Khan et al., 2020 - Google Patents
UAV's applications, architecture, security issues and attack scenarios: A surveyKhan et al., 2020
View PDF- Document ID
- 13728016800581748720
- Author
- Khan N
- Brohi S
- Jhanjhi N
- Publication year
- Publication venue
- Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS 2019
External Links
Snippet
Unmanned aerial vehicles (UAVs)/drones have become very popular in recent years as they are widely used in several domains. They are widely used in both military and civilian applications such as aerial photography, entertainment, search and rescue missions …
- 238000004891 communication 0 abstract description 37
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | UAV’s applications, architecture, security issues and attack scenarios: A survey | |
Gupta et al. | Blockchain‐assisted secure UAV communication in 6G environment: Architecture, opportunities, and challenges | |
Mekdad et al. | A survey on security and privacy issues of UAVs | |
Yahuza et al. | Internet of drones security and privacy issues: Taxonomy and open challenges | |
Hadi et al. | A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs | |
Choudhary et al. | Internet of drones (iod): Threats, vulnerability, and security perspectives | |
Tang | A review on cybersecurity vulnerabilities for urban air mobility | |
Ouiazzane et al. | A multiagent and machine learning based denial of service intrusion detection system for drone networks | |
Yu et al. | Cybersecurity of unmanned aerial vehicles: A survey | |
Siddappaji et al. | Role of cyber security in drone technology | |
Chaari et al. | Vulnerabilities assessment for unmanned aerial vehicles communication systems | |
Mohan | Cybersecurity in drones | |
Butt et al. | The deployment of autonomous drones during the COVID-19 pandemic | |
Srirangam et al. | Safety and security issues in employing drones | |
Best et al. | How to analyze the cyber threat from drones | |
Bardin | Satellite cyber attack search and destroy | |
Mehdi et al. | Analysis of vulnerabilities in cybersecurity in unmanned air vehicles | |
Cheater | Accelerating the kill chain via future unmanned aircraft | |
Constantinides et al. | Security challenges in UAV development | |
Reyneke et al. | LoRaWAN & The Helium Blockchain: A Study on Military IoT Deployment | |
Mykytyn et al. | A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs. | |
Agarwal et al. | Security Techniques in Unmanned Air Traffic Management System | |
Trias | Cyber this, cyber that... so what? | |
Ramos et al. | Security and safety of unmanned air vehicles: An overview | |
Arnolnt | A study of cybersecurity threats in UAVs and threat model approaches |