[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A survey on recent optimal techniques for securing unmanned aerial vehicles applications

Published: 05 July 2021 Publication History

Abstract

Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. The applications include smart things, smart transportation, smart cities, smart healthcare, smart personal care, smart house, smart industries, and so on. Due to the sensitive applications of UAVs, the security has become a major concern, and therefore, efficient techniques are required to protect captured data from hackers and the fictitious activities from illegitimate users. Machine learning (ML) techniques play a vital role in improving UAVs' security intelligently, while blockchain is recent technology for decentralized UAVs and security. Furthermore, watermarking guarantees digital media to be authenticated, protected, and copyright. Therefore, we provide a comprehensive survey of optimal techniques, which are used for securing UAVs applications in terms of blockchain, ML, and watermarking. Furthermore, we introduce each technique with the advantages and suitably used for securing UAVs collaboration applications. This survey contributes to a better understanding of the blockchain, ML, and watermarking techniques for securing UAVs and sheds new light on challenges and opportunities on subject applications.

Graphical Abstract

Unmanned aerial vehicles (UAVs) or Drones technology has a huge potential for supporting different efficient solutions for the smart applications in our world. Due to the sensitive applications of UAVs, the security has become a major concern, and therefore, efficient techniques are required to protect captured data from hackers and the fictitious activities from illegitimate users. Therefore, we provide a comprehensive survey of optimal techniques, which are used for securing UAVs applications in terms of blockchain, ML, and watermarking. This survey contributes to a better understanding of the blockchain, ML, and watermarking techniques for securing UAVs and sheds new light on challenges and opportunities on subject applications.

