2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High P 2016
DOI: 10.1109/bigdatasecurity-hpsc-ids.2016.57
|View full text |Cite
|
Sign up to set email alerts
|

Towards Trusted and Efficient UAV-Based Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 12 publications
0
10
0
1
Order By: Relevance
“…This IDS ignored other frequently used internet attacks focusing more on UAVs' attacks. Mohammed et al [9] parallelized UAVs with Mobile Ad hoc Networks (MANETs), investigating their similarities and applications. The research identified that, although UAV networks considered as a type of MANET, they require computationally lighter methods due to power constraints.…”
Section: Related Studiesmentioning
confidence: 99%
“…This IDS ignored other frequently used internet attacks focusing more on UAVs' attacks. Mohammed et al [9] parallelized UAVs with Mobile Ad hoc Networks (MANETs), investigating their similarities and applications. The research identified that, although UAV networks considered as a type of MANET, they require computationally lighter methods due to power constraints.…”
Section: Related Studiesmentioning
confidence: 99%
“…Moahmmed et al [ 22 ] analyzed the requirements for efficient UAV communication. They identified the similarities and differences between MANETs and FANETs, and discussed various trust-based protocols and management schemes that can be used in FANET.…”
Section: Background and Related Workmentioning
confidence: 99%
“…In [8], the authors analyzed the requirements for efficient UAV communications, identifying the similarities and the differences between MANETs and UAV-based networks and protocols. They also discussed the various trust-based protocols and management schemes that can be used in UAV networks.…”
Section: Main Existing Trust-based Solutionsmentioning
confidence: 99%
“…Furthermore, the attacks against service availability are generally related to packet drops and Denial of Service (DoS). Both kinds of attacks can be faced using either cryptographic techniques [7] or trust management techniques [8]. Cryptographic techniques are the best solution against outsider unauthorized entities, but these techniques are known to require high computation overhead and consume much energy, becoming a problem for current commercial UAVs [9].…”
Section: Introductionmentioning
confidence: 99%