Academic literature on the topic 'Private UAVs network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private UAVs network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Private UAVs network"

1

Jyot Singh, Prabhu, and Rohan De Silva. "Allocation of Control and User Data Channels for Private UAV Networks." International Journal of Engineering & Technology 7, no. 4.40 (2018): 21–25. http://dx.doi.org/10.14419/ijet.v7i4.40.24028.

Full text
Abstract:
Unmanned Aerial Vehicle (UAV) industry shows rapid growth in producing sophisticated UAVs for civilian use in recent years. With the invention of private UAV networks, these UAVs can now be used in a UAV network owned by a single organization or a person. For example, a private UAV network gives the ability for a farmer to monitor the farm from one location or to locate people in a natural disaster-stricken area. The wireless communication paths between UAVs and the ground station in a private UAV network play a vital role in transmitting video to the ground station. It is also necessary that
APA, Harvard, Vancouver, ISO, and other styles
2

Hossain, Md Imran, Murat Tahtali, Ugur Turhan, and Kamanashis Biswas. "Blockchain Integration in UAV Networks: Performance Metrics and Analysis." Sensors 24, no. 23 (2024): 7813. https://doi.org/10.3390/s24237813.

Full text
Abstract:
Blockchain technology has revolutionized the management of Unmanned Aerial Vehicle (UAV) networks by enhancing security, enabling decentralized control, and improving operational efficiency. This study assesses the efficiency of private blockchain architectures in UAV networks, specifically examining important performance metrics such as throughput, latency, scalability, and packet size. Furthermore, we evaluate the effectiveness of UAV networks when integrating private blockchain technologies, focusing particularly on key performance indicators such as area, altitude, and data rate. The scope
APA, Harvard, Vancouver, ISO, and other styles
3

Prabhu, Jyot Singh, and de Silva Rohan. "SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES." International Journal of Computer Networks & Communications (IJCNC) 12, no. 3 (2020): 97–112. https://doi.org/10.5281/zenodo.3955605.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) or drones have become extremely popular and are used in various commercial applications. When multiple UAVs communicate and work together, they form a UAV network. A private UAV network or Local Area Network of Drones (LoDs) is a special type of UAV network which has the minimum number of UAVs to carry out a certain task. All UAVs in a LoD use the wireless medium to send and receive the data as well as the control signals. An organization or a single owner will be more interested in this type of network, where they want multiple UAVs to scan an area, communicate
APA, Harvard, Vancouver, ISO, and other styles
4

Ji, Ran, Jian Wang, Chaojing Tang, and Ruilin Li. "Automatic Reverse Engineering of Private Flight Control Protocols of UAVs." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1308045.

Full text
Abstract:
The increasing use of civil unmanned aerial vehicles (UAVs) has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands colle
APA, Harvard, Vancouver, ISO, and other styles
5

Tursunboev, Jamshid, Yong-Sung Kang, Sung-Bum Huh, Dong-Woo Lim, Jae-Mo Kang, and Heechul Jung. "Hierarchical Federated Learning for Edge-Aided Unmanned Aerial Vehicle Networks." Applied Sciences 12, no. 2 (2022): 670. http://dx.doi.org/10.3390/app12020670.

Full text
Abstract:
Federated learning (FL) allows UAVs to collaboratively train a globally shared machine learning model while locally preserving their private data. Recently, the FL in edge-aided unmanned aerial vehicle (UAV) networks has drawn an upsurge of research interest due to a bursting increase in heterogeneous data acquired by UAVs and the need to build the global model with privacy; however, a critical issue is how to deal with the non-independent and identically distributed (non-i.i.d.) nature of heterogeneous data while ensuring the convergence of learning. To effectively address this challenging is
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xuan, Hongping Shen, Binhui Liu, Xiaojun Yin, and Qi Peng. "Research on High Reliable Multimode Wireless Communication Technology for UAV." Frontiers in Computing and Intelligent Systems 2, no. 3 (2023): 89–93. http://dx.doi.org/10.54097/fcis.v2i3.5317.

