A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs

HJ Hadi, Y Cao, KU Nisa, AM Jamil, Q Ni - Journal of Network and …, 2023 - Elsevier
In the past two decades, there has been a rapid development in the drone industry known as
Unmanned Aerial Vehicles (UAVs). Currently, the use of commercial UAVs has increased a …

Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey

AE Omolara, M Alawida, OI Abiodun - Neural computing and applications, 2023 - Springer
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …

Internet of drones security and privacy issues: Taxonomy and open challenges

M Yahuza, MYI Idris, IB Ahmedy, AWA Wahab… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Drones (IoD) is a decentralized network and management framework that links
drones' access to the controlled airspace and provides inter-location navigation services …

A survey on security and privacy issues of UAVs

Y Mekdad, A Aris, L Babun, A El Fergougui, M Conti… - Computer Networks, 2023 - Elsevier
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs),
has witnessed a rapid increase with its large number of airspace users. The tremendous …

A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems

MA Khan, I Ullah, A Alkhalifah… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving
the safety and reliability of transportation systems, particularly where data traffic is …

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

B Bera, AK Das, AK Sutrala - Computer Communications, 2021 - Elsevier
Drones, which are also known as Unmanned Aerial Vehicles (UAVs), are very useful in
delivering the packages, and real-time object detection and tracking with minimal human …

A lightweight authentication scheme for 6G-IoT enabled maritime transport system

SA Chaudhry, A Irshad, MA Khan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional
communication services but also additional processing, caching, sensing, and control …

Access control protocol for battlefield surveillance in drone-assisted IoT environment

B Bera, AK Das, S Garg, MJ Piran… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Surveillance drones, called as unmanned aerial vehicles (UAVs), are aircrafts that are
utilized to collect video recordings, still images, or live video of the targets, such as vehicles …

A neural computing-based access control protocol for AI-driven intelligent flying vehicles in industry 5.0-assisted consumer electronics

K Mahmood, T Tariq, AK Sangaiah… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the
development of key consumer applications, including Industry 5.0, autonomous decision …

Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

AK Mishra, M Wazid, DP Singh, AK Das, J Singh… - Drones, 2023 - mdpi.com
One of the most significant recent advances in technology is the advent of unmanned aerial
vehicles (UAVs), ie, drones. They have widened the scope of possible applications and …