References

[1]
Islam A, Shin SY. BUAV: a blockchain based secure UAV‐assisted data acquisition scheme in Internet of Things. J Commun Netw. 2019;21:491‐502.
[2]
Bokeno ET, Bort TM, Burns SS. R Package Delivery by Means of an Automated Multi‐copter UAS/UAV Dispatched from a Conventional Delivery Vehicle, United States Patent US 9,915,956. Washington, DC: U.S. Patent and Trademark Office; 2018.
[3]
Dobrea DM, Dobrea MC. An autonomous UAV system for video monitoring of the quarantine zones. Roman J Inf Sci Technol. 2020;23:S53.
[4]
Hodgkinson B, Lipinski D, Peng L, Mohseni K. High resolution atmospheric sensing using UAVs. Distributed Autonomous Robotic Systems. Berlin, Heidelberg/Germany: Springer; 2014:31‐45.
[5]
Nex F, Remondino F. UAV for 3D mapping applications: a review. Appl Geomat. 2014;6:1‐5.
[6]
Quaritsch M, Kruggl K, Wischounig‐Strucl D, Bhattacharya S, Shah M, Rinner B. Networked UAVs as aerial sensor network for disaster management applications. E & i Elektrotechnik und Informationstechnik. 2010;127:56‐63.
[7]
Rango A, Laliberte A, Steele C, et al. Using unmanned aerial vehicles for rangelands: current applications and future potentials. Environ Pract. 2006;8:159‐168.
[8]
Arabi S, Sabir E, Elbiaze H, Sadik M. Data gathering and energy transfer dilemma in UAV‐assisted flying access network for IoT. Sensors. 2018;18:1519.
[9]
Watts AC, Ambrosia VG, Hinkley EA. Unmanned aircraft systems in remote sensing and scientific research: classification and considerations of use. Remote Sens (Basel). 2012;4:1671‐1692.
[10]
Gupta L, Jain R, Vaszkun G. Survey of important issues in UAV communication networks. IEEE Commun Surv Tutor. 2015;18:1123‐1152.
[11]
Coelho BN. UAVs and their role in future cities and industries. Smart and Digital Cities. Cham: Springer; 2019:275‐285.
[12]
Ueda K, Miyoshi T. Autonomous navigation control of UAV using wireless smart meter devices. J Telecommun Inf Technol. 2019;2:64‐72.
[13]
Shahbazi M, Sohn G, Théau J, Ménard P. UAV‐based point cloud generation for open‐pit mine modelling. Int Arch Photogramm Remote Sens Spat Inf Sci. 2015;40:313–320.
[14]
Kanistras K, Martins G, Rutherford MJ, Valavanis KP. A survey of unmanned aerial vehicles (UAVs) for traffic monitoring. Paper presented at: Proceedings of the International Conference on Unmanned Aircraft Systems, ICUAS, Atlanta, GA; 2013:221‐234.
[15]
Puri A, Valavanis KP, Kontitsis M. Statistical profile generation for traffic monitoring using real‐time UAV based video data. Paper presented at: Proceedings of the Mediterranean Conference on Control & Automation, Athens, Greece; 2007:1‐6.
[16]
Puri A. A Survey of Unmanned Aerial Vehicles (UAV) for Traffic Surveillance. Tampa, FL: Department of computer science and engineering University of South Florida; 2005:1‐29.
[17]
Heintz F, Rudol P, Doherty P. From images to traffic behavior‐a uav tracking and monitoring application. Paper presented at: Proceedings of the 10th International Conference on Information Fusion, Quebec, Que, Canada; 2007:1‐8.
[18]
Ro K, Oh JS, Dong L. Lessons learned: application of small uav for urban highway traffic monitoring. Paper presented at: Proceedings of the 45th AIAA Aerospace Sciences Meeting and Exhibit, Reno, Nevada; 2007.
[19]
Coifman B, McCord M, Mishalani RG, Iswalt M, Ji Y. Roadway traffic monitoring from an unmanned aerial vehicle. IEE Proc Intell Transp Syst. 2006;153:11‐20.
[20]
Salvo G, Caruso L, Scordo A. Urban traffic analysis through an UAV. Proc Soc Behav Sci. 2014;111:1083‐1091.
[21]
Reshma R, Ramesh T, Sathishkumar P. Security situational aware intelligent road traffic monitoring using UAVs. Paper presented at: Proceedings of the 2016 international conference on VLSI systems, architectures, technology and applications, VLSI‐SATA, Bangalore, India; 2016:1‐6.
[22]
Ullah S, Kim KI, Kim KH, et al. UAV‐enabled healthcare architecture: issues and challenge. Futur Gener Comput Syst. 2019;97:425‐432.
[23]
Lum MJ, Rosen J, King HH, et al. Telesurgery via unmanned aerial vehicle (UAV) with a field deployable surgical robot. MMVR. Long Beach, CA: IOS Press; 2007:313‐315.
[24]
Cao HR, Zhan C. A novel emergency healthcare system for elderly community in outdoor environment. Wirel Commun Mob Comput. 2018;2018:1–11.
[25]
Todd C, Watfa M, El Mouden Y, et al. A proposed UAV for indoor patient care. Technol Health Care. 2015;2015:1‐8. https://doi.org/10.3233/THC1046.
[26]
Lee KW, Park JK. Application of geospatial information of neighborhood park for healthcare of local residents. J Med Imag Health Inform. 2017;7:674‐679.
[27]
Dey S, Hasan Z, Ahmed I, Pramanik RH. A novel approach in developing an unmanned aerial vehicle for emergency health care and response system in Bangladesh. Paper presented at: Proceedings of the 5th International Conference on Natural Sciences and Technology, Chittagong, Bangladesh; 2018.
[28]
Diao L. Unmanned Aerial Vehicle Assisted Health Care Resource Allocation in Disasters [Doctoral dissertation]. Auckland University of Technology; 2019.
[29]
Goudarzi S, Kama N, Anisi MH, Zeadally S, Mumtaz S. Data collection using unmanned aerial vehicles for internet of things platforms. Comput Electr Eng. 2019;75:1‐5.
[30]
S.H. Alsamhi, O. Ma, M.S. Ansari and S.K. Gupta, Collaboration of drone and internet of public safety things in smart cities: an overview of qos and network performance optimization, Drones, 3 1, (2019);13:1–18.
[31]
Alsamhi SH, Ma O, Ansari MS, Almalki FA. Survey on collaborative smart drones and internet of things for improving smartness of smart cities. IEEE Access. 2019;7:128125‐128152.
[32]
Alsamhi SH, Ma O, Ansari MS. Convergence of machine learning and robotics communication in collaborative assembly: mobility, connectivity and future perspectives. J Intell Robot Syst. 2019;98:1‐26.
[33]
He H, Zhang S, Zeng Y, Zhang R. Joint altitude and beamwidth optimization for UAV‐enabled multiuser communications. IEEE Commun Lett. 2017;22:344‐347.
[34]
Mozaffari M, Saad W, Bennis M, Debbah M. Wireless communication using unmanned aerial vehicles (UAVs) optimal transport theory for hover time optimization. IEEE Trans Wirel Commun. 2017;16:8052‐8066.
[35]
Daniel K, Rohde S, Wietfeld C. Leveraging public wireless communication infrastructures for UAV‐based sensor networks. Paper presented at: Proceedings of the International Conference on Technologies for Homeland Security, HST, Waltham, MA; 2010:179‐184.
[36]
Wu Z, Kumar H, Davari A. Performance evaluation of OFDM transmission in UAV wireless communication. Paper presented at: Proceedings of the 37th Southeastern Symposium on System Theory, SSST'05, Tuskegee, AL; 2005:6‐10.
[37]
Zeng Y, Zhang R, Lim TJ. Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag. 2016;54:36‐42.
[38]
Madany YM, Elkamchouchi HM, Ahmed MM. Modelling and simulation of robust navigation for unmanned air systems (UASs) based on integration of multiple sensors fusion architecture. Paper presented at: Proceedings of the European Modelling Symposium, Manchester, UK; 2013:719‐724.
[39]
Hayajneh AM, Zaidi SA, McLernon DC, Ghogho M. Drone empowered small cellular disaster recovery networks for resilient smart cities. Paper presented at: Proceedings of the IEEE International Conference on Sensing, Communication and Networking, SECON Workshops, London, UK; 2016:1‐6.
[40]
Bupe P, Haddad R, Rios‐Gutierrez F. Relief and emergency communication network based on an autonomous decentralized UAV clustering network. SoutheastCon. 2015;2015:1‐8.
[41]
Wypych T, Angelo R, Kuester F. Airgsm: an unmanned, flying gsm cellular base station for flexible field communications. Paper presented at: Proceedings of the 2012 IEEE Aerospace Conference, Big Sky, MT; 2012:1‐9.
[42]
Guevara K, Rodriguez M, Gallo N, Velasco G, Vasudeva K, Guvenc I. UAV‐based GSM network for public safety communications. SoutheastCon. 2015;2015:1‐2.
[43]
Kobayashi T, Matsuoka H, Betsumiya S. Flying communication server in case of a largescale disaster. Paper presented at: Proceedings of the 40th Annual Computer Software and Applications Conference, COMPSAC, Atlanta, GA; vol. 2, 2016:571‐576.
[44]
Mase K, Okada H. Message communication system using unmanned aerial vehicles under large‐scale disaster environments. Paper presented at: Proceedings of the 26th Annual International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, Hong Kong, China; 2015:2171‐2176.
[45]
Gupta A, Sundhan S, Alsamhi SH, Gupta SK. Review for capacity and coverage improvement in aerially controlled heterogeneous network. Optical and Wireless Technologies. Singapore: Springer; 2020:365‐376.
[46]
de Albuquerque JC, de Lucena SC, Campos CA. Evaluating data communications in natural disaster scenarios using opportunistic networks with unmanned aerial vehicles. Paper presented at: Proceedings of the 19th International Conference on Intelligent Transportation Systems, ITSC, Rio de Janeiro, Brazil; 2016:1452‐1457.
[47]
Khawaja W, Guvenc I, Matolak D. UWB channel sounding and modeling for UAV air‐to‐ground propagation channels. Paper presented at: Proceedings of the Global Communications Conference, GLOBECOM, Washington, DC; 2016:1‐7.
[48]
Altawy R, Youssef AM. Security, privacy, and safety aspects of civilian drones: a survey. ACM Trans Cyber‐Phys Syst. 2016;2:1‐25.
[49]
Reyad M, Arafa M, Sallam EA. An optimal PID controller for a qaudrotor system based on DE algorithm. Paper presented at: Proceedings of the 11th International Conference on Computer Engineering & Systems, ICCES, Cairo, Egypt; 2016:444‐451.
[50]
Pauner C, Kamara I, Viguri J. Drones. current challenges and standardisation solutions in the field of privacy and data protection. Paper presented at: Proceedings of the 2015 ITU Kaleidoscope: Trust in the Information Society, K‐2015, Barcelona, Spain; 2015:1‐7.
[51]
Verykokou S, Doulamis A, Athanasiou G, Ioannidis C, Amditis A. UAV‐based 3D modelling of disaster scenes for urban search and rescue. Paper presented at: Proceedings of the International Conference on Imaging Systems and Techniques, IST, Chania, Greece; 2016:106‐111.
[52]
Nakata RH, Haruna B, Yamaguchi T, Lubecke VM, Takayama S, Takaba K. Motion compensation for an unmanned aerial vehicle remote radar life sensor. IEEE J Emerg Sel Topics Circ Syst. 2018;8:329‐337.
[53]