Full text
Abstract:
High definition image transmission and remote control are typical applications of UAVs, which has spawned a large number of new scenes. This paper proposes a multimode wireless communication method and image transmission strategy for UAV based on the integration of public network and private network. By building at least two wireless communication links including public network and private network, the image data is encoded after obtaining its channel parameters, and the encoded image data is sent through the two links. The experimental results show that the proposed method improves the reliab
APA, Harvard, Vancouver, ISO, and other styles
7

Vinod Kumar. "Blockchain-Aided Secure Communication Framework Intended for UAV Networks." Communications on Applied Nonlinear Analysis 32, no. 3s (2024): 222–30. https://doi.org/10.52783/cana.v32.2614.

Full text
Abstract:
Networks of Unmanned Aerial Vehicles (UAVs) have a lot of promise for use in commercial, military, and civil applications. The communication of UAV networks presents significant cybersecurity challenges as network sizes increase. Including blockchain technology in peer-to-peer UAV networks is one way to offer a safe, scalable communication method. Blockchain enables safe, decentralized, and collaborative communication between several entities. To increase the security and privacy of UAV network communication, this article proposes a method based on Blockchain Technology (BCT). The proposed mod
APA, Harvard, Vancouver, ISO, and other styles
8

Hassan, Aslinda, Muhammad Helmi Aqmar Mat Rawi, Mohd Zaki Mas’ud, Maisarah Abu, Zahriladha Zakaria, and Fatemeh Mansourkiaie. "QoS Performance Evaluation of IoT-based Virtual Private Network for UAV Video." Journal of Physics: Conference Series 2319, no. 1 (2022): 012022. http://dx.doi.org/10.1088/1742-6596/2319/1/012022.

Full text
Abstract:
Abstract Unmanned Aerial Vehicles (UAVs) are popular and are used for surveillance and safety purposes, thus often include live video streaming. An attacker with knowledge of the flight controller’s settings can intercept the camera footage/stream. A virtual private network (VPN) connection is considered as one of the solutions in preventing unauthorised interception, but with a cost. In providing end-to-end encryption connection, the VPN connection can slow the wireless connection speed and, thus, impact the real-time streaming. This article describes the implementation of the IoT-based live
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Rei-Heng, and Chang-Wu Yu. "Combining Heterogeneous Vehicles to Build a Low-Cost and Real-Time Wireless Charging Sensor Network." Energies 16, no. 8 (2023): 3418. http://dx.doi.org/10.3390/en16083418.

Full text
Abstract:
A wireless charging system that supports a large sensor network not only needs to provide real-time charging services but also needs to consider the cost of construction in order to meet the actual applications and considerations. The energy transfer between mobile devices is extremely difficult, especially at large distances, while at close distances a wireless, fast-charging, automatic, and high-precision landing system would be required. However, previous studies that used wireless charging cars, wireless charging unmanned aerial vehicles (UAVs) alone, or wireless charging pads to build a l
APA, Harvard, Vancouver, ISO, and other styles
10

Rizwanullah, Mohammed, Hanan Abdullah Mengash, Mohammad Alamgeer, et al. "Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles." Sustainability 14, no. 24 (2022): 16741. http://dx.doi.org/10.3390/su142416741.

Full text
Abstract:
The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespread applications in the private and public sectors, from logistics to environment monitoring. The incorporation of 5G technologies, satellites, and UAVs has provoked telecommunication networks to advance to provide more stable and high-quality services to remote areas. However, UAVs are vulnerable to cyberattacks because of the rapidly expanding volume and poor inbuilt security. Cyber security and the detection of cyber threats might considerably benefit from the development of artificial intelli
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Private UAVs network"

