2023
DOI: 10.11591/eei.v12i1.4239
|View full text |Cite
|
Sign up to set email alerts
|

Design security architecture for unmanned aerial vehicles by 5G cloud network based implementation of SDN with NFV and AI

Abstract: A recent progression of unmanned aerial vehicles (UAV) augmentation its employments for different applications. It’s also vulnerable to being, stolen, lost, stray, or destroyed at status of a security infringements for the UAV network. The proposed strategy is defending against of different attacks through using artificial intelligence by implements five steps: RGSK, GCSCS, SEDC, HSSC, and FVNF. UAV authentication is happened in the first step through the Curve448. We performance deep reinforcement learning to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 30 publications
(33 reference statements)
0
1
0
Order By: Relevance
“…Packet forwarding is delayed because of the predetermined waiting time if batch hashing is used directly for service path validation, resulting in longer average waiting times between packets. The fixed waiting time must be accurately determined to adopt batch hashing efficiently 27 . Let the packets arrive in a queue at an arrival rate and inter-packet arrival time, as indicated in Fig.…”
Section: Methodsmentioning
confidence: 99%
“…Packet forwarding is delayed because of the predetermined waiting time if batch hashing is used directly for service path validation, resulting in longer average waiting times between packets. The fixed waiting time must be accurately determined to adopt batch hashing efficiently 27 . Let the packets arrive in a queue at an arrival rate and inter-packet arrival time, as indicated in Fig.…”
Section: Methodsmentioning
confidence: 99%