Reardon C, Fink J. Air‐ground robot team surveillance of complex 3D environments. Paper presented at: Proceedings of the International Symposium on Safety, Security, and Rescue Robotics, SSRR, Lausanne, Switzerland; 2016:320‐327.
[54]
Lee KS, Ovinis M, Nagarajan T, Seulin R, Morel O. Autonomous patrol and surveillance system using unmanned aerial vehicles. Paper presented at: Proceedings of the 15th International Conference on Environment and Electrical Engineering, EEEIC, Rome, Italy; 2015:1291‐1297.
[55]
Zhang J, Xiong J, Zhang G, Gu F, He Y. Flooding disaster oriented USV & UAV system development & demonstration. Paper presented at: Proceedings of the OCEANS 2016‐Shanghai, Shanghai, China; 2016:1‐4.
[56]
Bejiga MB, Zeggada A, Melgani F. Convolutional neural networks for near real‐time object detection from uav imagery in avalanche search and rescue operations, Paper presented at: Proceedings of the International Geoscience and Remote Sensing Symposium, IGARSS, Beijing, China; 2016:693‐696.
[57]
Cross AR. Drones for disaster response and relief operations. American Red (AR) Cross ‐ IssueLab, Apr, 2015: https://www.issuelab.org/resources/21683/21683.pdf.
[58]
Erdelj M, Natalizio E, Chowdhury KR, Akyildiz IF. Help from the sky: leveraging UAVs for disaster management. IEEE Pervasive Comput. 2017;16:24‐32.
[59]
Sharma D, Rashid A, Gupta S, Gupta SK. A functional encryption technique in UAV integrated HetNet: a proposed model. Int J Simulat‐Syst Sci Technol. 2019;20:7.1–7.7.
[60]
Hayat S, Yanmaz E, Muzaffar R. Survey on unmanned aerial vehicle networks for civil applications: a communicationsviewpoint. Commun Surv Tutor. 2016;18:2624‐2661.
[61]
Li Y, He L, Ye X, Guo D. Geometric correction algorithm of UAV remote sensing image for the emergency disaster. Paper presented at: Proceedings of the International Geoscience and Remote Sensing Symposium, IGARSS, Beijing, China; 2016:6691‐6694.
[62]
Chen M, Hu Q, Mackin C, Fisac JF, Tomlin CJ. Safe platooning of unmanned aerial vehicles via reachability. Paper presented at: Proceedings of the 54th IEEE Conference on Decision and Control, CDC, Osaka, Japan; 2015:4695‐4701.
[63]
Erdelj M, Natalizio E. UAV‐assisted disaster management: Applications and open issues. Paper presented at: Proceedings of the International Conference on Computing, Networking and Communications, ICNC, Kauai, HI; 2016:1‐5.
[64]
Saponara S, Neri B. Radar sensor signal acquisition and multidimensional FFT processing for surveillance applications in transport systems. IEEE Trans Instrum Meas. 2017;66:604‐615.
[65]
Aljehani M, Inoue M. Multi‐UAV tracking and scanning systems in M2M communication for disaster response. Paper presented at: Proceedings of the 5th Global Conference on Consumer Electronics, Kyoto, Japan; 2016:1‐2.
[66]
Mhatre V, Chavan S, Samuel A, Patil A, Chittimilla A, Kumar N. Embedded video processing and data acquisition for unmanned aerial vehicle. Paper presented at: Proceedings of the International Conference on Computers, Communications, and Systems, ICCCS, Kanyakumari, India; 2015:141‐145.
[67]
Lei K, Zhang Q, Lou J, Bai B, Xu K. Securing ICN‐based UAV ad hoc networks with Blockchain. IEEE Commun Mag. 2019;57:26‐32.
[68]
Sugumaran R. Inventor; Deere and Co, Assignee, UAV Docking System and Method, United States Patent US 9,561,871,7. Moline, IL: DEERE & COMPANY; 2017.
[69]
Zhang G, Wu Q, Cui M, Zhang R. Securing UAV communications via joint trajectory and power control. IEEE Trans Wirel Commun. 2019;18:1376‐1389.
[70]
Wu Q, Zeng Y, Zhang R. Joint trajectory and communication design for multi‐UAV enabled wireless networks. IEEE Trans Wirel Commun. 2018;17:2109‐2121.
[71]
Hooper M, Tian Y, Zhou R, et.al. Securing commercial wifi‐based uavs from common security attacks. Paper presented at: Proceedings of the MILCOM 2016–2016 IEEE Military Communications Conference, Baltimore, MD; 2016:1213‐1218.
[72]
Maher A, Li C, Hu H, Zhang B. Realtime human‐UAV interaction using deep learning. Paper presented at: Proceedings of the Chinese Conference on Biometric Recognition; 2017:511‐519; Springer, Cham.
[73]
Bhattacharya S, Başar T. Game‐theoretic analysis of an aerial jamming attack on a UAV communication network. Paper presented at: Proceedings of the 2010 American Control Conference, Baltimore, MD; 2010:818‐823.
[74]
Sedjelmaci H, Senouci SM, Ansari N. Intrusion detection and ejection framework against lethal attacks in UAV‐aided networks: a Bayesian game‐theoretic methodology. IEEE Trans Intell Transp Syst. 2016;18:1143‐1153.
[75]
Sedjelmaci H, Senouci SM, Ansari N. A hierarchical detection and response system to enhance security against lethal cyber‐attacks in UAV networks. IEEE Trans Syst Man Cybern Syst. 2017;48:1594‐1606.
[76]
Cevik P, Kocaman I, Akgul AS, Akca B. The small and silent force multiplier: a swarm UAV—electronic attack. J Intell Robot Syst. 2013;70:595‐608.
[77]
Yoon K, Park D, Yim Y, Kim K, Yang SK, Robinson M. Security authentication system using encrypted channel on uav network. Paper presented at: Proceedings of the 2017 First IEEE International Conference on Robotic Computing, IRC, Taichung, Taiwan; 2017:393‐398.
[78]
Fernández‐Caramés TM, Fraga‐Lamas P. Towards the internet of smart clothing: a review on IoT wearables and garments for creating intelligent connected e‐textiles. Electronics. 2018;7:405.
[79]
Fernández‐Caramés TM, Blanco‐Novoa O, Froiz‐Míguez I, Fraga‐Lamas P. Towards an autonomous industry 4.0 warehouse: a UAV and blockchain‐based system for inventory and traceability applications in big data‐driven supply chain management. Sensors. 2019;19:2394.
[80]
Kapitonov A, Lonshakov S, Krupenkin A, Berman I. Blockchain‐based protocol of autonomous business activity for multi‐agent systems consisting of UAVs. Paper presented at: Proceedings of the 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems,RED‐UAS, Linkoping, Sweden; 2017.
[81]
Islam A, Shin SY. BHMUS: blockchain based secure outdoor health monitoring scheme using UAV in smart city. Paper presented at: Proceedings of the 7th International Conference on Information and Communication Technology, ICoICT, Kuala Lumpur, Malaysia; 2019.
[82]
Sharma V, You I, Jayakody DNK, Reina DG, Choo KR. Neural‐Blockchain‐based ultrareliable caching for edge‐enabled UAV networks. IEEE Trans Ind Inform. 2019;10:5723‐5736.
[83]
Mutingi M, Mbohwa C. A fuzzy‐based particle swarm optimisation approach for task assignment in home healthcare. South African J Ind Eng. 2014;25:84‐95.
[84]
Romero M, Luo Y, Su B, Fuentes S. Vineyard water status estimation using multispectral imagery from an UAV platform and machine learning algorithms for irrigation scheduling management. Comput Electron Agri. 2018;147:109‐117.
[85]
Kim J, Park C, Ahn J, Ko Y, Park J, Gallagher JC. Real‐time UAV sound detection and analysis system. Paper presented at: Proceedings of the Sensors Applications Symposium, SAS, Glassboro, NJ; 2017.
[86]
Chen M, Saad W, Yin C. Liquid state machine learning for resource and cache management in LTE‐U unmanned aerial vehicle (UAV) networks. IEEE Trans Wirel Commun. 2019;18:1504‐1517.
[87]
Han L, Yang G, Dai H, Xu B, Yang H, Feng H. Modeling maize above‐ground biomass based on machine learning approaches using UAV remote‐sensing data. Plant Methods. 2019;15:10.
[88]
Manukyan A, Olivares‐Mendez MA, Voos H, Geist M. Real time degradation identification of UAV using machine learning techniques. Paper presented at: Proceedings of the International Conference on Unmanned Aircraft Systems, ICUAS, Miami, FL; 2017.
[89]
Beretta F, Rodrigues A, Peroni R, Costa J. Automated lithological classification using UAV and machine learning on an open cast mine. Appl Earth Sci. 2019;128(3):79‐88.
[90]
Guo X, Denman S, Fookes C, Mejias L, Sridharan S. Automatic UAV forced landing site detection using machine learning. Paper presented at: Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, DICTA, Wollongong, NSW, Australia; 2014.
[91]
Koch W, Mancuso R, West R, Bestavros A. Reinforcemlearning for UAV attitude control. ACM Trans Cyber‐Phys Syst. 2019;3:1‐21.
[92]
Liu X, Liu Y, Chen Y, Hanzo L. Trajectory design and power control for multi‐UAV assisted wireless networks: a machine learning approach. IEEE Trans Veh Technol. 2019;68:7957‐7969.
[93]
Marcinak MP, Mobasseri BG. Digital video watermarking for metadata embedding in uav video. Paper presented at: Proceedings of the IEEE Military Communications Conference MILCOM 2005‐2005, Atlantic City, NJ; 2005.
[94]
Sun J, Wang W, Kou L, Lin Y, Zhang L, Da Q. A data authentication scheme for UAV ad hoc network communication. J Supercomput. 2017;76(6):1‐16.
[95]
Haque MS, Chowdhury MU. A new cyber security framework towards secure data communication for unmanned aerial vehicle (Uav). Paper presented at: Proceedings of the International Conference on Security and Privacy in Communication Systems, Orlando, VA; 2017.
[96]
Chen M, Chen Z, Zeng X, Xiong Z. Model order selection in reversible image watermarking. IEEE J Select Top Signal Process. 2010;4:592‐604.
[97]
Mobasseri BG, Krishnamurthy P. Establishing target track history by digital watermarking. Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Vol 6819. San Jose, CA: International Society for Optics and Photonics; 2008:68190W.
[98]
Barani MJ, Ayubi P, Valandar MY, Irani BY. A blind video watermarking algorithm robust to lossy video compression attacks based on generalized Newton complex map and contourlet transform. Multimed Tools Appl. 2020;79:2127‐2159.
[99]
Ferreira FA, Lima JB. A robust 3D point cloud watermarking method based on the graph Fourier transform. Multimed Tools Appl. 2020;79:1921‐1950.
[100]
Avdonin I, Budko M, Grozov V, Guirik A. A method of creating perfectly secure data transmission channel between unmanned aerial vehicle and ground control station based on one‐time pads. Paper presented at: Proceedings of the 9th International Congress on Ultra‐Modern Telecommunications and Control Systems and Workshops, ICUMT, Munich, Germany; 2017:410‐413.
[101]
Vattapparamban E, Güvenç I, Yurekli AI, Akkaya K, Uluağaç S. Drones for Smart Cities: Issues in Cybersecurity, Privacy, and Public Safety, Paper presented at: Proceedings of the International Wireless Communications and Mobile Computing Conference, IWCMC, Paphos, Cyprus; 2016.
[102]
