A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions

O Ceviz, S Sen, P Sadioglu - IEEE Communications Surveys & …, 2024 - ieeexplore.ieee.org
Thanks to the rapidly develo** technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …

[HTML][HTML] Configurations and applications of multi-agent hybrid drone/unmanned ground vehicle for underground environments: A review

C Dinelli, J Racette, M Escarcega, S Lotero, J Gordon… - Drones, 2023 - mdpi.com
Subterranean openings, including mines, present a unique and challenging environment for
robots and autonomous exploration systems. Autonomous robots that are created today will …

[HTML][HTML] A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks

KY Tsao, T Girdler, VG Vassilakis - Ad Hoc Networks, 2022 - Elsevier
Unmanned aerial vehicles (UAVs) are a rapidly evolving technology, and being highly
mobile, UAV systems are able to cooperate with each other to accomplish a wide range of …

A provably-secure authenticated key agreement protocol for remote patient monitoring IoMT

CM Chen, S Liu, X Li, SKH Islam, AK Das - Journal of Systems Architecture, 2023 - Elsevier
With the continuous improvement of the public medical system, the current medical service
industry is more intelligent. The Internet-of-Medical-Things (IoMT) plays a significant role in …

Internet of drones security: Taxonomies, open issues, and future directions

A Derhab, O Cheikhrouhou, A Allouch, A Koubaa… - Vehicular …, 2023 - Elsevier
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …

Toward a secure smart-home IoT access control scheme based on home registration approach

TY Wu, Q Meng, YC Chen, S Kumari, CM Chen - Mathematics, 2023 - mdpi.com
The extensive application of the Internet of Things (IoT) and artificial intelligence technology
has greatly promoted the construction and development of smart cities. Smart home as the …

Sakap: Sgx-based authentication key agreement protocol in iot-enabled cloud computing

TY Wu, L Wang, X Guo, YC Chen, SC Chu - Sustainability, 2022 - mdpi.com
With the rapid development of the Internet, Internet of Things (IoT) technology is widely used
in people's daily lives. As the number of IoT devices increases, the amount of data to be …

Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security

N Kumar, A Chaudhary - Computer Networks, 2024 - Elsevier
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with
time from military operations like surveillance, reconnaissance to commercial operations …

A secure self-certified broadcast authentication protocol for intelligent transportation systems in UAV-assisted mobile edge computing environments

D Kwon, S Son, MH Kim, JY Lee… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicle (UAV)-assisted mobile edge computing (MEC) ensures
continuous MEC services by promptly restoring overloaded or disabled MEC infrastructure …

Provably secure mutual authentication and key agreement scheme using PUF in internet of drones deployments

Y Park, D Ryu, D Kwon, Y Park - Sensors, 2023 - mdpi.com
Internet of Drones (IoD), designed to coordinate the access of unmanned aerial vehicles
(UAVs), is a specific application of the Internet of Things (IoT). Drones are used to control …