2022
DOI: 10.1016/j.adhoc.2022.102894
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(21 citation statements)
references
References 100 publications
0
19
0
Order By: Relevance
“…The location of a user was randomly selected as the location of the first cluster center. 4. Go through all users, and get the horizontal distance from all the users to current cluster centers, then select the shortest distance as L i .…”
Section: Input: Number Of Uav and User Location Coordinatesmentioning
confidence: 99%
See 1 more Smart Citation
“…The location of a user was randomly selected as the location of the first cluster center. 4. Go through all users, and get the horizontal distance from all the users to current cluster centers, then select the shortest distance as L i .…”
Section: Input: Number Of Uav and User Location Coordinatesmentioning
confidence: 99%
“…Moreover, the existing ground base station is too heavy to meet the communication when the presence of large conference or sports events is hold, and ground base station is damaged in natural disasters such as earthquake or debris flow. To deal with the above problems, the unmanned aerial vehicles (UAV) base station is most widely used as the emergency communication in response to emergencies [3,4].UAV has widely attracted the attention of countries around the world because of the good mobility, low cost, convenient operation and other advantages [5,6]. Particularly,…”
mentioning
confidence: 99%
“…Authors in [240] provided a comprehensive review on routing protocols from a cross-layer design perspective. Furthermore, security risks are not taken into account by present routing protocols [435]. For improving UAV communication security in both the physical and network levels, authors in [435] [436] provided a thorough evaluation of the security countermeasures already in place.…”
Section: A Future Directions For Uav-assisted Wireless Networkmentioning
confidence: 99%
“…Furthermore, security risks are not taken into account by present routing protocols [435]. For improving UAV communication security in both the physical and network levels, authors in [435] [436] provided a thorough evaluation of the security countermeasures already in place. Ensuring efficient QoS is a challenging issue in UAV communication networks.…”
Section: A Future Directions For Uav-assisted Wireless Networkmentioning
confidence: 99%
“…The result shows that 2.4 GHz gives a higher delay but more coverage than 5 GHz. In [5] a recent attempt was made to enhance and optimize the performance of video transmission in FANET with a 5 GHz frequency band while analyzing throughput, retransmission attempts, and delay. Their results show that changing some metrics in WLAN interface cards can give better performance to the transmission.…”
Section: Related Workmentioning
confidence: 99%