Shariat A, Tizghadam A, Leon‐Garcia A. An ICN‐based publish‐subscribe platform to deliver uav service in smart cities. Paper presented at: Proceedings of the IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS, San Francisco, CA; 2016.
[103]
Won J, Seo SH, Bertino E. A secure communication protocol for drones and smart objects. Paper presented at: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, Republic of Singapore; 2015.
[104]
Lodeiro‐Santiago M, Caballero‐Gil P, Aguasca‐Colomo R, Caballero‐Gil C. Secure UAV‐based system to detect small boats using neural networks. Complexity. 2019;2019:1‐11.
[105]
R. Chabukswar, Secure Detection in Cyberphysical Control Systems. Pittsburgh, PA: Carnegie Mellon University; 2014.
[106]
Al‐Garadi MA, Mohamed A, Al‐Ali A, Du X, Guizani M. A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surv Tutor. 2020;22(2):1646–1685. https://doi.org/10.1109/COMST.2020.2988293.
[107]
Challita U, Ferdowsi A, Chen M, Saad W. Machine learning for wireless connectivity and security of cellular‐connected UAVs. IEEE Wirel Commun. 2019;26:28‐35.
[108]
Krajník T, Vonásek V, Fišer D, Faigl J. AR‐drone as a platform for robotic research and education. Paper presented at: Proceedings of the International Conference on Research and Education in Robotics, Prague, Czech Republic; 2011:172‐186.
[109]
Mirza IB. Critical analysis of key safety, privacy and security issues in overcoming barriers through unmanned aerial vehicles (UAVs). Irfan Baig Mirza, National Conference on current advances in computer science, Kakatiya University, Warangal, India; 2017:1‐3.
[110]
Dawy Z, Saad W, Ghosh A, Andrews JG, Yaacoub E. Toward massive machine type cellular communications. IEEE Wirel Commun. 2016;24:120‐128.
[111]
Paganini P. A Hacker Developed Maldrone, the First Malware for Drones; 2015. https://securityaffairs.co/wordpress/32767/hacking/maldrone‐malware‐for‐drones.html.
[112]
Mozaffari M, Saad W, Bennis M, Nam YH, Debbah M. A tutorial on UAVs for wireless networks: applications, challenges, and open problems. IEEE Commun Surv Tutor. 2019;21:2334‐2360.
[113]
Mozaffari M, Saad W, Bennis M, Debbah M. Mobile unmanned aerial vehicles (UAVs) for energy‐efficient internet of things communications. IEEE Trans Wirel Commun. 2017;16:7574‐7589.
[114]
Kamienski C, Kleinschmid J, Soininen JP, Kolehmainen K, Roffia L, Visoli M. SWAMP: Smart water management platform overview and security challenges. Paper presented at: Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN‐W, Luxembourg City, Luxembourg; 2018.
[115]
Calvaresi D, Mualla Y, Najjar A, Galland S, Schumacher M. Explainable multi‐agent systems through blockchain technology. Paper presented at: Proceedings of the International Workshop on Explainable, Transparent Autonomous Agents and Multi‐Agent Systems; 2019.
[116]
Hildmann H, Kovacs E. Using unmanned aerial vehicles (UAVs) as mobile sensing platforms (MSPs) for disaster response, civil security and public safety. Drones. 2019;3:59.
[117]
Mozaffari M, Saad W, Bennis M, Debbah M. Unmanned aerial vehicle with underlaid device‐to‐device communications: performance and tradeoffs. IEEE Trans Wirel Commun. 2016;15:3949‐3463.
[118]
Pang Y, Zhang Y, Gu Y, Pan M, Han Z, Li P. Efficient data collection for wireless rechargeable sensor clusters in harsh terrains using UAVs. Paper presented at: Proceedings of the Global Communications Conference, Austin, TX; 2014.
[119]
Soorki MN, Mozaffari M, Saad W, Manshaei MH, Saidi H. Resource allocation for machine‐to‐machine communications with unmanned aerial vehicles. Paper presented at: Proceedings of the Globecom Workshops, GC Wkshps, Washington, DC; 2016.
[120]
Motlagh NH, Bagaa M, Taleb T. UAV‐based IoT platform: A crowd surveillance use case. IEEE Communications Magazine. 2017;55(2):128‐134. https://doi.org/10.1109/MCOM.2017.1600587CM.
[121]
Ye W, Heidemann J, Estrin D. An energy‐efficient MAC protocol for wireless sensor networks. Paper presented at: Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, Chengdu, China; 2002.
[122]
Alsamhi SH, Ma O, Ansari M, Meng Q. Greening internet of things for smart everythings with a green‐environment life: a survey and future prospects. Telecommun Syst. 2019;72(4):609‐632.
[123]
Won J, Seo SH, Bertino E. Certificateless cryptographic protocols for efficient drone‐based smart city applications. IEEE Access. 2017;5:3721‐3749.
[124]
Sterbenz JP. Drones in the smart city and iot: protocols, resilience, benefits, and risks. Paper presented at: Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, Singapore; 2016.
[125]
Caragliu A, Del Bo C, Nijkamp P. Smart cities in Europe. J Urban Technol. 2011;18:65‐82.
[126]
Momen S, Sharkey AJ. From ants to robots: a decentralised task allocation model for a swarm of robots. Paper presented at: Proceedings of the Swarm Intelligence Algorithms and Applications Symposium, Number, De Montfort University, Leicester, UK; 2010.
[127]
Bayindir L, Şahin E. A review of studies in swarm robotics. Turk J Electr Eng Comput Sci. 2007;15:115‐147.
[128]
Rashid A, Sharma D, Lone TA, Gupta S, Gupta SK. Secure communication in UAV assisted HetNets: a proposed model. Paper presented at: Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Atlanta, GA; 2019:427‐440.
[129]
Hauert S, Winkler L, Zufferey JC, Floreano D. Ant‐based swarming with positionless micro air vehicles for communication relay. Swarm Intell. 2008;2:167‐188.
[130]
Fouché NP, Thomson KL. Exploring the human dimension of TETRA. Paper presented at: Proceedings of the Information Security for South Africa, Johannesburg, South Africa; 2011:1‐5.
[131]
Correll N, Martinoli A. A challenging application in swarm robotics: the autonomous inspection of complex engineered structures. Bulletin of the Swiss Society for Automatic Control, 46; 2007:15‐19. https://infoscience.epfl.ch/record/100221?ln=en.
[132]
Bozorgi‐Amiri A, Jabalameli MS, Alinaghian M, Heydari M. A modified particle swarm optimization for disaster relief logistics under uncertain environment. Int J Adv Manuf Technol. 2012;60:357‐371.
[133]
Andreeva‐Mori A, Kobayashi K, Shindo M. Particle swarm optimization/greedy‐search algorithm for helicopter mission assignment in disaster relief. J Aerosp Inf Syst. 2015;10:646‐660.
[134]
Ganesan S, Shakya M, Aqueel AF, Nambiar LM. Small disaster relief robots with swarm intelligence routing. Paper presented at: Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, Amritapuri Kollam, India; 2011:123‐127.
[135]
Zheng YJ, Ling HF. Emergency transportation planning in disaster relief supply chain management: a cooperative fuzzy optimization approach. Soft Comput. 2013;17:1301‐1314.
[136]
Stormont DP. Autonomous rescue robot swarms for first responders. Paper presented at: Proceedings of the CIHSPS 2005, Proceedings of the 2005 IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, Orlando, FL; 2005:151‐157.
[137]
Parker LE. Current state of the art in distributed autonomous mobile robotics. Distributed Autonomous Robotic Systems. Vol 4. Tokyo: Springer; 2000:3‐12.
[138]
Bonabeau E, Dorigo M, Marco DD, Theraulaz G, Théraulaz G. Swarm Intelligence: From Natural to Artificial Systems. Oxford, UK: Oxford University Press; 1999.
[139]
Holland O, Melhuish C. Stigmergy, self‐organization, and sorting in collective robotics. Artif Life. 1999;5:173‐202.
[140]
White T. Expert Assessment of Stigmergy: A Report for the Department of National Defence (No. DRDC‐CR‐2005‐004). Ottawa (Ontario): Carleton University; 2005.
[141]
Flocchini P, Prencipe G, Santoro N, Widmayer P. Arbitrary pattern formation by asynchronous, anonymous, oblivious robots. Theor Comput Sci. 2008;407:412‐447.
[142]
Dolev S, Lahiani L, Yung M. Secret swarm unit: reactive k‐secret sharing. Ad Hoc Netw. 2012;10:1291‐1305.
[143]
Abbasi K, Batool A, Asghar MA, Saeed A, Khan MJ, Rehman MU. A vision‐based amateur drone detection algorithm for public safety applications. 2019 UK/China Emerging Technologies, UCET. UK: Glasgow; 2019:1‐5.
[144]
Walker JH, Wilson MS. Task allocation for robots using inspiration from hormones. Adapt Behav. 2011;19:208‐224.
[145]
Bentes C, Saotome O. Dynamic swarm formation with potential fields and A* path planning in 3D environment. Paper presented at: Proceedings of the 2012 Brazilian Robotics Symposium and Latin American Robotics Symposium, Fortaleza, Brazil; 2012.
[146]
Brambilla M, Ferrante E, Birattari M, Dorigo M. Swarm robotics: a review from the swarm engineering perspective. Swarm Intell. 2013;7:1‐41.
[147]
Derr K, Manic M. Adaptive control parameters for dispersal of multi‐agent mobile ad hoc network (MANET) swarms. IEEE Trans Ind Inform. 2012;9:1900‐1911.
[148]
Li T, Fu M, Xie L, Zhang JF. Distributed consensus with limited communication data rate. IEEE Trans Autom Control. 2010;56:279‐292.
[149]
Li Y, Du S, Kim Y. Robot swarm manet cooperation based on mobile agent. Paper presented at: Proceedings of the International Conference on Robotics and Biomimetics, ROBIO, Guilin, China; 2009.
[150]
Das GP, McGinnity TM, Coleman SA, Behera L. A fast distributed auction and consensus process using parallel task allocation and execution. Paper presented at: Proceedings of the 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems, San Francisco, CA; 2011.
[151]
Aragues R, Cortes J, Sagues C. Distributed consensus on robot networks for dynamically merging feature‐based maps. IEEE Trans Robot. 2012;28:840‐854.
[152]
Navarro I, Matía F. A framework for the collective movement of mobile robots based on distributed decisions. Robot Auton Syst. 2011;59:685‐697.
[153]
Pourmehr S, Monajjemi VM, Vaughan R, Mori G. You two! Take off!: Creating, modifying and commanding groups of robots using face engagement and indirect speech in voice commands. Paper presented at: Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Tokyo, Japan; 2013.
[154]
Jensen IJ, Selvaraj DF, Ranganathan P. Blockchain technology for networked swarms of unmanned aerial vehicles (UAVs). Paper presented at: Proceedings of the 20thInternational Symposium on" A World of Wireless, Mobile and Multimedia Networks", WoWMoM, Washington, DC; 2019.
[155]
Shakhatreh H, Sawalmeh AH, Al‐Fuqaha A, et al. Unmanned aerial vehicles (UAVs) a survey on civil applications and key research challenges. IEEE Access. 2019;7:48572‐48634.
[156]
Zhang Y, Wen J. The IoT electric business model: using blockchain technology for the internet of things. Peer‐to‐Peer Netw Appl. 2017;10:983‐994.
[157]
