2020
DOI: 10.1007/978-3-030-38712-9_2
|View full text |Cite
|
Sign up to set email alerts
|

UAVs Healthcare Applications, Communication Protocols, Deployment Strategies, and Security Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Thus, the adversary can extract or tamper with the transmitted data. However, the UAV components are not modeled with the security approaches 5,6 . Insufficient security and drone movement cause problems, including excessive latency, high energy usage, and unauthorized access 7 …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, the adversary can extract or tamper with the transmitted data. However, the UAV components are not modeled with the security approaches 5,6 . Insufficient security and drone movement cause problems, including excessive latency, high energy usage, and unauthorized access 7 …”
Section: Introductionmentioning
confidence: 99%
“…However, the UAV components are not modeled with the security approaches. 5,6 Insufficient security and drone movement cause problems, including excessive latency, high energy usage, and unauthorized access. 7 Due to the vulnerability of drone networks, such as data tampering, identity forgery, and passive eavesdropping, ensuring the privacy and integrity of the system is challenged.…”
mentioning
confidence: 99%