Aljumah et al., 2025 - Google Patents
Challenges in securing UAV IoT framework: Future research perspectiveAljumah et al., 2025
- Document ID
- 3327444629201191265
- Author
- Aljumah A
- Ahanger T
- Ullah I
- Publication year
- Publication venue
- IEEE Transactions on Network and Service Management
External Links
Snippet
Unmanned Aerial Vehicles (UAVs) offer the immense capability for allowing novel applications in a variety of domains including security, military, surveillance, medicine, and traffic monitoring. The prevalence of UAV systems is due to the collaboration and …
- 238000011160 research 0 title description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/025—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/12—Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hassija et al. | Fast, reliable, and secure drone communication: A comprehensive survey | |
| Khan et al. | Swarm of UAVs for network management in 6G: A technical review | |
| Pandey et al. | Security threats and mitigation techniques in UAV communications: A comprehensive survey | |
| Gupta et al. | Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges | |
| Chandran et al. | Multi-UAV networks for disaster monitoring: challenges and opportunities from a network perspective | |
| Alsamhi et al. | Survey on collaborative smart drones and internet of things for improving smartness of smart cities | |
| Nguyen et al. | Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication | |
| Choudhary et al. | Internet of drones (iod): Threats, vulnerability, and security perspectives | |
| US20210088337A1 (en) | System and method for service oriented cloud based management of internet of drones | |
| Gupta et al. | Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks | |
| Agnew et al. | Enhanced network metric prediction for machine learning-based cyber security of a software-defined UAV relay network | |
| Aljumah et al. | Challenges in securing UAV IoT framework: Future research perspective | |
| Abbas et al. | Integration of UAVs and FANETs in disaster management: A review on applications, challenges and future directions | |
| Abouzaid et al. | Agile roadmap for application‐driven Multi‐UAV networks: The case of COVID‐19 | |
| Mohsan et al. | Towards the unmanned aerial vehicles (UAVs): A comprehensive review. Drones 2022, 6, 147 | |
| Svaigen et al. | Security in the industrial Internet of Drones | |
| Enayati et al. | Location privacy protection for UAVs in package delivery and IoT data collection | |
| Agarwal et al. | Big Data Technologies in UAV's Traffic Management System: Importance, Benefits, Challenges and Applications | |
| Hama et al. | Enhanced security taxonomy for fog-enabled VANETs: A comprehensive survey on attacks, challenges, applications and architectures | |
| Gorrepati et al. | DroneMap: an IoT network security in internet of drones | |
| Rajasoundaran et al. | Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles | |
| Al-Ahmed et al. | UAV-enabled IoT networks: architecture, opportunities, and challenges | |
| Abdelhafidh et al. | Software-defined networking for flying ad-hoc network security: A survey | |
| Gokilakrishnan et al. | Analysis of the Requirement and Architecture for the Internet of Drones | |
| Qin et al. | Multi-type disaster scenario task offloading in air-ground integrated search and rescue networks: A blockchain-assisted MFL approach |