2022
DOI: 10.1007/978-981-16-9012-9_36
|View full text |Cite
|
Sign up to set email alerts
|

Review of Security Gaps in Optimal Path Selection in Unmanned Aerial Vehicles Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
1
0
Order By: Relevance
“…Integrity ensures data consistency, accuracy, and reliability. Availability ensures that access to data will be easy for authorized parties [78]. The security protocols are one of the methods that implement mentioned rules.…”
Section: Denial Of Service (Dos) Attackmentioning
confidence: 99%
“…Integrity ensures data consistency, accuracy, and reliability. Availability ensures that access to data will be easy for authorized parties [78]. The security protocols are one of the methods that implement mentioned rules.…”
Section: Denial Of Service (Dos) Attackmentioning
confidence: 99%
“…In this context, on one hand, blockchain is emerging as a promising technology to provide the confidentiality and integrity of exchanged data between UAV devices, and generate trust between the involved UAVs, without the need for a trusted third entity [4,5]. On the other hand, collaborative/distributed Deep Learning (DL), such as Federated Learning (FL), emerges also to not only optimize UAV network management and thus meeting the requirement of their emerged applications, but also to ensure the UAVs' privacy by keeping the needed data (i.e., sensed data) on UAV devices [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%