Dorri A, Kanhere SS, Jurdak R. Towards an optimized blockchain for IoT. Paper presented at: Proceedings of the IEEE/ACM Second International Conference on Internet‐of‐Things Design and Implementation, IoTDI, Pittsburgh, PA; 2017.
[158]
Novo O. Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE IoT J. 2018;5:1184‐1195.
[159]
Panarello A, Tapas N, Merlino G, Longo F, Puliafito A. Blockchain and iot integration: a systematic survey. Sensors. 2018;18:2575.
[160]
Dwivedi AD, Srivastava G, Dhar S, Singh R. A decentralized privacy‐preserving healthcare blockchain for IoT. Sensors. 2019;19:326.
[161]
Dorri A, Kanhere SS, Jurdak R, Gauravaram P. Lsb: a lightweight scalable blockchain for iot security and privacy. J Parall Distrib Comput. 2019;134:180‐197.
[162]
Rahulamathavan Y, Phan RC, Rajarajan M, Misra S, Kondoz A. Privacy‐preserving blockchain based IoT ecosystem using attribute‐based encryption. Paper presented at: Proceedings of the International Conference on Advanced Networks and Telecommunications Systems, ANTS, Bhubaneswar, India; 2017:1‐6.
[163]
Zhou L, Wang L, Sun Y, Lv P. Beekeeper: a blockchain‐based iot system with secure storage and homomorphic computation. IEEE Access. 2018;6:43472‐43488.
[164]
Miller D. Blockchain and the internet of things in the industrial sector. IT Prof. 2018;20(3):15‐18.
[165]
Lin J, Shen Z, Zhang A, Chai Y. Blockchain and IoT based food traceability for smart agriculture. Paper presented at: Proceedings of the 3rd International Conference on Crowd Science and Engineering, Singapore; 2018.
[166]
Huckle S, Bhattacharya R, White M, Beloff N. Internet of things, blockchain and shared economy applications. Proc Comput Sci. 2016;98:461‐466.
[167]
Bylica P, Gleń L, Janiuk P, Skrzypczak A, Zawłocki A. A probabilistic nanopayment scheme for golem; 2015. http://golemproject net/doc/GolemNanopayments pdf.
[168]
Hurich P. The virtual is real: an argument for characterizing bitcoins as private property. Bank Finan law Rev. 2016;31:573.
[169]
Ekblaw A, Azaria A, Halamka JD, Lippman A. A case study for blockchain in healthcare:"medrec" prototype for electronic health records and medical research data. Paper presented at: Proceedings of the IEEE Open & Big Data Conference, Washington DC; 2016.
[170]
Azaria A, Ekblaw A, Vieira T, Lippman A. Medrec: using blockchain for medical data access and permission management. Paper presented at: Proceedings of the 2nd International Conference on Open and Big Data, OBD, Vienna, Austria; 2016.
[171]
Yue X, Wang H, Jin D, Li M, Jiang W. Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J Med Syst. 2016;40:218.
[172]
Xu X, Pautasso C, Zhu L, Gramoli V, Ponomarev A, Tran AB. The blockchain as a software connector. Paper presented at: Proceedings of the 13th Working IEEE/IFIP Conference on Software Architecture, WICSA, Venice, Italy; 2016.
[173]
Beller M, Hejderup J. Blockchain‐based software engineering. Paper presented at: Proceedings of the IEEE/ACM 41st International Conference on Software Engineering: New Ideas and Emerging Results, ICSE‐NIER, Montreal Quebec Canada; 2019:53‐56.
[174]
Czepluch JS, Lollike NZ, Malone SO. The Use of Block Chain Technology in Different Application Domains. Copenhagen: The IT University of Copenhagen; 2015.
[175]
Biswas K, Muthukkumarasamy V. Securing smart cities using blockchain technology. Paper presented at: Proceedings of the 18th International Conference on High Performance Computing and Communications. IEEE 14th International Conference on Smart City, IEEE 2nd International Conference on Data Science and Systems, HPCC/SmartCity/DSS, Sydney, NSW, Australia; 2016.
[176]
Sun J, Yan J, Zhang KZ. Blockchain‐based sharing services: what blockchain technology can contribute to smart cities. Financ Innovat. 2016;2:1‐9.
[177]
Ibba S, Pinna A, Seu M, Pani FE. CitySense: blockchain‐oriented smart cities. Paper presented at: Proceedings of the XP2017 Scientific Workshops, New York NY; 2017;1‐5.
[178]
Michelin RA, Dorri A, Steger M, Lunardi RC, Kanhere SS, Jurdak R. SpeedyChain: a framework for decoupling data from blockchain for smart cities. Paper presented at: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, New York, NY; 2018.
[179]
Pradip Kumar Sharma and Jong Hyuk Park, Blockchain based hybrid network architecture for the smart city, Futur Gener Comput Syst. 2018;86:650‐655.
[180]
Rivera R, Robledo JG, Larios LM, Avalos JM. How digital identity on blockchain can contribute in a smart city environment. Paper presented at: Proceedings of the International Smart Cities Conference, ISC2, Wuxi, China; 2017.
[181]
Xie J, Tang H, Huang T, Yu FR, Xie R, Liu J. A survey of blockchain technology applied to smart cities: research issues and challenges. IEEE Commun Surv Tutor. 2019;21:2794‐27830.
[182]
Shen M, Tang X, Zhu L, Du X, Guizani M. Privacy‐preserving support vector machine training over blockchain‐based encrypted IoT data in smart cities. IEEE IoT J. 2019;6(5):7702‐7712.
[183]
Cheikhrouhou O, Koubâa A. BlockLoc: secure localization in the Internet of Things using blockchain. Paper presented at: Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, IWCMC, Tangier, Morocco; 2019.
[184]
Zheng Z, Xie S, Dai HN, Chen X, Wang H. Blockchain challenges and opportunities: a survey. Int J Web Grid Serv. 2018;14:352‐375.
[185]
Nakamoto S, Bitcoin A. A peer‐to‐peer electronic cash system, Bitcoin; 2008. https://bitcoin.org/bitcoin.pdf.
[186]
S. King and S. Nadal, Ppcoin: Peer‐to‐Peer Crypto‐Currency with Proof‐of‐Stake, Self‐Published Paper, 19. Netherlands: Peercoin Foundation; (2012).
[187]
Castro M, Liskov B. Practical Byzantine fault tolerance. OSDI. New Orleans, LA: Third Symposium on Operating Systems Design and Implementation; 1999:173‐186. http://pmg.csail.mit.edu/papers/osdi99.pdf.
[188]
D. Larimer, Delegated proof‐of‐stake (dpos), Bitshare Whitepaper, 3. San Francisco, CA: Copyright 2019, BitShares Blockchain Foundation Revision 3f4a1623; 2019. https://how.bitshares.works/en/master/technology/dpos.html.
[189]
D. Mazieres, The stellar consensus protocol: a federated model for internet‐level consensus, Stellar Development Foundation. (2015).
[190]
J. Kwon, Tendermint: consensus without mining, Draft v. 0.6, fall, (2014).
[191]
D. Schwartz, N. Youngs and A. Britto, The ripple protocol consensus algorithm. Ripple Labs Inc White Paper, 2014, 5(8).
[192]
Ghosh M, Richardson M, Ford B, Jansen R. A TorPath to TorCoin: Proof‐of‐Bandwidth Altcoins for Compensating Relays. Washington, DC: Naval Research Lab; 2014.
[193]
Miller A, Juels A, Shi E, Parno B, Katz J. Permacoin: repurposing bitcoin work for data preservation. Paper presented at: Proceedings of the 2014 IEEE Symposium on Security and Privacy, San Jose, CA; 2014:475‐490.
[194]
Intel, Proof of elapsed time (poet); 2017. http://intelledger.github.io/.
[196]
E. community Kovan ‐ stable ethereum public testnet; 2017. https://github.com/kovan‐testnet/proposal.
[197]
Cooley R, Wolf S, Borowczak M. Secure and decentralized swarm behavior with autonomous agents for smart cities. Paper presented at: Proceedings of the IEEE International Smart Cities Conference, ISC2, Kansas City, MO; 2018:1‐8.
[198]
Alsamhi SH, Ma O, Ansari MS. Survey on artificial intelligence based techniques for emerging robotic communication. Telecommun Syst. 2019;72:483‐503.
[199]
Khan MA, Salah K. IoT security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst. 2018;82:395‐411.
[200]
Ferrer EC. The blockchain: a new framework for robotic swarm systems. Paper presented at: Proceedings of the Future Technologies Conference, Canada; 2018:1037‐1058.
[201]
Sabri AQ, Mansoor AM, Obaidellah UH, Faizal ER, PC JL. Metadata hiding for UAV video based on digital watermarking in DWT transform. Multimed Tools Appl. 2017;76:16239‐16261.
[202]
Riyas M, Umesh AC. Hardware implementation of a digital watermarking system using 3d Dct. IOSR‐JEEE. 2014;9:99‐108.
[203]
Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN. A cryptographic, discrete cosine transform and frequency domain watermarking approach for securing digital images. Paper presented at: Proceedings of the International Conference on Image Processing, Computer Vision, and Pattern Recognition,IPCV,The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens; 2015:161‐165.
[204]
Anwar MZ, Kaleem Z, Jamalipour A. Machine learning inspired sound‐based amateur drone detection for public safety applications. IEEE Trans Veh Technol. 2019;68:2526‐2534.
[205]
Sharma PK, Moon SY, Park JH. Block‐vn: a distributed blockchain based vehicular network architecture in smart city. JIPS. 2017;13:184‐195.
[206]
Ruta M, Scioscia F, Ieva S, et.al. Semantic‐enhanced blockchain technology for smart cities and communities. Paper presented at: Proceedings of the 3rd Italian Conference on ICT, Bari, Italy; 2017.
[207]
Yang R, Yu FR, Si P, Yang Z, Zhang Y. Integrated blockchain and edge computing systems: a survey, some research issues and challenges. IEEE Commun Surv Tutor. 2019;21(2):1508‐1532.
[208]
Xiong Z, Zhang Y, Niyato D, Wang P, Han Z. When mobile blockchain meets edge computing. IEEE Commun Mag. 2018;56:33‐39.
[209]
Li Z, Barenji AV, Huang GQ. Toward a blockchain cloud manufacturing system as a peer to peer distributed network platform. Robot Comput Integr Manuf. 2018;54:133‐144.
[210]
Stanciu A. Blockchain based distributed control system for edge computing. Paper presented at: Proceedings of the 2017 21st International Conference on Control Systems and Computer Science (CSCS); 2017:667‐671; Bucharest, Romania: IEEE.
[211]
Liu H, Zhang Y, Yang T. Blockchain‐enabled security in electric vehicles cloud and edge computing. IEEE Netw. 2018;32:78‐83.
[212]
Kang J, Yu R, Huang X, et al. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE IoT J. 2018;6(3):4660–4670.
[213]
El Ioini N, Pahl C, Helmer S. A Decision Framework for Blockchain Platforms for Iot and Edge Computing. Bolzano, Italy: Bozen‐Bolzano Institutional Archive (BIA); 2018.
[214]
Mengelkamp E, Notheisen B, Beer C, Dauer D, Weinhardt C. A blockchain‐based smart grid: towards sustainable local energy markets. Comput Sci‐Res Dev. 2018;33(2018):207‐214.
[215]
Mylrea M, Gourisetti SNG. Blockchain for smart grid resilience: exchanging distributed energy at speed, scale and security. 2017 Resilience Week (RWS). Wilmington, DE: IEEE; 2017:18‐23.
[216]
