2018
DOI: 10.1109/mcom.2017.1700390
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy for the Internet of Drones: Challenges and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
132
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 296 publications
(149 citation statements)
references
References 15 publications
1
132
0
1
Order By: Relevance
“…Thus, the privacy leakage needs to be considered in the design of a security solution for the UAV networks. In [287], the authors study the security and privacy requirements of the internet of UAVs, and outline potential solutions to address challenging issues, including the privacy leakage, data confidentiality protection and flexible accessibility. In [286], the authors have surveyed the main security, privacy and safety aspects associated with the civilian drone usage in the national airspace.…”
Section: F Security and Privacymentioning
confidence: 99%
“…Thus, the privacy leakage needs to be considered in the design of a security solution for the UAV networks. In [287], the authors study the security and privacy requirements of the internet of UAVs, and outline potential solutions to address challenging issues, including the privacy leakage, data confidentiality protection and flexible accessibility. In [286], the authors have surveyed the main security, privacy and safety aspects associated with the civilian drone usage in the national airspace.…”
Section: F Security and Privacymentioning
confidence: 99%
“…Safety requirements, among many functional and nonfunctional requirements, are critical for transportation systems such as drones [46]. Although several attempts exist for safety assurance, incidents of drones still happen, often leading to interference in other transport systems like passenger aircraft and airports.…”
Section: Related Workmentioning
confidence: 99%
“…They contain air-to-ground channel modeling [4], resource and trajectory optimization [5], and spectrum management [6]. Moreover, cellular networks need to be planned [7] as a new MAC layer design is required [8] and security issues need to be addressed [9]. In this paper, trajectory and resources are optimized jointly based on the users' location.…”
Section: Introductionmentioning
confidence: 99%