[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Khan et al., 2020 - Google Patents

UAV's applications, architecture, security issues and attack scenarios: A survey

Khan et al., 2020

View PDF
Document ID
13728016800581748720
Author
Khan N
Brohi S
Jhanjhi N
Publication year
Publication venue
Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2019

External Links

Snippet

Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue missions …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
Khan et al. UAV’s applications, architecture, security issues and attack scenarios: A survey
Gupta et al. Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges
Mekdad et al. A survey on security and privacy issues of UAVs
Yahuza et al. Internet of drones security and privacy issues: Taxonomy and open challenges
Hadi et al. A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
Choudhary et al. Internet of drones (iod): Threats, vulnerability, and security perspectives
Tang A review on cybersecurity vulnerabilities for urban air mobility
Ouiazzane et al. A multiagent and machine learning based denial of service intrusion detection system for drone networks
Yu et al. Cybersecurity of unmanned aerial vehicles: A survey
Siddappaji et al. Role of cyber security in drone technology
Chaari et al. Vulnerabilities assessment for unmanned aerial vehicles communication systems
Mohan Cybersecurity in drones
Butt et al. The deployment of autonomous drones during the COVID-19 pandemic
Srirangam et al. Safety and security issues in employing drones
Best et al. How to analyze the cyber threat from drones
Bardin Satellite cyber attack search and destroy
Mehdi et al. Analysis of vulnerabilities in cybersecurity in unmanned air vehicles
Cheater Accelerating the kill chain via future unmanned aircraft
Constantinides et al. Security challenges in UAV development
Reyneke et al. LoRaWAN & The Helium Blockchain: A Study on Military IoT Deployment
Mykytyn et al. A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs.
Agarwal et al. Security Techniques in Unmanned Air Traffic Management System
Trias Cyber this, cyber that... so what?
Ramos et al. Security and safety of unmanned air vehicles: An overview
Arnolnt A study of cybersecurity threats in UAVs and threat model approaches