Guan Z, Si G, Zhang X, et al. Privacy‐preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag. 2018;56(2018):82‐88.
[217]
Cohn A, West T, Parker C. Smart after all: blockchain, smart contracts, parametric insurance, and smart energy grids. Georgetown Law Technol Rev. 2017;1:273‐304.
[218]
Pop C, Cioara T, Antal M, Anghel I, Salomie I, Bertoncini M. Blockchain based decentralized management of demand response programs in smart energy grids. Sensors. 2018;18:162.
[219]
Alladi T, Chamola V, Rodrigues JJ, Kozlov SA. Blockchain in smart grids: a review on different use cases. Sensors. 2019;19:4862.
[220]
Miglani A, Kumar N, Chamola V, Zeadally S. Blockchain for internet of energy management: a review, solutions and challenges. Comput Commun. 2019;151:395‐418.
[221]
Hassija V, Chamola V, Garg S, Dara N, Kaddoum G, Jayakody N. A blockchain‐based framework for lightweight data sharing and energy trading in v2g network. IEEE Trans Veh Technol. 2019;69(6):5799–5812.
[222]
Sharma PK, Chen MY, Park JH. A software defined fog node based distributed blockchain cloud architecture for iot. IEEE Access. 2017;6:115‐124.
[223]
E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri and V. Sassone, Blockchain‐Based Database to Ensure Data Integrity in Cloud Computing Environments. Venice, Italy: Italian Conference on Cybersecurity; 2017.
[224]
Park J, Park J. Blockchain security in cloud computing: use cases, challenges, and solutions. Symmetry. 2017;9:164.
[225]
Liang X, Shetty S, Tosh D, Kamhoua C, Kwiat K, Njilla L. Provchain: a blockchain‐based data provenance architecture in cloud environment with enhanced privacy and availability. Paper presented at: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Madrid, Spain; 2017:468‐477; IEEE Press.
[226]
Esposito C, De Santis A, Tortora G, Chang H, Choo KKR. Blockchain: a panacea for healthcare cloud‐based data security and privacy. IEEE Cloud Comput. 2018;5(1):31‐37.
[227]
Xu C, Wang K, Guo M. Intelligent resource management in blockchain‐based cloud datacenters. IEEE Cloud Comput. 2017;4(2017):50‐59.
[228]
Zhang Y, Deng RH, Liu X, Zheng D. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inform Sci. 2018;462:262‐277.
[229]
Kim HW, Jeong YS. Secure authentication‐management human‐centric scheme for trusting personal resource information on mobile cloud computing with blockchain. HCIS. 2018;8:11.
[230]
Zhu L, Wu Y, Gai K, Choo KKR. Controllable and trustworthy blockchain‐based cloud data management. Futur Gener Comput Syst. 2019;91:527‐535.
[231]
Zhang Y, Deng R, Liu X, Zheng D. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput. 2018;1–14. https://doi.org/10.1109/TSC.2018.2864191.
[232]
Yang C, Chen X, Xiang Y. Blockchain‐based publicly verifiable data deletion scheme for cloud storage. J Netw Comput Appl. 2018;103:185‐193.
[233]
Xiong Z, Feng S, Wang W, Niyato D, Wang P, Han Z. Cloud/fog computing resource management and pricing for blockchain networks. IEEE IoT J. 2018;6(3):4585–4600.
[234]
Kaur H, Alam MA, Jameel R, Mourya AK, Chang V. A proposed solution and future direction for blockchain‐based heterogeneous medicare data in cloud environment. J Med Syst. 2018;42:156.
[235]
Wang H, Song Y. Secure cloud‐based ehr system using attributebased cryptosystem and blockchain. J Med Syst. 2018;42:152.
[236]
Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K. Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. Paper presented at: Proceedings of the IEEE INFOCOM 2018‐IEEE Conference on Computer Communications; 2018:792‐800; Honolulu, HI: IEEE.
[237]
Tosh D, Shetty S, Foytik P, Kamhoua C, Njilla L. Cloudpos: a proof‐of‐stake consensus design for blockchain integrated cloud. Paper presented at: Proceedings of the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD); 2018:302‐309; San Francisco, CA: IEEE.
[238]
Gai K, Choo KKR, Zhu L. Blockchain‐enabled reengineering of cloud datacenters. IEEE Cloud Comput. 2018;5(6):21‐25.
[239]
Li J, Wu J, Chen L. Block‐secure: blockchain based scheme for secure p2p cloud storage. Inf Sci. 2018;465:219‐231.
[240]
Outchakoucht A, Hamza ES, Leroy JP. Dynamic access control policy based on blockchain and machine learning for the internet of things. Int J Adv Comput Sci Appl. 2017;8(7):417‐424.
[241]
Liu Y, Yu FR, Li X, Ji H, Leung VC. Blockchain and machine learning for communications and networking systems. IEEE Commun Surv Tutor. 2020;22:1392‐1431.
[242]
Swan M. Blockchain thinking: the brain as a decentralized autonomous corporation [commentary]. IEEE Technol Soc Mag. 2015;34:41‐52.
[243]
Dinh TN, Thai MT. Ai and blockchain: a disruptive integration. Computer. 2018;51:48‐53.
[244]
Rahman MA, Hossain MS, Rashid MM, Barnes SJ, Alhamid MF, Guizani M. A blockchain‐based non‐invasive cyberphysical occupational therapy framework: BCI perspective. IEEE Access. 2019;7:34874‐34884.
[245]
Bak S, Pyo Y, Jeong J. Protection of eeg data using blockchain platform. Paper presented at: Proceedings of the 2019 7th International Winter Conference on Brain‐Computer Interface (BCI), Seoul, Korea; 2019:1‐3.
[246]
Weng JS, Weng J, Zhang J, Li M, Zhang Y, Weiqi Luo . Deepchain: auditable and privacy‐preserving deep learning with blockchain‐based incentive. IEEE Transactions on Dependable and Secure Computing; 2019;14(8):1–18. https://doi.org/10.1109/TDSC.2019.2952332.
[247]
Dai Y, Xu D, Maharjan S, Chen Z, He Q, Zhang Y. Blockchain and deep reinforcement learning empowered intelligent 5g beyond. IEEE Netw. 2019;33:10‐17.
[248]
Luong NC, Xiong Z, Wang P, Niyato D. Optimal auction for edge computing resource management in mobile blockchain networks: a deep learning approach. Paper presented at: Proceedings of the 2018 IEEE International Conference on Communications (ICC); 2018:1‐6; Kansas City, MO: IEEE.
[249]
Juneja A, Marefat M. Leveraging blockchain for retraining deep learning architecture in patient‐specific arrhythmia classification. Paper presented at: Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI); 2018:393‐397; Las Vegas, NV: IEEE.
[250]
Qiu C, Yu FR, Yao H, Jiang C, Xu F, Zhao C. Blockchainbased software‐defined industrial internet of things: a dueling deep q‐learning approach. IEEE IoT J. 2018.6(3):4627–4639.
[251]
Chen RY. A traceability chain algorithm for artificial neural networks using t–s fuzzy cognitive maps in blockchain. Futur Gener Comput Syst. 2018;80:198‐210.
[252]
Swan M, dos Santos R. Smart network field theory: the technophysics of blockchain and deep learning. Physics and Society; 2018:1‐48. https://doi.org/10.2139/ssrn.3262945.
[253]
Alladi T, Chamola V, Parizi RM, Choo KKR. Blockchain applications for industry 4.0 and industrial iot: a review. IEEE Access. 2019;7:176 935‐176 951. https://doi.org/10.1109/ACCESS.2019.2956748.
[254]
Mezquita Y, Casado R, Gonzalez‐Briones A, Prieto J, Corchado JM, A. AETiC . Blockchain technology in IoT systems: review of the challenges. Annals of Emerging Technologies in Computing (AETiC). England, UK: International Association of Educators and Researchers (IAER); 2019:2516‐0281.
[255]
Dorri A, Kanhere SS, Jurdak R, Gauravaram P. Blockchain for iot security and privacy: the case study of a smart home. Paper presented at: Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom workshops); 2017:618‐623; Kona, HI: IEEE.
[256]
Huh S, Cho S, Kim S. Managing iot devices using blockchain platform. Paper presented at: Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT); 2017:464‐467; Bongpyeong, South Korea: IEEE.
[257]
Samaniego M, Deters R. Blockchain as a service for iot. Paper presented at: Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData); 2016:433‐436; Chengdu, China: IEEE.
[258]
Kshetri N. Can blockchain strengthen the internet of things? IT Prof. 2017;19(2017):68‐72.
[259]
Reyna A, Martín C, Chen J, Soler E, Díaz M. On blockchain and its integration with iot. challenges and opportunities. Futur Gener Comput Syst. 2018;88:173‐190.
[260]
Lin J, Shen Z, Miao C. Using blockchain technology to build trust in sharing lorawan iot. Paper presented at: Proceedings of the 2nd International Conference on Crowd Science and Engineering; 2017:38‐43; Beijing, China: ACM.
[261]
Kumar NM, Mallick PK. Blockchain technology for security issues and challenges in iot. Proc Comput Sci. 2018;132:1815‐1823.
[262]
Ouaddah A, Elkalam AA, Ouahman AA. Towards a novel privacy‐preserving access control model based on blockchain technology in iot. Europe and MENA Cooperation Advances in Information and Communication Technologies. New York, NY: Springer; 2017:523‐533.
[263]
Huang Z, Su X, Zhang Y, Shi C, Zhang H, Xie L. A decentralized solution for iot data trusted exchange based‐on blockchain. Paper presented at: Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC); 2017:1180‐1184; Chengdu, China: IEEE.
[264]
Bahga A, Madisetti VK. Blockchain platform for industrial internet of things. J Softw Eng Appl. 2016;9:533‐546.
[265]
Walker MA, Dubey A, Laszka A, Schmidt DC. Platibart: a platform for transactive iot blockchain applications with repeatable testing. Paper presented at: Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things; 2017:17‐22; Nevada, LA: ACM.
[266]
Danzi P, Kalor AE, Stefanovic C, Popovski P. Analysis of the communication traffic for blockchain synchronization of iot devices. Paper presented at: Proceedings of the 2018 IEEE International Conference on Communications (ICC); 2018:1‐7; Kansas City, MO: IEEE.
[267]
Ozyılmaz KR, Yurdakul A. Work‐in‐progress: Integrating low‐power iot devices to a blockchain‐based infrastructure. Paper presented at: Proceedings of the 2017 International Conference on Embedded Software (EMSOFT); 2017:1‐2; Seoul, South Korea: IEEE.
[268]
Shafagh H, Burkhalter L, Hithnawi A, Duquennoy S. Towards blockchain‐based auditable storage and sharing of iot data. Paper presented at: Proceedings of the 2017 on Cloud Computing Security Workshop; 2017:45‐50; Dallas TX: ACM.
[269]
Liu B, Yu XL, Chen S, Xu X, Zhu L. Blockchain based data integrity service framework for iot data. Paper presented at: Proceedings of the 2017 IEEE International Conference on Web Services (ICWS); 2017:468‐475; Honolulu, HI: IEEE.
[270]
C.F. Liao, S.W. Bao, C.J. Cheng and K. Chen, On design issues and architectural styles for blockchain‐driven iot services. Paper presented at: Proceedings of the 2017 IEEE international conference on consumer electronics‐Taiwan (ICCE‐TW), Taipei, Taiwan: IEEE, 2017:351–352.
