[go: up one dir, main page]

Aljumah et al., 2025 - Google Patents

Challenges in securing UAV IoT framework: Future research perspective

Aljumah et al., 2025

Document ID
3327444629201191265
Author
Aljumah A
Ahanger T
Ullah I
Publication year
Publication venue
IEEE Transactions on Network and Service Management

External Links

Snippet

Unmanned Aerial Vehicles (UAVs) offer the immense capability for allowing novel applications in a variety of domains including security, military, surveillance, medicine, and traffic monitoring. The prevalence of UAV systems is due to the collaboration and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • H04W4/025Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Hassija et al. Fast, reliable, and secure drone communication: A comprehensive survey
Khan et al. Swarm of UAVs for network management in 6G: A technical review
Pandey et al. Security threats and mitigation techniques in UAV communications: A comprehensive survey
Gupta et al. Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges
Chandran et al. Multi-UAV networks for disaster monitoring: challenges and opportunities from a network perspective
Alsamhi et al. Survey on collaborative smart drones and internet of things for improving smartness of smart cities
Nguyen et al. Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication
Choudhary et al. Internet of drones (iod): Threats, vulnerability, and security perspectives
US20210088337A1 (en) System and method for service oriented cloud based management of internet of drones
Gupta et al. Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks
Agnew et al. Enhanced network metric prediction for machine learning-based cyber security of a software-defined UAV relay network
Aljumah et al. Challenges in securing UAV IoT framework: Future research perspective
Abbas et al. Integration of UAVs and FANETs in disaster management: A review on applications, challenges and future directions
Abouzaid et al. Agile roadmap for application‐driven Multi‐UAV networks: The case of COVID‐19
Mohsan et al. Towards the unmanned aerial vehicles (UAVs): A comprehensive review. Drones 2022, 6, 147
Svaigen et al. Security in the industrial Internet of Drones
Enayati et al. Location privacy protection for UAVs in package delivery and IoT data collection
Agarwal et al. Big Data Technologies in UAV's Traffic Management System: Importance, Benefits, Challenges and Applications
Hama et al. Enhanced security taxonomy for fog-enabled VANETs: A comprehensive survey on attacks, challenges, applications and architectures
Gorrepati et al. DroneMap: an IoT network security in internet of drones
Rajasoundaran et al. Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles
Al-Ahmed et al. UAV-enabled IoT networks: architecture, opportunities, and challenges
Abdelhafidh et al. Software-defined networking for flying ad-hoc network security: A survey
Gokilakrishnan et al. Analysis of the Requirement and Architecture for the Internet of Drones
Qin et al. Multi-type disaster scenario task offloading in air-ground integrated search and rescue networks: A blockchain-assisted MFL approach