[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Iqbal, 2021 - Google Patents

A study on UAV operating system security and future research challenges

Iqbal, 2021

Document ID
4026977888865119327
Author
Iqbal S
Publication year
Publication venue
2021 IEEE 11th annual computing and communication workshop and conference (CCWC)

External Links

Snippet

The popularity of Unmanned Aerial Vehicles (UAV) or more commonly known as Drones is increasing recently. UAVs have tremendous potential in various industries, eg, military, agriculture, transportation, movie, supply chain, and surveillance. UAVs are also popular …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems

Similar Documents

Publication Publication Date Title
Iqbal A study on UAV operating system security and future research challenges
Altawy et al. Security, privacy, and safety aspects of civilian drones: A survey
Chamola et al. A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques
Nassi et al. SoK: Security and privacy in the age of commercial drones
He et al. Communication security of unmanned aerial vehicles
Krishna et al. A review on cybersecurity vulnerabilities for unmanned aerial vehicles
Nguyen et al. Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication
Marty Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft
CA3040271A1 (en) Systems and methods for cyber-physical vehicle management, detection and control
Tang A review on cybersecurity vulnerabilities for urban air mobility
Shashok Analysis of vulnerabilities in modern unmanned aircraft systems
Chaari et al. Vulnerabilities assessment for unmanned aerial vehicles communication systems
Butt et al. The deployment of autonomous drones during the COVID-19 pandemic
Shoufan et al. eSIM‐Based Authentication Protocol for UAV Remote Identification
Srirangam et al. Safety and security issues in employing drones
Sampigethaya Aircraft cyber security risk assessment: bringing air traffic control and cyber-physical security to the forefront
Sanghavi et al. A Comprehensive Study on Cyber Security in Unmanned Aerial Vehicles
Kadripathi et al. De-authentication attacks on rogue UAVs
Choudhary et al. Aviation attacks based on ILS and VOR vulnerabilities
Walatkiewicz et al. A Survey on Drone Cybersecurity and the Application of Machine Learning on Threat Emergence
US20240356669A1 (en) Disruption to an operation of an unmanned aerial vehicle
Perner et al. Security concept for unoccupied aerial systems
Intwala et al. System to capture WiFi based Drones using IoT
Anagnostis et al. Understanding and Securing Unmanned Aerial Vehicle (UAV) Services: A Comprehensive Tutorial
Yuvaraj et al. A Comprehensive Study on Unmanned Aerial Vehicle Security Issues