[271]
Fernández‐Caramés TM, Blanco‐Novoa O, Suárez‐Albela M, Fraga‐Lamas P. A uav and blockchain‐based system for industry 4.0 inventory and traceability applications. Multidisciplinary Digital Publishing Institute Proceedings. Presented at the 5th International Electronic Conference on Sensors and Applications. Vol 4. 1Switzerland: MDPI Multidisciplinary Digital Publishing Institute; 2018:1–7. https://doi.org/10.3390/ecsa-5-05758.
[272]
[273]
Samaniego M, Deters R. Hosting virtual iot resources on edgehosts with blockchain. Paper presented at: Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT); 2016:116‐119; Fiji: IEEE.
[274]
Boudguiga A, Bouzerna N, Granboulan L, et al. Towards better availability and accountability for iot updates by means of a blockchain. Paper presented at: Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); 2017:50‐58; Paris, France: IEEE.
[275]
Angeletti F, Chatzigiannakis I, Vitaletti A. The role of blockchain and iot in recruiting participants for digital clinical trials. Paper presented at: Proceedings of the 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM); 2017:1‐5; Split, Croatia: IEEE.
[276]
Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on iot security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82 721‐82 743.
[277]
Makhdoom I, Abolhasan M, Abbas H, Ni W. Blockchain's adoption in iot: the challenges, and a way forward. J Netw Comput Appl. 2019;125:251‐279.
[278]
McGhin T, Choo KKR, Liu CZ, He D. Blockchain in healthcare applications: research challenges and opportunities. J Netw Comput Appl. 2019;135:62‐75.
[279]
Hassija V, Bansal G, Chamola V, Saxena V, Sikdar B. Blockcom: a blockchain based commerce model for smart communities using auction mechanism. Paper presented at: Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops); 2019:1‐6; Shanghai, China: IEEE.
[280]
Su Z, Wang Y, Xu Q, Fei M, Tian Y‐C, Zhang N. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE IoT J. 2018.6(3):4601–4613.
[281]
Kianmajd P, Rowe J, Levitt K. Privacy‐preserving coordination for smart communities. Paper presented at: Proceedings of the 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2016:1045‐1046; San Francisco, CA: IEEE.
[282]
Alcarria R, Bordel B, Robles T, Martín D, Manso‐Callejo MA. A blockchain‐based authorization system for trustworthy resource monitoring and trading in smart communities. Sensors. 2018;18:3561.
[283]
Aggarwal S, Chaudhary R, Aujla GS, Kumar N, Choo KKR, Zomaya AY. Blockchain for smart communities: applications, challenges and opportunities. J Netw Comput Appl. 2019;144:13‐48.
[284]
Mehta P, Gupta R, Tanwar S. Blockchain envisioned UAV networks: challenges, solutions, and comparisons. Comput Commun. 2020;151:518‐538.
[285]
Liang X, Zhao J, Shetty S, Li D. Towards data assurance and resilience in IoT using blockchain. Paper presented at: Proceedings of the 2017 IEEE Military Communications Conference, MILCOM MILCOM 2017, Baltimore, MD; 2017.
[286]
Kuzmin A, Znak E. Blockchain‐base structures for a secure and operate network of semi‐autonomous unmanned aerial vehicles. Paper presented at: Proceedings of the International Conference on Service Operations and Logistics, and Informatics, SOLI, Singapore, Singapore; 2018.
[287]
Singh M, Singh A, Kim S,. Blockchain: a game changer for securing IoT data. Paper presented at: Proceedings of the 4th World Forum on Internet of Things, WF‐IoT, Singapore, Singapore; 2018.
[288]
Korki M, Shankar ND, Shah RN, Waseem SM, Hodges S. Automatic fault detection of power lines using unmanned aerial vehicle (UAV). Paper presented at: Proceedings of the 1st International Conference on Unmanned Vehicle Systems‐Oman UVS, Muscat, Oman; 2019.
[289]
Chen M, Challita U, Saad W, Yin C, Debbah M. Artificial neural networks‐based internet of for wireless networks: a tutorial. Commun Surv Tutor. 2019;21(4):3039‐3071.
[290]
Garcia Lopez P, Montresor A, Epema D, Datta A, Higashino T, Iamnitchi A. Edge‐Centric Computing: Vision and Challenges. 45. New York, NY: ACM SIGCOMM Computer Communication; 2015.
[291]
Plastiras G, Terzi M, Kyrkou C, Theocharidcs T. Edge intelligence: challenges and opportunities of near‐sensor machine learning applications. Paper presented at: Proceedings of the 29th International Conference on Application‐Specific Systems, Architectures and Processors, ASAP, Milano, Italy; 2018.
[292]
Yuan C, Liu Z, Zhang Y. UAV‐based forest fire detection and tracking using image processing techniques. Paper presented at: Proceedings of the International Conference on Unmanned Aircraft Systems, ICUAS, Denver, CO; 2015.
[293]
Alexandrov D, Pertseva E, Berman I, Pantiukhin I, Kapitonov A. Analysis of machine learning methods for wildfire security monitoring with an unmanned aerial vehicles. Paper presented at: Proceedings of the 24th Conference of Open Innovations Association, FRUCT, Moscow, Russia; 2019.
[294]
Alipour‐Fanid A, Dabaghchian M, Wang N, Wang P, Zhao L, Zeng K. Machine learning‐based delay‐aware UAV detection over encrypted Wi‐Fi traffic, Paper presented at: Proceedings of the Conference on Communications and Network Security, CNS, Washington DC; 2019.
[295]
Delmerico J, Mueggler E, Nitsch J, Scaramuzza D. Active autonomous aerial exploration for ground robot path planning. IEEE Robot Automat Lett. 2017;2(2):664‐671.
[296]
Lee J, Wang J, Crandall D, Sabanovic S, Fox G. Real‐time, cloud‐based object detection for unmanned aerial vehicles. Paper presented at: Proceedings of the Robotic Computing (IRC), IEEE International Conference, Taichung, Taiwan; 2017:36‐43.
[297]
Shah U, Khawad R, Krishna KM. Deepfly: towards complete autonomous navigation of mavs with monocular camera. Paper presented at: Proceedings of the 10th Indian Conference on Computer Vision, graphics and image processing, Guwahati, India; December 18, 2016:1‐8.
[298]
Gu J, Su T, Wang Q, Du X, Guizani M. Multiple moving targets surveillance based on a cooperative network for multi‐UAV. IEEE Commun Mag. 2018;56(4):82‐89.
[299]
Bazi Y, Melgani F. Convolutional SVM networks for object detection in UAV imagery. IEEE Trans Geosci Remote Sens. 2018;56(6):3107‐3118.
[300]
Li W, Fu H, Yu L, Cracknell A. Deep learning based oil palm tree detection and counting for high‐resolution remote sensing images. Remote Sens (Basel). 2016;9:22.
[301]
Kelchtermans K, Tuytelaars T. How hard is it to cross the room? training (recurrent) neural networks to steer a UAV; 2017. arXiv preprint arXiv:1702.07600.
[302]
Delmerico J, Giusti A, Mueggler E, Gambardella LM, Scaramuzza D. On‐the‐spot training for terrain classification in autonomous air‐ground collaborative teams. Paper presented at: Proceedings of the International Symposium on Experimental Robotics, Tokyo, Japan; 2016:574–585.
[303]
D.K. Kim and T. Chen. Deep neural network for real‐time autonomous indoor navigation. 2015. https://arxiv.org/abs/1511.04668v1.
[304]
Guang‐qi L, Xiao‐shi Z, Yan‐ling Z, Na L. A robust digital video watermark algorithm based on DCT domain, Paper presented at: Proceedings of the International Conference on Computer Application and System Modeling, ICCASM, Taiyuan, China; 2010.
[305]
Yuan XC, Pun CM. Digital image watermarking scheme based on histogram in DWT domain. Paper presented at: Proceedings of the 6th International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, South Korea; 2010.
[306]
Tian H, Ji W. A digital video watermarking scheme based on 1D‐DWT, Paper presented at: Proceedings of the International Conference on Biomedical Engineering and Computer Science, Wuhan, China; 2010.
[307]
Lai CC, Yeh CH. A Hybrid Image Watermarking Scheme Based on SVD and DCT, Paper presented at: Proceedings of the International Conference on Machine Learning and Cybernetics, Qingdao, China; 2010.
[308]
Hua Y, Wu B, Wu G. A color image fragile watermarking algorithm based on DWT‐DCT. Paper presented at: Proceedings of the Chinese Control and Decision Conference, Xuzhou, China; 2010.
[309]
Seddik H, Sayadi M, Fnaiech F. A new blind image watermarking method based on Shur transformation. Paper presented at: Proceedings of the 35th Annual Conference of IEEE Industrial Electronics, Porto, Portugal; 2009.
[310]
Wei J, Yong S, Ma X. Blind digital watermarking algorithm based on quantization in contourlet domain. Paper presented at: Proceedings of the 2nd International Conference on E‐Business and Information System Security, Wuhan, China; 2010.
[311]
Zhou J, Pang, M. Digital watermark for printed materials. Paper presented at: Proceedings of the International Conference on Network Infrastructure and Digital Content, Beijing, China; 2010.
[312]
Cheung W. Digital image watermarking in spatial and transform domains. TENCON Proceedings Intelligent Systems and Technologies for the New Millennium, Cat No 00CH37119, Kuala Lumpur, Malaysia; 2000.
[313]
Al‐Haj A. Combined DWT‐DCT digital image watermarking. J Comput Sci. 2007;3:740‐746.
[314]
Dubolia R, Singh R, Bhadoria SS, Gupta R. Digital image watermarking by using discrete wavelet transform and discrete cosine transform and comparison based on PSNR, Paper presented at: Proceedings of the International Conference on Communication Systems and Network Technologies, Katra, Jammu, India; June 3, 2011:593‐596.
[315]
Luyen CT, Cuong NH, Van At P. A novel public key robust watermarking method for still images based on intentional permutation based on DCT and DWT, IEEE‐RIVF. Paper presented at: Proceedings of the International Conference on Computing and Communication Technologies, RIVF, Danang, Vietnam; 2019.
[316]
Wu CF, Hsieh HS. Digital watermarking using zerotree of DCT. IEEE Trans Consum Electron. 2000;46:87‐94.
[317]
Tedmori S, Al‐Najdawi N. Lossless image cryptography algorithm based on discrete cosine transform. Int Arab J Inf Technol. 2012;9:471‐478.
[318]
Esteves JL. Electromagnetic watermarking: exploiting IEMI effects for forensic tracking of UAVs, Paper presented at: Proceedings of the International Symposium on Electromagnetic Compatibility‐EMC EUROPE, Barcelona, Spain; 2019.
[319]
Thillainayagi R, Senthil Kumar K. Combination of wavelet transform and singular value decomposition‐based contrast enhancement technique for target detection in UAV reconnaissance thermal images. J Mod Opt. 2019;66(6):606‐617.

