Trust‐based attack and defense in wireless sensor networks: a survey

W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

Routing in flying ad hoc networks: Survey, constraints, and future challenge perspectives

OS Oubbati, M Atiquzzaman, P Lorenz… - IEEE …, 2019 - ieeexplore.ieee.org
Owing to the explosive expansion of wireless communication and networking technologies,
cost-effective unmanned aerial vehicles (UAVs) have recently emerged and soon they will …

Trust management in social Internet of Things across domains

H Bangui, B Buhnova, D Kusnirakova, D Halasz - Internet of Things, 2023 - Elsevier
Socialization has changed the behavior of physical objects in IoT (Internet of Things) by
introducing the SIoT (Social Internet of Things) paradigm to emulate the social behavior of …

Performance enhancement of optimized link state routing protocol by parameter configuration for UANET

EA Tuli, M Golam, DS Kim, JM Lee - Drones, 2022 - mdpi.com
The growing need for wireless communication has resulted in the widespread usage of
unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol …

Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure

E Barka, CA Kerrache, H Benkraouda… - Transactions on …, 2022 - Wiley Online Library
With the exponential growth in the number of vital infrastructures such as nuclear plants and
transport and distribution networks, these systems have become more susceptible to …

Performance analysis of routing protocols for UAV communication networks

X Tan, Z Zuo, S Su, X Guo, X Sun, D Jiang - IEEE access, 2020 - ieeexplore.ieee.org
The design of routing protocol is an important and key problem in unmanned aerial vehicle
(UAV) communication networks. In low altitude environment, UAV information transmission …

A novel improved artificial bee colony and blockchain-based secure clustering routing scheme for FANET

L Zhao, MB Saif, A Hawbani, G Min… - China …, 2021 - ieeexplore.ieee.org
Flying Ad hoc Network (FANET) has drawn significant consideration due to its rapid
advancements and extensive use in civil applications. However, the characteristics of …

TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks

K Singh, AK Verma - Wireless personal communications, 2020 - Springer
Abstract In Flying Ad hoc Networks (FANETs), coordination and cooperation among nodes
are important for efficient data transmission. Cooperation among the nodes hinges on the …

Collaborative validation of public-key certificates for IoT by distributed caching

M Wang, C Qian, X Li, S Shi… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
Public-key certificate validation is an important building block for various security protocols
for IoT devices, such as secure channel establishment, handshaking, and verifying sensing …