2019
DOI: 10.1016/j.adhoc.2019.101970
|View full text |Cite
|
Sign up to set email alerts
|

An efficient cyber defense framework for UAV-Edge computing network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…The joint optimization considered the trajectory optimization, computing and communication resources allocated at the UAV, and task offloading decisions made at the IoT devices. UAV-assisted MECs for solving task offloading were discussed in detail by using different techniques [68][69][70][71][72][73][74].…”
Section: Uav Computingmentioning
confidence: 99%
“…The joint optimization considered the trajectory optimization, computing and communication resources allocated at the UAV, and task offloading decisions made at the IoT devices. UAV-assisted MECs for solving task offloading were discussed in detail by using different techniques [68][69][70][71][72][73][74].…”
Section: Uav Computingmentioning
confidence: 99%
“…The security was dealt with through a different prism in [86], where a reputation-based scheme was used. First, the UAVs were considered as mobile devices and part of a vehicular ecosystem to collect measurements from the environment.…”
Section: E Its Scenariosmentioning
confidence: 99%
“…Although MEC can provide better security than cloud computing owing to the short distance between users and the MEC server, the features of aerial MEC make it vulnerable to potential attacks. For example, the public and openaccess channels that UAVs use for communications may cause passive eavesdropping, active interfering, information leakage or manipulations, and denial of service (DoS) attacks, etc., while the detection of malicious nodes is difficult due to the dynamic network topology [183]. Existing solutions, such as the physical-layer security mechanisms and NFV/SDN-based security orchestration, have tried to address the eavesdropping and DoS attacks.…”
Section: Security Protection and Privacy Preservingmentioning
confidence: 99%