[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vattapparamban et al., 2016 - Google Patents

Drones for smart cities: Issues in cybersecurity, privacy, and public safety

Vattapparamban et al., 2016

View PDF
Document ID
13079040274955796849
Author
Vattapparamban E
Güvenç I
Yurekli A
Akkaya K
Uluağaç S
Publication year
Publication venue
2016 international wireless communications and mobile computing conference (IWCMC)

External Links

Snippet

It is expected that drones will take a major role in the connected smart cities of the future. They will be delivering goods and merchandise, serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security of smart cities. However …
Continue reading at csl.fiu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • H04W4/021Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS based on location controlled areas, e.g. geofencing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Similar Documents

Publication Publication Date Title
Vattapparamban et al. Drones for smart cities: Issues in cybersecurity, privacy, and public safety
Yaacoub et al. Security analysis of drones systems: Attacks, limitations, and recommendations
US11074822B2 (en) Drone defense system
Altawy et al. Security, privacy, and safety aspects of civilian drones: A survey
Guvenc et al. Detection, tracking, and interdiction for amateur drones
Solodov et al. Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
He et al. Communication security of unmanned aerial vehicles
Iqbal A study on UAV operating system security and future research challenges
US20190003807A1 (en) UAV Defense System
Buric et al. Counter remotely piloted aircraft systems
Butt et al. The deployment of autonomous drones during the COVID-19 pandemic
Pigatto et al. The internet of flying things
Whelan et al. Threat Analysis of a long range autonomous unmanned aerial system
Dwivedi et al. Intelligent autonomous drones in Industry 4.0
Shoufan et al. eSIM‐Based Authentication Protocol for UAV Remote Identification
Kosolyudhthasarn et al. Drone detection and identification by using packet length signature
Lemayian et al. First responder drones for critical situation management
Intwala et al. System to capture WiFi based Drones using IoT
Vattapparamban People counting and occupancy monitoring using wifi probe requests and unmanned aerial vehicles
Kadripathi et al. De-authentication attacks on rogue UAVs
Fournier et al. DroneJack: Kiss your drones goodbye!
Wallace et al. Exploring commercial counter-uas operations: A case study of the 2017 dominican republic festival presidente
Tchouchenkov et al. Detection, recognition and counter measures against unwanted UAVS
Kumar et al. Security Analysis of UAV Communication Protocols: Solutions, Prospects, and Encounters
D'Amico et al. Integrating physical and cyber security resources to detect wireless threats to critical infrastructure