To see the other types of publications on this topic, follow the link: Private UAVs network.

Journal articles on the topic 'Private UAVs network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Private UAVs network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jyot Singh, Prabhu, and Rohan De Silva. "Allocation of Control and User Data Channels for Private UAV Networks." International Journal of Engineering & Technology 7, no. 4.40 (2018): 21–25. http://dx.doi.org/10.14419/ijet.v7i4.40.24028.

Full text
Abstract:
Unmanned Aerial Vehicle (UAV) industry shows rapid growth in producing sophisticated UAVs for civilian use in recent years. With the invention of private UAV networks, these UAVs can now be used in a UAV network owned by a single organization or a person. For example, a private UAV network gives the ability for a farmer to monitor the farm from one location or to locate people in a natural disaster-stricken area. The wireless communication paths between UAVs and the ground station in a private UAV network play a vital role in transmitting video to the ground station. It is also necessary that
APA, Harvard, Vancouver, ISO, and other styles
2

Hossain, Md Imran, Murat Tahtali, Ugur Turhan, and Kamanashis Biswas. "Blockchain Integration in UAV Networks: Performance Metrics and Analysis." Sensors 24, no. 23 (2024): 7813. https://doi.org/10.3390/s24237813.

Full text
Abstract:
Blockchain technology has revolutionized the management of Unmanned Aerial Vehicle (UAV) networks by enhancing security, enabling decentralized control, and improving operational efficiency. This study assesses the efficiency of private blockchain architectures in UAV networks, specifically examining important performance metrics such as throughput, latency, scalability, and packet size. Furthermore, we evaluate the effectiveness of UAV networks when integrating private blockchain technologies, focusing particularly on key performance indicators such as area, altitude, and data rate. The scope
APA, Harvard, Vancouver, ISO, and other styles
3

Prabhu, Jyot Singh, and de Silva Rohan. "SIGNALING PROTOCOLS FOR LOCAL AREA NETWORKS OF DRONES." International Journal of Computer Networks & Communications (IJCNC) 12, no. 3 (2020): 97–112. https://doi.org/10.5281/zenodo.3955605.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) or drones have become extremely popular and are used in various commercial applications. When multiple UAVs communicate and work together, they form a UAV network. A private UAV network or Local Area Network of Drones (LoDs) is a special type of UAV network which has the minimum number of UAVs to carry out a certain task. All UAVs in a LoD use the wireless medium to send and receive the data as well as the control signals. An organization or a single owner will be more interested in this type of network, where they want multiple UAVs to scan an area, communicate
APA, Harvard, Vancouver, ISO, and other styles
4

Ji, Ran, Jian Wang, Chaojing Tang, and Ruilin Li. "Automatic Reverse Engineering of Private Flight Control Protocols of UAVs." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/1308045.

Full text
Abstract:
The increasing use of civil unmanned aerial vehicles (UAVs) has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands colle
APA, Harvard, Vancouver, ISO, and other styles
5

Tursunboev, Jamshid, Yong-Sung Kang, Sung-Bum Huh, Dong-Woo Lim, Jae-Mo Kang, and Heechul Jung. "Hierarchical Federated Learning for Edge-Aided Unmanned Aerial Vehicle Networks." Applied Sciences 12, no. 2 (2022): 670. http://dx.doi.org/10.3390/app12020670.

Full text
Abstract:
Federated learning (FL) allows UAVs to collaboratively train a globally shared machine learning model while locally preserving their private data. Recently, the FL in edge-aided unmanned aerial vehicle (UAV) networks has drawn an upsurge of research interest due to a bursting increase in heterogeneous data acquired by UAVs and the need to build the global model with privacy; however, a critical issue is how to deal with the non-independent and identically distributed (non-i.i.d.) nature of heterogeneous data while ensuring the convergence of learning. To effectively address this challenging is
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xuan, Hongping Shen, Binhui Liu, Xiaojun Yin, and Qi Peng. "Research on High Reliable Multimode Wireless Communication Technology for UAV." Frontiers in Computing and Intelligent Systems 2, no. 3 (2023): 89–93. http://dx.doi.org/10.54097/fcis.v2i3.5317.

Full text
Abstract:
High definition image transmission and remote control are typical applications of UAVs, which has spawned a large number of new scenes. This paper proposes a multimode wireless communication method and image transmission strategy for UAV based on the integration of public network and private network. By building at least two wireless communication links including public network and private network, the image data is encoded after obtaining its channel parameters, and the encoded image data is sent through the two links. The experimental results show that the proposed method improves the reliab
APA, Harvard, Vancouver, ISO, and other styles
7

Vinod Kumar. "Blockchain-Aided Secure Communication Framework Intended for UAV Networks." Communications on Applied Nonlinear Analysis 32, no. 3s (2024): 222–30. https://doi.org/10.52783/cana.v32.2614.