Cited By

View all
  • (2024)Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110140239:COnline publication date: 1-Feb-2024
  • (2024)Exploring the feasibility of adversarial attacks on medical image segmentationMultimedia Tools and Applications10.1007/s11042-023-15575-883:4(11745-11768)Online publication date: 1-Jan-2024
  • (2024)Multi‐UAV path planning utilizing the PGA algorithm for terrestrial IoT sensor network under ISAC frameworkTransactions on Emerging Telecommunications Technologies10.1002/ett.491635:1Online publication date: 15-Jan-2024
  • Show More Cited By

Index Terms

  1. A survey on recent optimal techniques for securing unmanned aerial vehicles applications
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Please enable JavaScript to view thecomments powered by Disqus.

              Information & Contributors

              Information

              Published In

              cover image Transactions on Emerging Telecommunications Technologies
              Transactions on Emerging Telecommunications Technologies  Volume 32, Issue 7
              July 2021
              405 pages
              EISSN:2161-3915
              DOI:10.1002/ett.v32.7
              Issue’s Table of Contents

              Publisher

              John Wiley & Sons, Inc.

              United States

              Publication History

              Published: 05 July 2021

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 12 Jan 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2024)Comprehensive systematic review of intelligent approaches in UAV-based intrusion detection, blockchain, and network securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110140239:COnline publication date: 1-Feb-2024
              • (2024)Exploring the feasibility of adversarial attacks on medical image segmentationMultimedia Tools and Applications10.1007/s11042-023-15575-883:4(11745-11768)Online publication date: 1-Jan-2024
              • (2024)Multi‐UAV path planning utilizing the PGA algorithm for terrestrial IoT sensor network under ISAC frameworkTransactions on Emerging Telecommunications Technologies10.1002/ett.491635:1Online publication date: 15-Jan-2024
              • (2023)A Connectivity Aware Path Planning for a Fleet of UAVs in an Urban EnvironmentIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.328099524:10(10537-10552)Online publication date: 1-Oct-2023
              • (2023)Drone cybersecurity issues, solutions, trend insights and future perspectives: a surveyNeural Computing and Applications10.1007/s00521-023-08857-735:31(23063-23101)Online publication date: 31-Aug-2023
              • (2022)Internet of Low-Altitude UAVs (IoLoUA): a methodical modeling on integration of Internet of “Things” with “UAV” possibilities and testsArtificial Intelligence Review10.1007/s10462-022-10225-156:3(2279-2324)Online publication date: 4-Jul-2022
              • (2021)Machine Learning for Smart Environments in B5G NetworksComputational Intelligence and Neuroscience10.1155/2021/68051512021Online publication date: 1-Jan-2021
              • (2021)Unmanned aerial vehicle‐enabled layered architecture based solution for disaster managementTransactions on Emerging Telecommunications Technologies10.1002/ett.437032:12Online publication date: 8-Dec-2021

              View Options

              View options

              Media

              Figures

              Other

              Tables

              Share

              Share

              Share this Publication link

              Share on social media