Gps spoofing attacks in fanets: A systematic literature review

A Altaweel, H Mukkath, I Kamel - IEEE Access, 2023 - ieeexplore.ieee.org
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …

Augmented humanity: a systematic map** review

G Guerrero, FJM da Silva, A Fernández-Caballero… - Sensors, 2022 - mdpi.com
Augmented humanity (AH) is a term that has been mentioned in several research papers.
However, these papers differ in their definitions of AH. The number of publications dealing …

Deepsim: Gps spoofing detection on uavs using satellite imagery matching

N Xue, L Niu, X Hong, Z Li, L Hoffaeller… - Proceedings of the 36th …, 2020 - dl.acm.org
Unmanned Aerial Vehicles (UAVs), better known as drones, have significantly advanced
fields such as aerial surveillance, military reconnaissance, cadastral surveying, disaster …

Operator strategy model development in UAV hacking detection

H Zhu, ML Cummings, M Elfar… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An increasingly relevant security issue for unmanned aerial vehicles (UAVs, also known as
drones) is the possibility of a global positioning system (GPS) spoofing attack. Given the …

UAV-GCS centralized data-oriented communication architecture for crowd surveillance applications

A Chriki, H Touati, H Snoussi… - 2019 15th International …, 2019 - ieeexplore.ieee.org
In recent years, a large number of researchers investigate the conception of systems that
use a unique Unmanned Ariel Vehicles (UAV) or multiple independent UAVs to conduct civil …

Data security and privacy issues in swarms of drones

M Albalawi, H Song - 2019 Integrated Communications …, 2019 - ieeexplore.ieee.org
The unmanned aerial technology is being a major part in several industries such as the
military, the emergency response units, and the space exploration, but these fields are …

An effective model for human cognitive performance within a human-robot collaboration framework

KM Rabby, M Khan, A Karimoddini… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
With advances in technologies, robots can be employed in collaboration with human for
completing the shared objective (s). This paper proposes a novel time-variant human …

[PDF][PDF] Hyperelliptic curve based authentication for the internet of drones

A Gnanaraj, F Abbasali, A Kumar… - International Journal of …, 2024 - academia.edu
Drones provide an alternative progression in protection submissions since they are capable
of conducting autonomous seismic investigations. Recent advancement in unmanned aerial …

Security-aware synthesis of human-UAV protocols

M Elfar, H Zhu, ML Cummings… - … Conference on Robotics …, 2019 - ieeexplore.ieee.org
In this work, we synthesize collaboration protocols for human-unmanned aerial vehicle (H-
UAV) command and control systems, where the human operator aids in securing the UAV by …

Detecting GNSS spoofing and Re-localization on UAV based on imagery matching

R Liu, H Liu, X Meng, T Li… - … Science and Technology, 2024 - iopscience.iop.org
Due to rapid advancements in global navigation satellite system (GNSS), computer, and
microelectronics technologies, there is a growing popularity and widespread promotion of …