[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3528114.3528134acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsdeConference Proceedingsconference-collections
research-article

Designing a Secure and Reliable Emergency Drone

Published: 24 June 2022 Publication History
First page of PDF

References

[1]
Seo, S.-H., Lee, B.-H., Im, S.-H., & Jee, G.-I. (2015). Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal. Journal of Positioning, Navigation, and Timing, 4(2), 57–65. https://doi.org/10.11003/JPNT.2015.4.2.057
[2]
Antonino, D. (2016). Drones: new tools for natural risk mitigation and disaster response. Current Science, 110(6), 958–959. http://www.jstor.org/stable/24907850
[3]
Ronaldo, F., Pramadihanto, D., & Sudarsono, A. (2020). Secure communication system of drone service using hybrid cryptography over 4G/LTE network. 2020 International Electronics Symposium (IES).
[4]
Nguyen, Phuoc Dai & Nguyen, Dinh. (2021). Drone Application in Smart Cities: The General Overview of Security Vulnerabilities and Countermeasures for Data Communication. 10.1007/978-3-030-63339-4_7.
[5]
Nassi, B., Shabtai, A., Masuoka, R., & Elovici, Y. (2019). SoK-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps. arXiv preprint arXiv:1903.05155.
[6]
Borthakur, A., & Singh, P. (2016). Drones: new tools for natural risk mitigation and disaster response. Current Science, 110(6), 958.
[7]
Juul, M. (2015). Civil drones in the European Union. European Parliamentary Research Service (ed.). European Union.
[8]
Control of a Quadcopter application with DEVS. (2019). Theory and Foundations of Modeling and Simulation (TMS 2019).
[9]
Pleban, J., Band, R., & Creutzburg, R. (2014). Hacking and securing the ar.drone 2.0 quadcopter: Investigations for improving the security of a toy. Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014.
[10]
Kaspersky. (2021, January 13). Security and drones — what you need to know. Me-En.Kaspersky.Com. https://me-en.kaspersky.com/resource-center/threats/can-drones-be-hacked
[11]
Ludwig, S. (2018, March 8). Drones: A Security Tool, Threat and Challenge. 2018–03-09 | Security Magazine. https://www.securitymagazine.com/articles/88803-drones-a-security-tool-threat-and-challenge
[12]
Townsend, K. (2019, September 26). Sky-high concerns: Understanding the security threat posed by drones. Avast. https://blog.avast.com/what-security-threats-are-posed-by-drones
[13]
Singh, A. P. (2018). QUADCOPTER FOR AN AGRICULTURAL APPLICATION

Cited By

View all
  • (2024)Cybersecurity Testing in Drones Domain: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.349599412(171166-171184)Online publication date: 2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
DSDE '22: Proceedings of the 2022 5th International Conference on Data Storage and Data Engineering
February 2022
124 pages
ISBN:9781450395724
DOI:10.1145/3528114
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Bottle Neck
  2. Drones
  3. Emergency Response
  4. Encryption
  5. GPS
  6. Port
  7. Protocol
  8. Spoofing
  9. Threat
  10. White Hat

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DSDE 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cybersecurity Testing in Drones Domain: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2024.349599412(171166-171184)Online publication date: 2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media