Hassija et al., 2021 - Google Patents
Fast, reliable, and secure drone communication: A comprehensive surveyHassija et al., 2021
- Document ID
- 6891018167518867527
- Author
- Hassija V
- Chamola V
- Agrawal A
- Goyal A
- Luong N
- Niyato D
- Yu F
- Guizani M
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone …
- 238000004891 communication 0 title abstract description 114
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hassija et al. | Fast, reliable, and secure drone communication: A comprehensive survey | |
| Gupta et al. | Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges | |
| Hafeez et al. | Blockchain-assisted UAV communication systems: A comprehensive survey | |
| Shafique et al. | Survey of security protocols and vulnerabilities in unmanned aerial vehicles | |
| Yang et al. | A review on security issues and solutions of the internet of drones | |
| Choudhary et al. | Intrusion detection systems for networked unmanned aerial vehicles: A survey | |
| Michailidis et al. | Secure UAV-aided mobile edge computing for IoT: A review | |
| Wang et al. | A survey on security of UAV swarm networks: Attacks and countermeasures | |
| Ge et al. | A semi-autonomous distributed blockchain-based framework for UAVs system | |
| Sumra et al. | Security issues and challenges in MANET-VANET-FANET: A survey | |
| Sangeetha Francelin et al. | Intelligent agent and optimization‐based deep residual network to secure communication in UAV network | |
| Agnew et al. | Enhanced network metric prediction for machine learning-based cyber security of a software-defined UAV relay network | |
| Huang et al. | Exposing Spoofing Attack on Flocking‐Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence | |
| Mershad | PROACT: Parallel multi-miner proof of accumulated trust protocol for Internet of Drones | |
| Jadav et al. | Blockchain-based secure and intelligent data dissemination framework for uavs in battlefield applications | |
| Sachdeva et al. | Improving privacy and security in unmanned aerial vehicles network using blockchain | |
| Jain et al. | A walkthrough of blockchain-based internet of drones architectures | |
| Sachdeva et al. | Privacy and security improvement in UAV network using blockchain | |
| Svaigen et al. | Security in the industrial Internet of Drones | |
| Zhang et al. | Security in 6G-based autonomous vehicular networks: Detecting network anomalies with decentralized federated learning | |
| Srirangam et al. | Safety and security issues in employing drones | |
| BinSaeedan et al. | Security challenges for UAV Systems Communications: Potential attacks and countermeasures | |
| Zouhri et al. | A new adaptative security protocol for UAV network | |
| Aljumah et al. | Challenges in securing UAV IoT framework: Future research perspective | |
| Gorrepati et al. | DroneMap: an IoT network security in internet of drones |