Iqbal, 2021 - Google Patents
A study on UAV operating system security and future research challengesIqbal, 2021
- Document ID
- 4026977888865119327
- Author
- Iqbal S
- Publication year
- Publication venue
- 2021 IEEE 11th annual computing and communication workshop and conference (CCWC)
External Links
Snippet
The popularity of Unmanned Aerial Vehicles (UAV) or more commonly known as Drones is increasing recently. UAVs have tremendous potential in various industries, eg, military, agriculture, transportation, movie, supply chain, and surveillance. UAVs are also popular …
- 238000011160 research 0 title abstract description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Iqbal | A study on UAV operating system security and future research challenges | |
Altawy et al. | Security, privacy, and safety aspects of civilian drones: A survey | |
Chamola et al. | A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques | |
Nassi et al. | SoK: Security and privacy in the age of commercial drones | |
He et al. | Communication security of unmanned aerial vehicles | |
Krishna et al. | A review on cybersecurity vulnerabilities for unmanned aerial vehicles | |
Nguyen et al. | Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication | |
Marty | Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft | |
CA3040271A1 (en) | Systems and methods for cyber-physical vehicle management, detection and control | |
Tang | A review on cybersecurity vulnerabilities for urban air mobility | |
Shashok | Analysis of vulnerabilities in modern unmanned aircraft systems | |
Chaari et al. | Vulnerabilities assessment for unmanned aerial vehicles communication systems | |
Butt et al. | The deployment of autonomous drones during the COVID-19 pandemic | |
Shoufan et al. | eSIM‐Based Authentication Protocol for UAV Remote Identification | |
Srirangam et al. | Safety and security issues in employing drones | |
Sampigethaya | Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront | |
Sanghavi et al. | A Comprehensive Study on Cyber Security in Unmanned Aerial Vehicles | |
Kadripathi et al. | De-authentication attacks on rogue UAVs | |
Choudhary et al. | Aviation attacks based on ILS and VOR vulnerabilities | |
Walatkiewicz et al. | A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence | |
US20240356669A1 (en) | Disruption to an operation of an unmanned aerial vehicle | |
Perner et al. | Security concept for unoccupied aerial systems | |
Intwala et al. | System to capture WiFi based Drones using IoT | |
Anagnostis et al. | Understanding and Securing Unmanned Aerial Vehicle (UAV) Services: A Comprehensive Tutorial | |
Yuvaraj et al. | A Comprehensive Study on Unmanned Aerial Vehicle Security Issues |