Trust‐based attack and defense in wireless sensor networks: a survey
W Fang, W Zhang, W Chen, T Pan… - … and Mobile Computing, 2020 - Wiley Online Library
As a key component of the information sensing and aggregating for big data, cloud
computing, and Internet of Things (IoT), the information security in wireless sensor network …
computing, and Internet of Things (IoT), the information security in wireless sensor network …
[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …
Routing in flying ad hoc networks: Survey, constraints, and future challenge perspectives
Owing to the explosive expansion of wireless communication and networking technologies,
cost-effective unmanned aerial vehicles (UAVs) have recently emerged and soon they will …
cost-effective unmanned aerial vehicles (UAVs) have recently emerged and soon they will …
Trust management in social Internet of Things across domains
Socialization has changed the behavior of physical objects in IoT (Internet of Things) by
introducing the SIoT (Social Internet of Things) paradigm to emulate the social behavior of …
introducing the SIoT (Social Internet of Things) paradigm to emulate the social behavior of …
Performance enhancement of optimized link state routing protocol by parameter configuration for UANET
The growing need for wireless communication has resulted in the widespread usage of
unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol …
unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol …
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
With the exponential growth in the number of vital infrastructures such as nuclear plants and
transport and distribution networks, these systems have become more susceptible to …
transport and distribution networks, these systems have become more susceptible to …
Performance analysis of routing protocols for UAV communication networks
X Tan, Z Zuo, S Su, X Guo, X Sun, D Jiang - IEEE access, 2020 - ieeexplore.ieee.org
The design of routing protocol is an important and key problem in unmanned aerial vehicle
(UAV) communication networks. In low altitude environment, UAV information transmission …
(UAV) communication networks. In low altitude environment, UAV information transmission …
A novel improved artificial bee colony and blockchain-based secure clustering routing scheme for FANET
Flying Ad hoc Network (FANET) has drawn significant consideration due to its rapid
advancements and extensive use in civil applications. However, the characteristics of …
advancements and extensive use in civil applications. However, the characteristics of …
TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks
Abstract In Flying Ad hoc Networks (FANETs), coordination and cooperation among nodes
are important for efficient data transmission. Cooperation among the nodes hinges on the …
are important for efficient data transmission. Cooperation among the nodes hinges on the …
Collaborative validation of public-key certificates for IoT by distributed caching
Public-key certificate validation is an important building block for various security protocols
for IoT devices, such as secure channel establishment, handshaking, and verifying sensing …
for IoT devices, such as secure channel establishment, handshaking, and verifying sensing …