1

(9835106), Prabhu Singh. "A contribution to communication management in private unmanned aerial vehicle networks." Thesis, 2020. https://figshare.com/articles/thesis/A_contribution_to_communication_management_in_private_unmanned_aerial_vehicle_networks/13406588.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) or drones have become extremely popular and are used in various commercial applications. They can provide better services for these applications if they work together and form a UAV network. The Flying Ad-hoc Network (FANET), Internet of Drones (IoD) and the private UAV network are such type of UAV networks invented in the past. A private UAV network is beneficial for these applications where all UAVs belong to a person or one organisation. In this research, we implemented the communication between UAVs and UAV to the ground station at the Media Access Control (
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Private UAVs network"

1

Qiao, Gongzhe, and Yi Zhuang. "A Blockchain-Based Reconstruction Framework for UAV Network." In Security, Privacy, and Anonymity in Computation, Communication, and Storage. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68851-6_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hadi, Hassan Jalil, Xueru Du, and Yue Cao. "Critical Analysis of Security and Privacy Challenges for UAV Networks." In Secure and Digitalized Future Mobility. CRC Press, 2022. http://dx.doi.org/10.1201/b22998-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Zhihao, Qi Chen, Weichuan Mo, Xiaolin Wang, Li Hu, and Yongzhi Cao. "Converging Blockchain and Deep Learning in UAV Network Defense Strategy: Ensuring Data Security During Flight." In Artificial Intelligence Security and Privacy. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9785-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Goyal, S. B., Anand Singh Rajawat, Ram Kumar Solanki, Liu Zhu, and Weiming Chee. "Enhancing Privacy and Security for UAV and IoT Enabled Drones an Intelligent Integration of Blockchain, AI, and Quantum Computing." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-50887-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

M., Kayalvizhi, and Ramamoorthy S. "Security and Privacy of Unmanned Aerial Network Communication Systems in 6G Networks." In Challenges and Risks Involved in Deploying 6G and NextGen Networks. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3804-6.ch010.

Full text
Abstract:
The massive deployment of unmanned aerial vehicles (UAVs) is growing in various fields in wireless network of 5G and 6G. It supports huge deployment of UAVs that offer secure, reliable, and low-cost data communications. They are widely deployed in surveillance and military applications for collecting sensitive and critical data, transferring the collected data to the data center, procuring high-definition images of disaster areas, surveying natural disaster zones, and other critical missions. Although, the UAV applications are growing, the risk and security factors associated with it are incre
APA, Harvard, Vancouver, ISO, and other styles
6

P. S., Divya, Manoj G., and Jebasingh S. "Mathematical Modeling of Unmanned Aerial Vehicles for Smart City Vehicular Surveillance Systems." In Unmanned Aerial Vehicles and Multidisciplinary Applications Using AI Techniques. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-8763-8.ch007.

Full text
Abstract:
In the real world, smart city traffic management is a difficult phenomenon. Introducing the internet of things into traffic management systems in smart cities is a huge challenge. Smart city definitions differ from city to city and country to country, depending on the city's level of growth, willingness to change and reform, finances, and ambitions. Unmanned aerial vehicles (UAVs) have been used in a variety of applications for civil and defense infrastructure management. These uses include crowd surveillance, transportation, emergency management, and building design inspection. In smart citie
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Tianjia, Yuelei Xie, and Xiangguo Liu. "A Quadratic-Spectrum-Based Radio Frequency Fingerprinting Method for Unmanned Aerial Vehicles." In Advances in Transdisciplinary Engineering. IOS Press, 2023. http://dx.doi.org/10.3233/atde231007.

Full text
Abstract:
With the increase of unmanned aerial vehicle (UAV) application scenarios, the incidents of UAV interference and malicious harassment are increasing, which pose a threat to public privacy and security. Aiming at the problem that UAVs are difficult to control, this paper proposes a radio frequency fingerprinting (RFF) method based on the quadratic spectrum. Firstly, the small window power detection is used to detect the transmission signal of the image to be recognized and extract the effective signal. The quadratic spectrum preprocessing is performed on the extracted signal, and finally, the im
APA, Harvard, Vancouver, ISO, and other styles
8

Mishra, Renu, Inderpreet Kaur, Vishnu Sharma, and Ajeet Bharti. "Computational Intelligence and Blockchain-Based Security for Wireless Sensor Networks." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-5250-9.ch017.

