2016
DOI: 10.1002/dac.3144
|View full text |Cite
|
Sign up to set email alerts
|

Teredo tunneling‐based secure transmission between UAVs and ground ad hoc networks

Abstract: SUMMARYCoordination between distributed ad hoc units requires ambient intelligence to form a guidance system. The network formed by this coordination comprises two variedly operating ad hoc units. One such coordinating network is formed between the unmanned aerial vehicles (UAVs) and the ground nodes. Such network formations require highly sensitive and fault-tolerant data transfer over the secure channels. A secure channel is required that can ensure the secure connectivity between nodes of the two networks. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 29 publications
(40 reference statements)
0
4
0
Order By: Relevance
“…However, security issues, like unauthorized access, malicious control, illegal connection, or other malicious attacks, require strategic solutions without compromising performance. Identifying and mitigating threats in UAV networks efficiently and effectively is a first step to secure UAV networks [18,22].…”
Section: Research Challengesmentioning
confidence: 99%
“…However, security issues, like unauthorized access, malicious control, illegal connection, or other malicious attacks, require strategic solutions without compromising performance. Identifying and mitigating threats in UAV networks efficiently and effectively is a first step to secure UAV networks [18,22].…”
Section: Research Challengesmentioning
confidence: 99%
“…(1) Input: Current State, DNM -and (2) Output: Decision for continuity or change link (3) set interval (4) while Transmission Continues do (5) check for interval (6) request periodic update (7) select most communicating node from each layer (8) send virtual control to the node (9) receive and map state dependencies (10) if ambiguous ‖S < ‖ < then (11) eliminate node from state-dependencies (12) update neighbours (13) else (14) continue (15) Proof. From (9)-(11), the knowledge and depth increase affecting the connectivity between the nodes; this connectivity directly affects the probability of connections between the nodes as the number of subgraphs containing the source and destination will increase with an increase in the overall degree of the nodes.…”
Section: Mobile Information Systemsmentioning
confidence: 99%
“…The proposed approach uses unmanned aerial vehicles (UAVs) as intermediate flying routers between the fixed on-ground nodes to provide immediate and efficient connectivity. UAVs can fly in controlled as well as autonomous formations [12,13]. UAVs have already proven their utility in the upcoming networks and can provide coverage over the large areas [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Vulnerability assessment is a good tool to identify the potential threats an aerial network might face [9][10] [11]. A robust and reliable system is of significant interest in aerial drone systems [12][13] [14]. Attacks on UAVs are regarded as a component of the cyberphysical system, hence UAVs are proportional to cyber systems and hence they are studied and evaluated to identify threats and devise countermeasures [15] [16].…”
Section: Fig1 Introduction To Drone Communicationmentioning
confidence: 99%