Full text
Abstract:
Networks of Unmanned Aerial Vehicles (UAVs) have a lot of promise for use in commercial, military, and civil applications. The communication of UAV networks presents significant cybersecurity challenges as network sizes increase. Including blockchain technology in peer-to-peer UAV networks is one way to offer a safe, scalable communication method. Blockchain enables safe, decentralized, and collaborative communication between several entities. To increase the security and privacy of UAV network communication, this article proposes a method based on Blockchain Technology (BCT). The proposed mod
APA, Harvard, Vancouver, ISO, and other styles
8

Hassan, Aslinda, Muhammad Helmi Aqmar Mat Rawi, Mohd Zaki Mas’ud, Maisarah Abu, Zahriladha Zakaria, and Fatemeh Mansourkiaie. "QoS Performance Evaluation of IoT-based Virtual Private Network for UAV Video." Journal of Physics: Conference Series 2319, no. 1 (2022): 012022. http://dx.doi.org/10.1088/1742-6596/2319/1/012022.

Full text
Abstract:
Abstract Unmanned Aerial Vehicles (UAVs) are popular and are used for surveillance and safety purposes, thus often include live video streaming. An attacker with knowledge of the flight controller’s settings can intercept the camera footage/stream. A virtual private network (VPN) connection is considered as one of the solutions in preventing unauthorised interception, but with a cost. In providing end-to-end encryption connection, the VPN connection can slow the wireless connection speed and, thus, impact the real-time streaming. This article describes the implementation of the IoT-based live
APA, Harvard, Vancouver, ISO, and other styles
9

Cheng, Rei-Heng, and Chang-Wu Yu. "Combining Heterogeneous Vehicles to Build a Low-Cost and Real-Time Wireless Charging Sensor Network." Energies 16, no. 8 (2023): 3418. http://dx.doi.org/10.3390/en16083418.

Full text
Abstract:
A wireless charging system that supports a large sensor network not only needs to provide real-time charging services but also needs to consider the cost of construction in order to meet the actual applications and considerations. The energy transfer between mobile devices is extremely difficult, especially at large distances, while at close distances a wireless, fast-charging, automatic, and high-precision landing system would be required. However, previous studies that used wireless charging cars, wireless charging unmanned aerial vehicles (UAVs) alone, or wireless charging pads to build a l
APA, Harvard, Vancouver, ISO, and other styles
10

Rizwanullah, Mohammed, Hanan Abdullah Mengash, Mohammad Alamgeer, et al. "Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles." Sustainability 14, no. 24 (2022): 16741. http://dx.doi.org/10.3390/su142416741.

Full text
Abstract:
The adoption and recent development of Unmanned Aerial Vehicles (UAVs) are because of their widespread applications in the private and public sectors, from logistics to environment monitoring. The incorporation of 5G technologies, satellites, and UAVs has provoked telecommunication networks to advance to provide more stable and high-quality services to remote areas. However, UAVs are vulnerable to cyberattacks because of the rapidly expanding volume and poor inbuilt security. Cyber security and the detection of cyber threats might considerably benefit from the development of artificial intelli
APA, Harvard, Vancouver, ISO, and other styles
11

Shrestha, Rakesh, Atefeh Omidkar, Sajjad Ahmadi Roudi, Robert Abbas, and Shiho Kim. "Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks." Electronics 10, no. 13 (2021): 1549. http://dx.doi.org/10.3390/electronics10131549.

Full text
Abstract:
The recent development and adoption of unmanned aerial vehicles (UAVs) is due to its wide variety of applications in public and private sector from parcel delivery to wildlife conservation. The integration of UAVs, 5G, and satellite technologies has prompted telecommunication networks to evolve to provide higher-quality and more stable service to remote areas. However, security concerns with UAVs are growing as UAV nodes are becoming attractive targets for cyberattacks due to enormously growing volumes and poor and weak inbuilt security. In this paper, we propose a UAV- and satellite-based 5G-
APA, Harvard, Vancouver, ISO, and other styles
12

Seo, Jong Wan, Anik Islam, Md Masuduzzaman, and Soo Young Shin. "Blockchain-Based Secure Firmware Update Using an UAV." Electronics 12, no. 10 (2023): 2189. http://dx.doi.org/10.3390/electronics12102189.

Full text
Abstract:
This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalability and transaction speed using private blockchains and solves the limitations of internet connections by updating the firmware using an UAV. The proposed firmware update system safely manages the IoT device and firmware information through four processes: participant registration, firmware registration/update, firmware update request, and firmware
APA, Harvard, Vancouver, ISO, and other styles
13

Demura, Ruslan. "Використання VPN та RIS для забезпечення безпеки зв'язку в динамічних мережах роїв БПЛА: шляхи інтеграції, розподіл ресурсів та результати симуляції". Aerospace Technic and Technology, № 4 (29 серпня 2024): 104–12. http://dx.doi.org/10.32620/aktt.2024.4.11.