Full text
Abstract:
A wireless sensor network (WSN) provides the base architecture to all popular technologies like internet of things (IoT), unmanned arial vehicle (UAV), etc. Recently, a push came to make the information available to humans from the real-time environmental data collected through small sensing devices. WSN is self-organized wireless ad hoc networks to facilitate the interaction between the human and physical worlds. Rapid growth in sensing devices connected to the internet with intelligence and capabilities also opens the door because more devices connected devices means more chances of security
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Private UAVs network"

1

Dogan, Hulya, and Anton Setzer. "SABEC: Secure and Adaptive Blockchain-Enabled Coordination Protocol for Unmanned Aerial Vehicles(UAVs) Network." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013330500003899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shi, Huangwenqing, Mu Niu, Yulin Teng, and Pinchang Zhang. "Privacy-Preserving Physical Layer Authentication Exploiting Carrier Frequency Offset in UAV-aided Communication Systems." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bairwa, Nitesh Kumar, Garima Jain, Sandhya Umrao, and Poonam Ponde. "Impact of AI Driven Predictive Privacy Mechanisms in UAV Integrated V2X 6G Networks." In 2024 International Conference on Emerging Technologies and Innovation for Sustainability (EmergIN). IEEE, 2024. https://doi.org/10.1109/emergin63207.2024.10961785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Tingyu, Qiang Cao, Shihong Zou, and Yueming Lu. "BGAS: Blockchain and Group Decentralized Identifiers Assisted Authentication Scheme for UAV Networks." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alanazi, Abdullah Mohammed, Naif Radhyan Almutairi, Abdullah Ahmed Aseery, Salah M. S. Al Buraiky, Amani M. Rafie, and Abdullah Abdulrahman Alrumaih. "Private 5G Practice in Oil and Gas Industry." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/210975-ms.

Full text
Abstract:
Abstract The Kingdom of Saudi Arabia has taken active steps to adopt cutting-edge technologies such as artificial intelligence (AI), Cloud, 5G, 3D printing, robotics and unmanned aerial vehicles (UAVs) to drive domestic value creation, improve localization, and maximize long-term economic growth and diversification. This is accelerating the digital transformation across many sectors such as energy, mining and logistics, tourism and culture and education, and advancing their business operation activities. Saudi Aramco, a world leader in hydrocarbons exploration, production, refining, distributi
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Lei, Jie Wang, and Bingxin Wang. "Analysis of IMT in the 1765-1785 MHz band for the coexistence of civil UAVs with broadband TDD private network systems." In 2023 International Wireless Communications and Mobile Computing (IWCMC). IEEE, 2023. http://dx.doi.org/10.1109/iwcmc58020.2023.10183019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Silva, Rohan de, and Sandaruvan Rajasinghege. "Optimal Desired Trajectories of UAVs in Private UAV Networks." In 2018 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2018. http://dx.doi.org/10.1109/atc.2018.8587422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Enayati, Saeede, Dennis L. Goeckel, Amir Houmansadr, and Hossein Pishro-Nik. "Privacy-Preserving Path-Planning for UAVs." In 2022 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2022. http://dx.doi.org/10.1109/isncc55209.2022.9851770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

de Silva, Rohan. "Next Hop Node Selection in Private UAV Networks." In 2018 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2018. http://dx.doi.org/10.1109/atc.2018.8587474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Lei, Bingxin Wang, and Michel Kadoch. "Coexistence Analysis of 1800MHz Band Civil UAV System and TDD Private Network System." In 2022 International Conference on Information Processing and Network Provisioning (ICIPNP). IEEE, 2022. http://dx.doi.org/10.1109/icipnp57450.2022.00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!