2019 9th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2019
DOI: 10.1109/confluence.2019.8776613
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(25 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…2) Unmanned Aerial Vehicles (UAV): UAVs or drones will also present an important part in 6G as high-data-rate wireless connectivity will be required. Here, blockchain can play a major role to contribute to the protection of the security and privacy of the drones and thereby collected information [32]. Li et al [33] also illustrate the significance of 5G in UAV context.…”
Section: Artificial Intelligence (Ai)mentioning
confidence: 99%
“…2) Unmanned Aerial Vehicles (UAV): UAVs or drones will also present an important part in 6G as high-data-rate wireless connectivity will be required. Here, blockchain can play a major role to contribute to the protection of the security and privacy of the drones and thereby collected information [32]. Li et al [33] also illustrate the significance of 5G in UAV context.…”
Section: Artificial Intelligence (Ai)mentioning
confidence: 99%
“…Jensen et al 45 conversed on how the applicability of blockchain can handle various cyber‐attacks in UAV swarm networks, even though only Hyperledger Fabric framework has been explored for drone swarm. Rana et al 46 signified ways to improve drone security and UAVs by means of blockchain technology, focusing on generic access control mechanisms to increase drone connectivity. Then, Koubaa et al 47 assimilated the cloud computing approach with drones to address latency and cost issues.…”
Section: State‐of‐the‐art Techniquesmentioning
confidence: 99%
“…This will result in highly sensitive information being vulnerable to hackers intercepting the data mid-flight or from the drone base. Tarun Rana et al describe stronger encryption methods using Blockchain technology with Private and Public key cryptography [44]. These methods or similar will be necessary to provide optimal protection to defend against these types of security risks.…”
Section: Ethical and Societal Challengesmentioning
confidence: 99%