Full text
Abstract:
The subject of this paper is the integration of virtual private networks (VPN) and Reconfigurable Intelligent Surfaces (RIS) technologies into swarm systems of unmanned aerial vehicles (UAVs). The goal is to investigate the possibilities of improving the performance and security of UAV swarm systems using VPNs for data encryption and protection, as well as RIS for optimizing signal routing in complex environments. The tasks to be solved are: to analyze existing approaches to ensure the security and performance of networks in UAV swarm systems, evaluating the effectiveness of VPN and RIS integr
APA, Harvard, Vancouver, ISO, and other styles
14

Gruner, Jonas F., Jan Graßhoff, Carlos Castelar Wembers, Kilian Schweppe, Georg Schildbach, and Philipp Rostalski. "Informative Path Planning Using Physics-Informed Gaussian Processes for Aerial Mapping of 5G Networks." Sensors 24, no. 23 (2024): 7601. http://dx.doi.org/10.3390/s24237601.

Full text
Abstract:
The advent of 5G technology has facilitated the adoption of private cellular networks in industrial settings. Ensuring reliable coverage while maintaining certain requirements at its boundaries is crucial for successful deployment yet challenging without extensive measurements. In this article, we propose the leveraging of unmanned aerial vehicles (UAVs) and Gaussian processes (GPs) to reduce the complexity of this task. Physics-informed mean functions, including a detailed ray-tracing simulation, are integrated into the GP models to enhance the extrapolation performance of the GP prediction.
APA, Harvard, Vancouver, ISO, and other styles
15

Ntizikira, Ernest, Wang Lei, Fahad Alblehai, Kiran Saleem, and Muhammad Ali Lodhi. "Secure and Privacy-Preserving Intrusion Detection and Prevention in the Internet of Unmanned Aerial Vehicles." Sensors 23, no. 19 (2023): 8077. http://dx.doi.org/10.3390/s23198077.

Full text
Abstract:
In smart cities, unmanned aerial vehicles (UAVS) play a vital role in surveillance, monitoring, and data collection. However, the widespread integration of UAVs brings forth a pressing concern: security and privacy vulnerabilities. This study introduces the SP-IoUAV (Secure and Privacy Preserving Intrusion Detection and Prevention for UAVS) model, tailored specifically for the Internet of UAVs ecosystem. The challenge lies in safeguarding UAV operations and ensuring data confidentiality. Our model employs cutting-edge techniques, including federated learning, differential privacy, and secure m
APA, Harvard, Vancouver, ISO, and other styles
16

Jia, Xuedan, Xiangmei Song, and Chuntang Yu. "Privacy-Preserving Attestation Scheme for Revocable UAV Charging Using Hybrid State Channels." Electronics 12, no. 19 (2023): 3998. http://dx.doi.org/10.3390/electronics12193998.

Full text
Abstract:
Although widely applied in varied scenarios, unmanned aerial vehicles (UAVs) suffer severe flight time and flight range limitations due to constrained onboard battery capacity, causing frequent battery recharging when performing persistent missions. The wireless power transfer technology is a promising solution for UAV charging by utilizing unmanned ground vehicles (UGVs) equipped with wireless charging facilities, where charging time slots are auctioned and assigned to UAVs. However, UGVs themselves also have limited energy capacity, resulting in the need to revoke a UAV charging transaction
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Wenming, Shumin Zhang, Guijiang Liu, and Yue Zhao. "A Blockchain-Based Cross-Domain Authentication Scheme for Unmanned Aerial Vehicle-Assisted Vehicular Networks." World Electric Vehicle Journal 16, no. 4 (2025): 199. https://doi.org/10.3390/wevj16040199.

Full text
Abstract:
With the rapid increase in the number of vehicles and the growing demand for low-latency and reliable communication, traditional vehicular network architectures face numerous challenges. Unmanned Aerial Vehicle (UAV)-assisted vehicular networks provide an innovative solution for real-time data transmission and efficient cross-domain communication, significantly enhancing resource allocation efficiency and traffic safety. However, these networks also raise privacy and security concerns. Traditional symmetric key and Public Key Infrastructure (PKI)-based authentication schemes suffer from issues
APA, Harvard, Vancouver, ISO, and other styles
18

Ogunbunmi, Simeon, Yu Chen, Erik Blasch, and Genshe Chen. "A Survey on Reputation Systems for UAV Networks." Drones 8, no. 6 (2024): 253. http://dx.doi.org/10.3390/drones8060253.

