Blockchain based peer to peer communication in autonomous drone operation
暂无分享,去创建一个
Shanmuga Sundar Dhanabalan | Hesham A. Alhumyani | S. Vimal | N.Z. Jhanjhi | M. Satheesh Kumar | N. Jhanjhi | H. Alhumyani | S. Vimal | S. Dhanabalan | M. Satheesh Kumar
[1] Seng Wai Loke,et al. Drone services: issues in drones for location-based services from human-drone interaction to information processing , 2019, J. Locat. Based Serv..
[2] Ren Ping Liu,et al. Blockchain for Internet of Things , 2020, Blockchains for Network Security.
[3] Hong Liu,et al. Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing , 2018, IEEE Network.
[4] Rick S. Blum,et al. GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[5] Artem A. Maksutov,et al. Detection of Blockchain Transactions Used in Blockchain Mixer of Coin Join Type , 2019, 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).
[6] Bernd Eissfeller,et al. Emerging attacks on VANET security based on GPS Time Spoofing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[7] G Padmavathi,et al. A Comparative Study on Communication Architecture of Unmanned Aerial Vehicles and Security Analysis of False Data Dissemination Attacks , 2018, 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT).
[8] N. Jhanjhi,et al. Blockchain for Internet of Things (IoT) Research Issues Challenges & Future Directions: A Review , 2019 .
[9] Ahmed Serhrouchni,et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..
[10] Mansoor Alam,et al. UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement , 2014, TRIDENTCOM.
[11] Aleksandr Kapitonov,et al. Blockchain-based protocol of autonomous business activity for multi-agent systems consisting of UAVs , 2017, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS).
[12] Mahbub Hassan,et al. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.
[13] Ali Dehghantanha,et al. Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.
[14] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[15] Gang Wang,et al. On the validity of geosocial mobility traces , 2013, HotNets.
[16] Bo Zhang,et al. A High Performance Blockchain Platform for Intelligent Devices , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[17] Patrick J. Oonincx,et al. Exploiting the Doppler effect in GPS to monitor signal integrity and to detect spoofing , 2015, 2015 International Association of Institutes of Navigation World Congress (IAIN).
[18] Quoc Khanh Nguyen,et al. Blockchain Technology for the Advancement of the Future , 2018, 2018 4th International Conference on Green Technology and Sustainable Development (GTSD).
[19] M. M. Puigserver,et al. Blockchain-Based Contract Signing Protocol for Confidential Contracts , 2019, 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA).
[20] Gang Qu,et al. A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.
[21] Sahil Verma,et al. A Novel Patient-Centric Architectural Framework for Blockchain-Enabled Healthcare Applications , 2021, IEEE Transactions on Industrial Informatics.
[22] Ming Cong,et al. Detection of GPS spoofing based on UAV model estimation , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.
[23] Hong Li,et al. Blockchain for Large-Scale Internet of Things Data Storage and Protection , 2019, IEEE Transactions on Services Computing.
[24] Guangfu Sun,et al. A spoofing detection method for motion receiver using single antenna , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).
[25] Mamoona Humayun,et al. Emerging Smart Logistics and Transportation Using IoT and Blockchain , 2020, IEEE Internet of Things Magazine.
[26] Nir Kshetri,et al. Blockchain in Developing Countries , 2018, IT Professional.
[27] Todd E. Humphreys,et al. GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.
[28] Yuval Elovici,et al. Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).
[29] Xianbin Wang,et al. Detection of GPS spoofing through signal multipath signature analysis , 2016, 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[30] Yuxing Zhang,et al. A Vision-Based GPS-Spoofing Detection Method for Small UAVs , 2017, 2017 13th International Conference on Computational Intelligence and Security (CIS).
[31] Mohsin Ur Rahman,et al. Blockchain-based access control management for Decentralized Online Social Networks , 2020, J. Parallel Distributed Comput..
[32] Anand Nayyar,et al. RETRACTED ARTICLE: A remix IDE: smart contract-based framework for the healthcare sector by using Blockchain technology , 2020, Multimedia Tools and Applications.
[33] Aleksandra Popovska-Mitrovikj,et al. Analysis of the Possibilities for Improvement of BlockChain Technology , 2018, 2018 26th Telecommunications Forum (TELFOR).
[34] Jiangtao Wen,et al. The IoT electric business model: Using blockchain technology for the internet of things , 2016, Peer-to-Peer Networking and Applications.
[35] Dennis Miller,et al. Blockchain and the Internet of Things in the Industrial Sector , 2018, IT Professional.
[36] W. Nowiński,et al. How Can Blockchain Technology Disrupt the Existing Business Models , 2017 .
[37] Xin Huang,et al. A Secure System For Pervasive Social Network-Based Healthcare , 2016, IEEE Access.
[38] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[39] Patrick Diamond. Detection, mitigation, recovery of GPS based assured timing critical infrastructure when under attack by spoofing or jamming , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).
[40] Jongwoo An,et al. Robust Navigational System for a Transporter Using GPS/INS Fusion , 2018, IEEE Transactions on Industrial Electronics.
[41] Usman Akhtar,et al. Impact and Detection of GPS Spoofing and Countermeasures against Spoofing , 2019, 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET).
[42] Shehzad Khalid,et al. Survey on effective GPS spoofing countermeasures , 2016, 2016 Sixth International Conference on Innovative Computing Technology (INTECH).
[43] Mathieu Joerger,et al. GPS spoofing detection using RAIM with INS coupling , 2014, 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014.
[44] Ming Li,et al. Location Based Handshake and Private Proximity Test with Location Tags , 2017, IEEE Transactions on Dependable and Secure Computing.
[45] Sung-Bong Jang,et al. A Survey of Blockchain and Its Applications , 2019, 2019 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
[46] Ahmad Y. Javaid,et al. Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..
[47] Kai-Kit Wong,et al. Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks , 2019, IEEE Transactions on Industrial Informatics.
[48] Shahram Latifi,et al. Securing the positioning signals of autonomous vehicles , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[49] Jalel Ben-Othman,et al. An Investigation on Wannacry Ransomware and its Detection , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).
[50] Shui Yu,et al. Blockchain for secure location verification , 2020, J. Parallel Distributed Comput..
[51] Mathias Weske,et al. Blockchains for Business Process Management - Challenges and Opportunities , 2017, ACM Trans. Manag. Inf. Syst..
[52] Naima Kaabouch,et al. Detection of GPS Spoofing Attacks on Unmanned Aerial Systems , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[53] Hamid Khaloozadeh,et al. A New Approach to Estimate True Position of Unmanned Aerial Vehicles in an INS/GPS Integration System in GPS Spoofing Attack Conditions , 2018, Int. J. Autom. Comput..
[54] R. Katulski,et al. Detection and Mitigation of GPS Spoofing Based on Antenna Array Processing , 2015 .
[55] Jalel Ben-Othman,et al. Sniff‐Phish: A novel framework for resource intensive computation in cloud to detect email scam , 2019, Trans. Emerg. Telecommun. Technol..
[56] Seng W. Loke,et al. Enabling Drone Services: Drone Crowdsourcing and Drone Scripting , 2019, IEEE Access.
[57] Prabaharan Poornachandran,et al. Spoofing technique to counterfeit the GPS receiver on a drone , 2017, 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy).
[58] Gang Qu,et al. Edge Computing based GPS Spoofing Detection Methods , 2018, 2018 IEEE 23rd International Conference on Digital Signal Processing (DSP).