Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance. The drone industry has been getting significant attention as a model of manufacturing, service and delivery convergence, introducing synergy with the coexistence of different emerging domains. UAVs offer implicit peculiarities such as increased airborne time and payload capabilities, swift mobility, and access to remote and disaster areas. Despite these potential features, including extensive variety of usage, high maneuverability, and cost-efficiency, drones are still limited in terms of battery endurance, flight autonomy and constrained flight time to perform persistent missions. Other critical concerns are battery endurance and the weight of drones, which must be kept low. Intuitively it is not suggested to load them with heavy batteries. This study highlights the importance of drones, goals and functionality problems. In this review, a comprehensive study on UAVs, swarms, types, classification, charging, and standardization is presented. In particular, UAV applications, challenges, and security issues are explored in the light of recent research studies and development. Finally, this review identifies the research gap and presents future research directions regarding UAVs.
In recent years, FANET-related research and development has doubled, due to the increased demands of unmanned aerial vehicles (UAVs) in both military and civilian operations. Equipped with more capabilities and unique characteristics, FANET is able to play a vital role in mission-critical applications. However, these distinctive features enforce a series of guidelines to be considered for its efficient deployment. Particularly, the use of FANET for on-time data communication services presents demanding challenges in terms of energy efficiency and quality of service (QoS). Proper use of communication architecture and wireless technology will assist to solve these challenges. Therefore, in this paper, we review different communication architectures, including the existing wireless technologies, in order to provide seamless wireless connectivity. Based on the discussions, we conclude that a multi-layer UAV ad-hoc network is the most suitable architecture for networking a group of heterogeneous UAVs, while Bluetooth 5 (802.15.1) is the most favored option because of its low-cost, low power consumption, and longer transmission range for FANET. However, 802.15.1 has the limitation of a lower data rate as compared to Wi-Fi (802.11). Therefore, we propose a hybrid wireless communication scheme so as to utilize the features of the high data transmission rate of 802.11 and the low-power consumption of 802.15.1. The proposed scheme significantly reduces communication cost and improves the network performance in terms of throughput and delay. Further, simulation results using the Optimized Network Engineering Tool (OPNET) further support the effectiveness of our proposed scheme.
Recently, the spectacular innovations in the fields of wireless body area networks (WBAN) and the Internet of Things (IoT) have made e-Care services rise as a promising application domain, which significantly advances the quality of the medical system, however, due to the openness of the wireless environment and privacy of people's physiological data, WBAN and IoT are prone to various cyber-a acks. There is a significant need for an efficient and highly secured cryptographic scheme that can meet the requirements of resource-constrained devices. Therefore, in this paper, we propose a certificate-based signcryption (CB-SN) scheme for the IoT-enabled WBAN. The proposed scheme is based on the concept of hyper-elliptic curve cryptography (HECC) that offers the same level of security as the elliptic curve and bilinear pairing with lower-key size. The formal security verification using the Automated Validation of the Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis demonstrate that the proposed scheme is not just reducing the complexity of resource-constrained IoT devices, but proves to be secure against several well-known cryptographic a acks. Moreover, performance comparison with relevant existing schemes authenticates that the proposed scheme is far more secure and energy efficient. different algorithms separately, i.e., signature and then encryption at the same time. In 1997, Zheng was the pioneer to merge these two processes in one algorithm, called signcryption [7]. This scheme is based on the concept of old public key cryptography (PKC), which is suffering from certificate overheads, renewing, and revocation problems [8]. Shamir was the first to propose an alternate concept of PKC, called identity-based cryptography (IBC) [9]. This technique removed the limitations of PKC and used the identity in place of a certificate. Later, in 2002, Malone-Lee [10], for the first time merged the concept of IBC with the signcryption technique, namely, identity-based signcryption (IBS). The IBS includes three entities, for example, a sender (signcrypter), a receiver (unsigncrypter), and the private key generation center (PKGC), respectively. In this setup, the users (signcrypter and unsigncrypter) generate their identities and after that, send it to the PKGC. Then, the PKGC produces and delivers the private keys for all the participating users, by using the secured networks. Unfortunately, IBS suffers from the key escrow issue (KEI), because the private key is generated by the PKGC and one can easily use this key for forging the digital signature and decrypting the ciphertext [11].To eliminate the above problem in IBS, in 2008, Barbosa and Farshim [12], put forward the concept of a certificateless signcryption (CL-SC) scheme. The CL-SC mechanism almost works the same as IBS, but the main difference is that the private key is generated by the users themselves. The central authority known as a key generation center (KGC) only provides the partial private key to the users by using an ...
