Dual Detection Procedure to Secure Flying Ad Hoc Networks: A Trust-Based Framework

[1]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[2]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[3]  Weiqing Sun,et al.  Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[4]  Riham Altawy,et al.  Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..

[5]  Victor A. Skormin,et al.  Unmanned Aerial Vehicle Security Using Recursive Parameter Estimation , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).

[6]  Anil Kumar Verma,et al.  Flying Adhoc Networks Concept and Challenges , 2018 .

[7]  John A. Stankovic,et al.  Research Directions for Cyber Physical Systems in Wireless and Mobile Healthcare , 2016, ACM Trans. Cyber Phys. Syst..

[8]  Qingqing Wu,et al.  Securing UAV Communications via Trajectory Optimization , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[9]  Shahryar Sarkani,et al.  Unmanned aerial vehicle smart device ground control station cyber security threat model , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).

[10]  Yang Xiang,et al.  A novel organizing scheme of single topic user group based on trust chain model in social network , 2018, Int. J. Commun. Syst..

[11]  Inseok Hwang,et al.  Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.

[12]  Ing-Ray Chen,et al.  A survey of intrusion detection techniques for cyber-physical systems , 2014, ACM Comput. Surv..

[13]  Victor Skormin,et al.  Unmanned Aerial Vehicle security using behavioral profiling , 2015, 2015 International Conference on Unmanned Aircraft Systems (ICUAS).

[14]  Hichem Snoussi,et al.  FANET: Communication, mobility models and security issues , 2019, Comput. Networks.

[15]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[16]  Ilsun You,et al.  Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives , 2018, Research Briefs on Information and Communication Technology Evolution.

[17]  Jean-Philippe Condomines,et al.  Network intrusion detection system for UAV ad-hoc communication: From methodology design to real test validation , 2019, Ad Hoc Networks.

[18]  Kuldeep Singh,et al.  A fuzzy-based trust model for flying ad hoc networks (FANETs) , 2018, Int. J. Commun. Syst..