Fast, reliable, and secure drone communication: A comprehensive survey

V Hassija, V Chamola, A Agrawal… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Drone security is currently a major topic of discussion among researchers and industrialists.
Although there are multiple applications of drones, if the security challenges are not …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Challenges in intrusion detection for wireless ad-hoc networks

P Brutch, C Ko - 2003 Symposium on Applications and the …, 2003 - ieeexplore.ieee.org
This paper presents a brief survey of current research in intrusion detection for wireless ad-
hoc networks. In addition to examining the challenges of providing intrusion detection in this …

FANET: Communication, mobility models and security issues

A Chriki, H Touati, H Snoussi, F Kamoun - Computer Networks, 2019 - Elsevier
In the last decades, technological progress in electronic and avionic systems, mainly device
miniaturization and cost reduction, has boosted the performance of the UAV (Unmanned …

Secure routing in wireless sensor networks: Attacks and countermeasures

C Karlof, D Wagner - Ad hoc networks, 2003 - Elsevier
We consider routing security in wireless sensor networks. Many sensor network routing
protocols have been proposed, but none of them have been designed with security as a …

Intrusion detection in wireless ad-hoc networks

Y Zhang, W Lee - Proceedings of the 6th annual international …, 2000 - dl.acm.org
As the recent denial-of-service attacks on several major Internet sites have shown us, no
open computer network is immune from intrusions. The wireless ad-hoc network is …

Statistical en-route filtering of injected false data in sensor networks

F Ye, H Luo, S Lu, L Zhang - IEEE Journal on selected areas in …, 2005 - ieeexplore.ieee.org
In a large-scale sensor network individual sensors are subject to security compromises. A
compromised node can be used to inject bogus sensing reports. If undetected, these bogus …

Eviction of misbehaving and faulty nodes in vehicular networks

M Raya, P Papadimitratos, I Aad… - IEEE journal on …, 2007 - ieeexplore.ieee.org
Vehicular networks (VNs) are emerging, among civilian applications, as a convincing
instantiation of the mobile networking technology. However, security is a critical factor and a …

Intrusion detection in wireless ad hoc networks

A Mishra, K Nadkarni, A Patcha - IEEE wireless …, 2004 - ieeexplore.ieee.org
Intrusion detection has, over the last few years, assumed paramount importance within the
broad realm of network security, more so in the case of wireless ad hoc networks. These are …

Channel surfing and spatial retreats: defenses against wireless denial of service

W Xu, T Wood, W Trappe, Y Zhang - … of the 3rd ACM workshop on …, 2004 - dl.acm.org
Wireless networks are built upon a shared medium that makes it easy for adversaries to
launch denial of service (DoS) attacks. One form of denial of service is targeted at preventing …