Full text
Abstract:
The proliferation of unmanned aerial vehicle (UAV) networks is increasing, driven by their capacity to deliver automated services tailored to the varied demands of numerous smart city applications. Trust, security, and privacy remain paramount in the public domain. Traditional centralized network designs fall short of ensuring device authentication, data integrity, and privacy within the highly dynamic and adaptable environments of UAV networks. Decentralized reputation systems have emerged as a promising solution for enhancing the reliability and trustworthiness of data and communications wit
APA, Harvard, Vancouver, ISO, and other styles
19

Lagkas, Thomas, Vasileios Argyriou, Stamatia Bibi, and Panagiotis Sarigiannidis. "UAV IoT Framework Views and Challenges: Towards Protecting Drones as “Things”." Sensors 18, no. 11 (2018): 4015. http://dx.doi.org/10.3390/s18114015.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Ye, Mengqi Sui, Tianle Xia, Miao Liu, Jie Yang, and Haitao Zhao. "Energy-Efficient Federated Learning-Driven Intelligent Traffic Monitoring: Bayesian Prediction and Incentive Mechanism Design." Electronics 14, no. 9 (2025): 1891. https://doi.org/10.3390/electronics14091891.

Full text
Abstract:
With the growing integration of the Internet of Things (IoT), low-altitude intelligent networks, and vehicular networks, smart city traffic systems are gradually evolving into an air–ground integrated intelligent monitoring framework. However, traditional centralized model training faces challenges such as high network load due to massive data transmission, energy management difficulties for mobile devices like UAVs, and privacy risks associated with non-anonymized road operation data. Therefore, this paper proposes an air–ground collaborative federated learning framework that integrates Bayes
APA, Harvard, Vancouver, ISO, and other styles
21

Rajasekaran, Arun Sekar, Azees Maria, Fadi Al-Turjman, Chadi Altrjman, and Leonardo Mostarda. "Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET." Drones 6, no. 1 (2022): 14. http://dx.doi.org/10.3390/drones6010014.

Full text
Abstract:
As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time. The security and privacy of these data are of priority importance. Therefore, to ove
APA, Harvard, Vancouver, ISO, and other styles
22

He, Lei, Yong Gan, and Yifeng Yin. "Efficient Threshold Attribute-Based Signature Scheme for Unmanned Aerial Vehicle (UAV) Networks." Electronics 14, no. 2 (2025): 339. https://doi.org/10.3390/electronics14020339.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are highly versatile and cost-effective, making them an attractive option for various applications. In UAV networks, it is essential to implement a digital signature scheme to ensure the integrity and authentication of commands sent to UAVs. Moreover, this digital signature scheme not only maintains the real-time performance of UAVs while executing commands but also protects the identity privacy of the signer. To meet these needs, we propose an efficient threshold attribute-based proxy signature (t-ABPS) scheme that integrates a threshold predicate specifically
APA, Harvard, Vancouver, ISO, and other styles
23

Naser, Naser, Jihene khoualdi, Khadija Rammeh Houerbi, and Hella Kaffel Ben Ayed. "Block chain technologies for UAV swarms and UAV-based networks, SLR." Fusion: Practice and Applications 18, no. 1 (2025): 01–23. https://doi.org/10.54216/fpa.180101.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) and swarms unmanned aerial vehicles (UAVs) have recently shown themselves capable of providing dependable and reasonably priced solutions for a variety of real-world issues. UAVs provide a wide range of services due to their autonomy, adaptability, mobility, and communications interoperability. Despite the fact that UAVs are frequently used to facilitate ground communications, data exchanges inside those networks are susceptible to security threats due to the ease with which radio and Wi-Fi signals can be hacked. However, there are many ways to stop cyberattacks
APA, Harvard, Vancouver, ISO, and other styles
24

He, Lei, Yong Gan, and Yanhua Zhang. "Attribute-Based Proxy Signature Scheme Supporting Flexible Threshold Predicate for UAV Networks." Electronics 12, no. 23 (2023): 4854. http://dx.doi.org/10.3390/electronics12234854.

Full text
Abstract:
Unmanned aerial vehicle (UAV) is an attractive application because of its flexibility and economy. It may use a digital signature scheme to protect commands sent to UAVs. Moreover, the digital signature scheme should guarantee the real-time performance of UAVs executing commands and protect the signer’s privacy. Therefore, we proposed an attribute-based proxy signature (ABPS) scheme supporting flexible threshold predicate for UAV networks and proved its security. It has existential unforgeability under selective-predicate and chosen message attacks (EUF-sP-CMA) and can protect the signer’s pri
APA, Harvard, Vancouver, ISO, and other styles
25

Hasan Gahramanova, Ilaha. "PUA-LARIN KİBERTƏHLÜKƏSİZLİYİ HAQQINDA." Elmi Əsərlər, no. 1 (June 10, 2024): 83–89. http://dx.doi.org/10.61413/trqk3857.

