2021
DOI: 10.4018/978-1-7998-4963-6.ch006
|View full text |Cite
|
Sign up to set email alerts
|

Connectivity Management in Drone Networks

Abstract: Drone technologies have attracted the attention of many researchers in recent years due to their potential opportunities. Fleets of drones integrated with widely available relatively short-range communication technologies have various application areas such as wildlife monitoring, disaster relief, and military surveillance. One of the major problems in this manner is maintaining the connectivity of the drone network. In this chapter, the authors study the connectivity management issues in drone networks. First… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…For example, the drones may proceed to a predefined rendezvous point or a previous checkpoint to escape from the trap. More of such strategies on connectivity restoration can be found in [35]- [38]. As a fine-tuned variant, some availability attacks solely draw a bead on nodes with critical functionalities by detecting them via means of traffic analysis; however, this is rarely feasible in highly mobile networks.…”
Section: ) Availability Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the drones may proceed to a predefined rendezvous point or a previous checkpoint to escape from the trap. More of such strategies on connectivity restoration can be found in [35]- [38]. As a fine-tuned variant, some availability attacks solely draw a bead on nodes with critical functionalities by detecting them via means of traffic analysis; however, this is rarely feasible in highly mobile networks.…”
Section: ) Availability Attacksmentioning
confidence: 99%
“…Content may change prior to final publication. connectivity restoration solutions can be applied (as in [35]- [38]), the authentication protocol can be initiated once the drones recover from the attack. On the other hand, flooding replayed, counterfeit or void authentication messages aim at the availability of the network on higher layers.…”
Section: ) Denial Of Servicementioning
confidence: 99%
“…The large and dense canopy of oil palm trees can sometimes affect the connectivity of drone signals. [8].…”
mentioning
confidence: 99%