2020
DOI: 10.1007/s11227-020-03462-0
|View full text |Cite
|
Sign up to set email alerts
|

Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles

Abstract: Unmanned Aerial Vehicles (UAVs) can be deployed to monitor very large areas without the need for network infrastructure. UAVs communicate with each other during flight and exchange information with each other. However, such communication poses security challenges due to its dynamic topology. To solve these challenges, the proposed method uses two phases to counter malicious UAV attacks. In the first phase, we applied a number of rules and principles to detect malicious UAVs. In this phase, we try to identify a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 48 publications
(23 citation statements)
references
References 28 publications
(38 reference statements)
0
22
0
Order By: Relevance
“…As different types of UAVs are used for different applications such as wireless coverage, remote sensing, real-time monitoring, search and rescue operations, surveillance, and delivery of goods, it is important to choose the right UAV and the suitable scheme for each specific application. For instance, in Table 5, it can be seen that the scheme which was developed in [75] is suitable for wireless coverage and surveillance. Similarly, Table 6 provides an analysis of the existing schemes in terms of used technologies.…”
Section: Rules-based Intrusion Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…As different types of UAVs are used for different applications such as wireless coverage, remote sensing, real-time monitoring, search and rescue operations, surveillance, and delivery of goods, it is important to choose the right UAV and the suitable scheme for each specific application. For instance, in Table 5, it can be seen that the scheme which was developed in [75] is suitable for wireless coverage and surveillance. Similarly, Table 6 provides an analysis of the existing schemes in terms of used technologies.…”
Section: Rules-based Intrusion Detectionmentioning
confidence: 99%
“…Similarly, Table 6 provides an analysis of the existing schemes in terms of used technologies. For example, the scheme presented in [75] supports secure communication. By incorporating the image processing technology, one can securely communicate by sending the encrypted digital data such as images.…”
Section: Rules-based Intrusion Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The distributed fuzzy logic module eliminates the linear nodes of complexity from the Safety Aware Fuzzy Enhanced Ant Colony Optimization (SAFEACO) [14] routing process, resisting black hole, Sybil and inundation attacks at the same time. In [15], it uses two phases to counter malicious Unmanned aerial vehicles (UAVs) attacks. Firstly, they identify and remove malicious UAVs.…”
Section: Related Workmentioning
confidence: 99%
“… italicDR=()italicTPRTPR+FNR*1000.24emwhere0.24emAll=italicTPR+italicTNR+italicFPR+italicFNR FPR: The FPR is determined by the total number of nodes mistakenly found as the malevolent nodes divided by the total number of usual nodes 18–20 . Hence, Equation illustrates the italicFPR=()italicFPRFPR+TNR*100,where0.25emitalicTNR=()italicTNRTNR+FPR*100 FNR: The rate of the malevolent node to total normal nodes incorrectly signed as a normal node 21–25 . The calculation is proved by Equation .…”
Section: Performance Evaluationmentioning
confidence: 99%