Full text
Abstract:
Currently, unmanned aerial vehicles (UAVs) are widely used in civil and military fields. Due to this development, their security also becomes an important aspect. Problems related to the safety of UAVs also arise. Here, not only hacking, but also protection against radio-electronic interference devices are very serious problems. Based on a number of real security incidents, it can be argued that cyber security for UAVs and other unmanned vehicles is of exceptional importance. Various methods and main components neutralization are presented. Examples of real-life security incidents involving UA
APA, Harvard, Vancouver, ISO, and other styles
26

Alzahrani, Bander A., Ahmed Barnawi, and Shehzad Ashraf Chaudhry. "A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems." Security and Communication Networks 2021 (November 5, 2021): 1–12. http://dx.doi.org/10.1155/2021/3437373.

Full text
Abstract:
As a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more accurate. UAVs can monitor and collect environmental-related surveillance data and share real-time information with each other and with the decision makers. However, the battery-operated UAVs communicate over the open public channel making the privacy and security of the UAVs a crucial element in mission-critical applications. The weaknesses of the existing scheme pave the way
APA, Harvard, Vancouver, ISO, and other styles
27

Zhu, Chaoyang, Xiao Zhu, and Tuanfa Qin. "An Efficient Privacy Protection Mechanism for Blockchain-Based Federated Learning System in UAV-MEC Networks." Sensors 24, no. 5 (2024): 1364. http://dx.doi.org/10.3390/s24051364.

Full text
Abstract:
The widespread use of UAVs in smart cities for tasks like traffic monitoring and environmental data collection creates significant privacy and security concerns due to the transmission of sensitive data. Traditional UAV-MEC systems with centralized data processing expose this data to risks like breaches and manipulation, potentially hindering the adoption of these valuable technologies. To address this critical challenge, we propose UBFL, a novel privacy-preserving federated learning mechanism that integrates blockchain technology for secure and efficient data sharing. Unlike traditional metho
APA, Harvard, Vancouver, ISO, and other styles
28

Abdel-Malek, Mai A., Muhammad M. Sayed, and Mohamed Azab. "UAV-Based Privacy-Preserved Trustworthy Seamless Service Agility for NextG Cellular Networks." Sensors 22, no. 7 (2022): 2756. http://dx.doi.org/10.3390/s22072756.

Full text
Abstract:
Next Generation cellular networks are expected to offer better service quality, secure and reliable service provisioning, and more cooperative operation even in unexpected stressful situations. Service provider cooperation can facilitate reliable service provisioning and extended coverage in disasters situations or partial network failures. However, the current 4G and 5G standards do not offer security and privacy-friendly support for inter-operator agility and service mobility, a key enabler for such cooperation. The situation becomes more critical in presence of attackers, where establishing
APA, Harvard, Vancouver, ISO, and other styles
29

Pandey, Samarth. "Optimizing UAV-Assisted Relaying through Split Learning for Enhanced Distributed Inference in IoT-Based Ecological Monitoring." Acceleron Aerospace Journal 3, no. 3 (2024): 487–94. http://dx.doi.org/10.61359/11.2106-2446.

Full text
Abstract:
The integration of unmanned aerial vehicles (UAVs) into Internet of Things (IoT) systems present a promising solution for enhancing connectivity and data transmission, particularly in remote and rural areas. I introduce an innovative approach that combines UAV-assisted relaying with split learning (SL) for distributed inference in IoT environmental monitoring applications. By leveraging UAVs as relays, this method addresses connectivity challenges and extends coverage in underserved regions, while SL optimizes data processing and privacy. The proposed system architecture enables UAVs to facili
APA, Harvard, Vancouver, ISO, and other styles
30

Borah, Shekhar Suman, Aaditya Khanal, and Prabha Sundaravadivel. "Emerging Technologies for Automation in Environmental Sensing: Review." Applied Sciences 14, no. 8 (2024): 3531. http://dx.doi.org/10.3390/app14083531.

Full text
Abstract:
This article explores the impact of automation on environmental sensing, focusing on advanced technologies that revolutionize data collection analysis and monitoring. The International Union of Pure and Applied Chemistry (IUPAC) defines automation as integrating hardware and software components into modern analytical systems. Advancements in electronics, computer science, and robotics drive the evolution of automated sensing systems, overcoming traditional limitations in manual data collection. Environmental sensor networks (ESNs) address challenges in weather constraints and cost consideratio
APA, Harvard, Vancouver, ISO, and other styles
31

Song, Fuyuan, Yiwei Liu, Siyao Ma, Qin Jiang, Xiang Zhang, and Zhangjie Fu. "Enabling Efficient and Privacy-Preserving Task Allocation with Temporal Access Control for Mobile Crowdsensing." Electronics 12, no. 14 (2023): 3016. http://dx.doi.org/10.3390/electronics12143016.