Abstract:The ever-increasing demand for flexible and portable communications has led to a rapid evolution in networking between unmanned aerial vehicles (UAVs) often referred to as flying ad-hoc networks (FANETs). However, due to the exclusive characteristics of UAVs such as high mobility, frequent topology change and 3D space movement, make routing a challenging task in FANETs. Due to these characteristics, designing new routing protocols for FANETs is quite difficult. In the literature study of FANETs, a variety of traditional ad-hoc networking protocols have been suggested and tested for FANETs to establish an efficient and robust communication among the UAVs. In this context, topology-based routing is considered the most significant approach for solving the routing issues in FANETs. Therefore, in this article we specifically focus on topology-based routing protocols with the aim of improving the efficiency of the network in terms of throughput, end-to-end delay, and network load. We present a brief review of the most important topology-based routing protocols in the context of FANETs. We provide them with their working features for exchanging information, along with the pros and cons of each protocol. Moreover, simulation analyses of some of the topology-based routing protocols are also evaluated in terms of end-to-end delay, throughput and network load the using optimized network engineering tools (OPNET) simulator. Furthermore, this work can be used as a source of reference for researchers and network engineers who seek literature that is relevant to routing in FANETs.
The demand-side management (DSM) is one of the most important aspects in future smart grids: towards electricity generation cost by minimizing the expensive thermal peak power plants. The DSM greatly affects the individual users' cost and per unit cost. The main objective of this research article is to develop a generic demand-side management (G-DSM) model for residential users to reduce peak-to-average ratio (PAR), total energy cost, and waiting time of appliances (WTA) along with fast execution of the proposed algorithm. We propose a system architecture and mathematical formulation for total energy cost minimization, PAR reduction, and WTA. The G-DSM model is based on genetic algorithm (GA) for appliances scheduling and considers 20 users having a combination of appliances with different operational characteristics. Simulation results show the effectiveness of G-DSM model for both single and multiple user scenarios.
SUMMARYLoad management (LM) is supposed to have a vital role in future energy management systems. This article presents an overview and comparison of LM techniques along with related technologies and implementation challenges in smart grid. The article also covers consumer and utility concerns in context of LM to enhance readers' intuition about the topic. Two major categories of LM techniques, incentive-based and dynamic pricing-based schemes, have been discussed and compared. Most commonly used incentive-based direct load control is elaborated in detail. Dynamic pricing-based energy consumption scheduling schemes, featuring peak load reduction and consumers' energy cost minimization at residential level, are also emphasized. Furthermore, the article includes a description of dynamic pricing-based home energy management and associated optimization techniques as well as comparison of the latest schemes.
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e. Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs), a FANET promises uninterrupted connectivity, especially during events that are temporary and stipulate a massive audience reach. However, usually, the participating UAVs in a FANET environment are resource-constrained and are, therefore, prone to cyber-attacks. In order to resolve the issue and to enable a secure communication between the UAVs and the Base Station (BS), we propose a Certificateless Key-Encapsulated Signcryption (CL-KESC) scheme. The scheme is based on the concept of Certificateless Public Key Cryptography (CL-PKC). Since CL-PKC is immune to key escrow problems and thus one of the major drawbacks of the Identity-based Public Key Cryptography (ID-PKC) is addressed. Unfortunately, the existing construction models of CL-KESC rely on elliptic curve-based operations, which are computationally expensive for small UAVs. To counter the issue, in this paper, we present a new construction model of CL-KESC based on Hyperelliptic Curve Cryptography (HECC). HECC is an advanced version of the elliptic curve and is characterized by smaller parameter and key size. The key size stretches to a maximum of 80-bits, as opposed to the elliptic curve that demands a 160-bits key size. The proposed scheme proved to be superior, chiefly in terms of security and performance, as demonstrated by the results obtained from the security verification and by carrying out comparative analysis with the existing counterparts.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.