Vattapparamban et al., 2016 - Google Patents
Drones for smart cities: Issues in cybersecurity, privacy, and public safetyVattapparamban et al., 2016
View PDF- Document ID
- 13079040274955796849
- Author
- Vattapparamban E
- Güvenç I
- Yurekli A
- Akkaya K
- Uluağaç S
- Publication year
- Publication venue
- 2016 international wireless communications and mobile computing conference (IWCMC)
External Links
Snippet
It is expected that drones will take a major role in the connected smart cities of the future. They will be delivering goods and merchandise, serving as mobile hot spots for broadband wireless access, and maintaining surveillance and security of smart cities. However …
- 235000007119 Ananas comosus 0 description 18
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
- H04W4/021—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS based on location controlled areas, e.g. geofencing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Vattapparamban et al. | Drones for smart cities: Issues in cybersecurity, privacy, and public safety | |
Yaacoub et al. | Security analysis of drones systems: Attacks, limitations, and recommendations | |
US11074822B2 (en) | Drone defense system | |
Altawy et al. | Security, privacy, and safety aspects of civilian drones: A survey | |
Guvenc et al. | Detection, tracking, and interdiction for amateur drones | |
Solodov et al. | Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities | |
He et al. | Communication security of unmanned aerial vehicles | |
Iqbal | A study on UAV operating system security and future research challenges | |
US20190003807A1 (en) | UAV Defense System | |
Buric et al. | Counter remotely piloted aircraft systems | |
Butt et al. | The deployment of autonomous drones during the COVID-19 pandemic | |
Pigatto et al. | The internet of flying things | |
Whelan et al. | Threat Analysis of a long range autonomous unmanned aerial system | |
Dwivedi et al. | Intelligent autonomous drones in Industry 4.0 | |
Shoufan et al. | eSIM‐Based Authentication Protocol for UAV Remote Identification | |
Kosolyudhthasarn et al. | Drone detection and identification by using packet length signature | |
Lemayian et al. | First responder drones for critical situation management | |
Intwala et al. | System to capture WiFi based Drones using IoT | |
Vattapparamban | People counting and occupancy monitoring using wifi probe requests and unmanned aerial vehicles | |
Kadripathi et al. | De-authentication attacks on rogue UAVs | |
Fournier et al. | DroneJack: Kiss your drones goodbye! | |
Wallace et al. | Exploring commercial counter-uas operations: A case study of the 2017 dominican republic festival presidente | |
Tchouchenkov et al. | Detection, recognition and counter measures against unwanted UAVS | |
Kumar et al. | Security Analysis of UAV Communication Protocols: Solutions, Prospects, and Encounters | |
D'Amico et al. | Integrating physical and cyber security resources to detect wireless threats to critical infrastructure |