Full text
Abstract:
The increasing proliferation of GPS-enabled mobile devices, including Unmanned Aerial Vehicles (UAVs), smartphones, and laptops, has resulted in a significant upsurge in the outsourcing of spatial data to cloud servers for storage and computation purposes, such as task allocation and location-based services. However, the reliance on untrusted cloud servers introduces the risk of privacy breaches, as these servers possess the ability to deduce and access users’ private information based on task content and query requirements. Existing privacy-preserving task-allocation schemes offer only coarse
APA, Harvard, Vancouver, ISO, and other styles
32

Li, Lin, Xiaofeng Lian, Yulong Wang, and Li Tan. "CSECMAS: An Efficient and Secure Certificate Signing Based Elliptic Curve Multiple Authentication Scheme for Drone Communication Networks." Applied Sciences 12, no. 18 (2022): 9203. http://dx.doi.org/10.3390/app12189203.

Full text
Abstract:
With the rapid development of communication technology, unmanned aerial vehicles (UAVs) have been widely used in the military, rescue, agricultural and other fields. The security and privacy issues are one of the biggest challenges for UAV communications. In this paper, we propose a certificate signing based on an Elliptic Curve multiple authentication scheme (CSECMAS). The scheme employs multiple authentication tools to ensure the legitimacy of the identity and the integrity of the information. We treat multiple UAVs as a cluster, and after establishing a secure session between the ground con
APA, Harvard, Vancouver, ISO, and other styles
33

Ren, Yingying, Ryan D. Restivo, Wenkai Tan, et al. "Knowledge Distillation-Based GPS Spoofing Detection for Small UAV." Future Internet 15, no. 12 (2023): 389. http://dx.doi.org/10.3390/fi15120389.

Full text
Abstract:
As a core component of small unmanned aerial vehicles (UAVs), GPS is playing a critical role in providing localization for UAV navigation. UAVs are an important factor in the large-scale deployment of the Internet of Things (IoT) and cyber–physical systems (CPS). However, GPS is vulnerable to spoofing attacks that can mislead a UAV to fly into a sensitive area and threaten public safety and private security. The conventional spoofing detection methods need too much overhead, which stops efficient detection from working in a computation-constrained UAV and provides an efficient response to atta
APA, Harvard, Vancouver, ISO, and other styles
34

Dave, Mayank, Khushbu Chauhan, Hardik Sachdeva, Shivam Gupta, and Anushka Misra. "Privacy and Security Improvement in UAV Network using Blockchain." International Journal of Communication Networks and Distributed Systems 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijcnds.2023.10048925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sachdeva, Hardik, Shivam Gupta, Anushka Misra, Khushbu Chauhan, and Mayank Dave. "Privacy and security improvement in UAV network using blockchain." International Journal of Communication Networks and Distributed Systems 29, no. 4 (2023): 383–406. http://dx.doi.org/10.1504/ijcnds.2023.131736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jing, Zhongyuan, and Ruyan Wang. "Construction of a Deep Learning Model for Unmanned Aerial Vehicle-Assisted Safe Lightweight Industrial Quality Inspection in Complex Environments." Drones 8, no. 12 (2024): 707. http://dx.doi.org/10.3390/drones8120707.

Full text
Abstract:
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge intelligence. In this context, federated learning, as a new distributed machine learning method, becomes one of the key technologies to realize edge intelligence. Traditional edge intelligence networks usually rely on terrestrial communication base stations as parameter servers to manage communication and computation tasks among de
APA, Harvard, Vancouver, ISO, and other styles
37

Michailidis, Emmanouel T., and Demosthenes Vouyioukas. "A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones." Drones 6, no. 2 (2022): 41. http://dx.doi.org/10.3390/drones6020041.

Full text
Abstract:
During the last few years, a wide variety of Internet of Drones (IoD) applications have emerged with numerous heterogeneous aerial and ground network elements interconnected and equipped with advanced sensors, computation resources, and communication units. The evolution of IoD networks presupposes the mitigation of several security and privacy threats. Thus, robust authentication protocols should be implemented in order to attain secure operation within the IoD. However, owing to the inherent features of the IoD and the limitations of Unmanned Aerial Vehicles (UAVs) in terms of energy, comput
APA, Harvard, Vancouver, ISO, and other styles
38

AL-Dosari, Khalifa, Ahmed M. Deif, Murat Kucukvar, Nuri Onat, and Noora Fetais. "Security Supply Chain Using UAVs: Validation and Development of a UAV-Based Model for Qatar’s Mega Sporting Events." Drones 7, no. 9 (2023): 555. http://dx.doi.org/10.3390/drones7090555.

