques in UAV communications: A comprehensive survey

GK Pandey, DS Gurjar, HH Nguyen, S Yadav - IEEE Access, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have been instrumental in enabling many new
applications and services, including military and rescue operations, aerial surveillance …

Internet of drones security and privacy issues: Taxonomy and open challenges

M Yahuza, MYI Idris, IB Ahmedy, AWA Wahab… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

A proxy signature-based swarm drone authentication with leader selection in 5G networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - IEEE Access, 2022 - ieeexplore.ieee.org
Drones are imperative for the 5G architecture as a mobile source to expand network
coverage and support seamless services, particularly through enabling device-to-device …

Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environment

S Perumalla, S Chatterjee, APS Kumar - Theoretical Computer Science, 2023 - Elsevier
Abstract Internet of Drones (IoD) is a decentralized network and management framework
which connects drones' access to the limited airspace and offers inter-location navigation …

[HTML][HTML] Aerial footage analysis using computer vision for efficient detection of points of interest near railway tracks

R Sharma, K Patel, S Shah, M Aibin - Aerospace, 2022 - mdpi.com
Object detection is a fundamental part of computer vision, with a wide range of real-world
applications. It involves the detection of various objects in digital images or video. In this …

A proxy signature-based drone authentication in 5G D2D networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
5G is the beginning of a new era in cellular communication, bringing up a highly connected
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …

AI-assisted authentication: state of the art, taxonomy and future roadmap

G Zhu, Y Al-Qaraghuli - arXiv preprint arXiv:2204.12492, 2022 - arxiv.org
Artificial Intelligence (AI) has found its applications in a variety of environments ranging from
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …

Ocean medical waste detection for cpu-based underwater remotely operated vehicles (rovs)

A Lee, B Jiang, I Zeng, M Aibin - 2022 IEEE 13th Annual …, 2022 - ieeexplore.ieee.org
This paper explores the possibility of using computer vision and underwater Remotely
Operated Vehicles (ROVs) to detect medical waste, such as masks and gloves in oceans …

Authentication Schemes for Internet of Drones: Taxonomy, Threat Models, and Future Directions

ADE Berini, MA Ferrag, B Farou… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The Internet of Drones (IoD) has lately acquired popularity because to its flexibility to a broad
variety of difficult situations. Unmanned Aerial Vehicles (UAVs) can be utilised efficiently in …