Full text
Abstract:
Unmanned aircraft vehicles (UAVs) are now used to support security precautions in search and rescue operations to track and evaluate critical services, to provide cybersecurity measures by transporting security supply chain management (SCM) to sports events, and to aid efforts to safeguard the spectators from attacks. A drone may quickly fly over sports grounds, scan the area for potential dangers, and offer aerial footage and still photographs. Although UAVs provide benefits to their operators, there is a possibility that they may also pose cybersecurity threats. This guide offers recommendat
APA, Harvard, Vancouver, ISO, and other styles
39

Zhai, Weixin, Bing Han, Dong Li, Jiexiong Duan, and Chengqi Cheng. "A low-altitude public air route network for UAV management constructed by global subdivision grids." PLOS ONE 16, no. 4 (2021): e0249680. http://dx.doi.org/10.1371/journal.pone.0249680.

Full text
Abstract:
With an increasing number of unmanned aerial vehicles (UAVs), the difficulty of UAV management becomes more challenging, especially for low-altitude airspace due to complicated issues of security, privacy and flexibility. Existing management approaches to UAV flights include implementing registration of flight activity for supervision purposes, limiting the maximum flight height, setting different zones for different flight activities and prohibiting flights. In this research, we proposed a new air traffic management method for UAVs based on global subdivision theory. We designed four types of
APA, Harvard, Vancouver, ISO, and other styles
40

Ahamed Ahanger, Tariq, Abdulaziz Aldaej, Mohammed Atiquzzaman, Imdad Ullah, and Muhammad Yousufudin. "Distributed Blockchain-Based Platform for Unmanned Aerial Vehicles." Computational Intelligence and Neuroscience 2022 (August 31, 2022): 1–16. http://dx.doi.org/10.1155/2022/4723124.

Full text
Abstract:
Internet of Things (IoT)-inspired drone environment is having a greater influence on daily lives in the form of drone-based smart electricity monitoring, traffic routing, and personal healthcare. However, communication between drones and ground control systems must be protected to avoid potential vulnerabilities and improve coordination among scattered UAVs in the IoT context. In the current paper, a distributed UAV scheme is proposed that uses blockchain technology and a network topology similar to the IoT and cloud server to secure communications during data collection and transmission and r
APA, Harvard, Vancouver, ISO, and other styles
41

Zhu, Chun, Mengqi Sui, Haitao Zhao, Keqi Chen, Tianyu Zhang, and Chongyu Bao. "Federated Learning Incentive Mechanism Setting in UAV-Assisted Space–Terrestrial Integration Networks." Electronics 13, no. 6 (2024): 1129. http://dx.doi.org/10.3390/electronics13061129.

Full text
Abstract:
The UAV-assisted space–terrestrial integrated network provides extensive coverage and high flexibility in communication services. UAVs and ground terminals collaborate to train models and provide services. In order to protect data privacy, federated learning is widely used. However, the participation of UAVs and ground terminals is not gratuitous, and reasonable incentives for federated learning need to be set up to encourage their participation. To address the above issues, this paper proposes a federated reliable incentive mechanism based on hierarchical reinforcement learning. The mechanism
APA, Harvard, Vancouver, ISO, and other styles
42

Akram, Muhammad Arslan, Hira Ahmad, Adnan Noor Mian, Anca Delia Jurcut, and Saru Kumari. "Blockchain-based privacy-preserving authentication protocol for UAV networks." Computer Networks 224 (April 2023): 109638. http://dx.doi.org/10.1016/j.comnet.2023.109638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lin, Weiwei, Tiansheng Huang, Xin Li, Fang Shi, Xiumin Wang, and Ching-Hsien Hsu. "Energy-Efficient Computation Offloading for UAV-Assisted MEC: A Two-Stage Optimization Scheme." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–23. http://dx.doi.org/10.1145/3430503.

Full text
Abstract:
In addition to the stationary mobile edge computing (MEC) servers, a few MEC surrogates that possess a certain mobility and computation capacity, e.g., flying unmanned aerial vehicles (UAVs) and private vehicles, have risen as powerful counterparts for service provision. In this article, we design a two-stage online scheduling scheme, targeting computation offloading in a UAV-assisted MEC system. On our stage-one formulation, an online scheduling framework is proposed for dynamic adjustment of mobile users' CPU frequency and their transmission power, aiming at producing a socially beneficial s
APA, Harvard, Vancouver, ISO, and other styles
44

Minagi, Akinori, Hokuto Hirano, and Kauzhiro Takemoto. "Natural Images Allow Universal Adversarial Attacks on Medical Image Classification Using Deep Neural Networks with Transfer Learning." Journal of Imaging 8, no. 2 (2022): 38. http://dx.doi.org/10.3390/jimaging8020038.

Full text
Abstract:
Transfer learning from natural images is used in deep neural networks (DNNs) for medical image classification to achieve a computer-aided clinical diagnosis. Although the adversarial vulnerability of DNNs hinders practical applications owing to the high stakes of diagnosis, adversarial attacks are expected to be limited because training datasets (medical images), which are often required for adversarial attacks, are generally unavailable in terms of security and privacy preservation. Nevertheless, in this study, we demonstrated that adversarial attacks are also possible using natural images fo
APA, Harvard, Vancouver, ISO, and other styles
45

Armaan Parrek, Vanshika Singh, and Akshat Jain. "DETECTION ALGORITHM FOR DETECTING DRONES/UAVs." Darpan International Research Analysis 12, no. 3 (2024): 340–51. http://dx.doi.org/10.36676/dira.v12.i3.93.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs), also popularly known as drones, have had an exponential evolution in recent times. This has resulted in better and affordable artifacts with applications in numerous fields. However, drones have also been used in terrorist acts, privacy violations and involuntary accidents in high risk zones. To address this problem, for our final year project we are working on studying and implementing various techniques and algorithms to automatically detect, identify and track small drones. We did a literature survey on the current deployed methodologies. Many state of the a
APA, Harvard, Vancouver, ISO, and other styles
46

Da, Lemei, Hai Liang, Yong Ding, Yujue Wang, Changsong Yang, and Huiyong Wang. "Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network." Computer Modeling in Engineering & Sciences 137, no. 1 (2023): 879–902. http://dx.doi.org/10.32604/cmes.2023.026309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Dahmane, Sofiane, Mohamed Bachir Yagoubi, Bouziane Brik, Chaker Abdelaziz Kerrache, Carlos Tavares Calafate, and Pascal Lorenz. "Multi-Constrained and Edge-Enabled Selection of UAV Participants in Federated Learning Process." Electronics 11, no. 14 (2022): 2119. http://dx.doi.org/10.3390/electronics11142119.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) have gained increasing attention in boosting the performance of conventional networks due to their small size, high efficiency, low cost, and autonomously nature. The amalgamation of UAVs with both distributed/collaborative Deep Learning (DL) algorithms, such as Federated Learning (FL), and Blockchain technology have ushered in a new paradigm of Secure Multi-Access Edge Computing (S-MEC). Indeed, FL enables UAV devices to leverage their sensed data to build local DL models. The latter are then sent to a central node, e.g., S-MEC node, for aggregation, in order t
APA, Harvard, Vancouver, ISO, and other styles
48

Yang, Peng, Kun Guo, Xing Xi, Tony Q. S. Quek, Xianbin Cao, and Chenxi Liu. "Fresh, Fair and Energy-Efficient Content Provision in a Private and Cache-Enabled UAV Network." IEEE Journal of Selected Topics in Signal Processing 16, no. 1 (2022): 97–112. http://dx.doi.org/10.1109/jstsp.2021.3121878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Doraswamy, Birasalapati, M. N. Giriprasad, and K. Lokesh Krishna. "Unmanned Aerial Vehicle Design for Smart City Application." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11s (2023): 595–604. http://dx.doi.org/10.17762/ijritcc.v11i11s.8294.

Full text
Abstract:
Nowadays, Unmanned Aerial Vehicles (UAVs) or drones are also one of the applications to provide the required services and to gather information from the target location. Because smart city applications effectively deal the drone interaction and enhance the human lifestyle with drones. Moreover, UAVs are generally utilized due to their privacy threats, lower cost, pose security, and versatility, which request dependable detection at lower altitudes. However, the less sensing module in the drone has earned the low sensing accuracy of location tracking. So, this paper aims to develop a novel Fire
APA, Harvard, Vancouver, ISO, and other styles
50

Qin, Xiaofei, Xu Wu, Mudi Xiong, Ye Liu, and Yue Zhang. "Multi-UAV Clustered NOMA for Covert Communications: Joint Resource Allocation and Trajectory Optimization." Electronics 11, no. 23 (2022): 4056. http://dx.doi.org/10.3390/electronics11234056.

Full text
Abstract:
Due to strong survivability and flexible scheduling, multi-UAV (Unmanned Aerial Vehicle)-assisted communication networks have been widely used in civil and military fields. However, the open accessibility of wireless channels brings a huge risk of privacy disclosure to UAV-based networks. This paper considers a multi-UAV-assisted covert communication system based on Wireless Powered Communication (WPC) and Clustered-Non-Orthogonal-Multiple-Access (C-NOMA), aiming to hide the transmission behavior between UAVs and legitimate ground users (LGUs). Specifically, the UAVs serve as aerial base stati
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!