A semi-autonomous distributed blockchain-based framework for UAVs system
暂无分享,去创建一个
Chunpeng Ge | Zhe Liu | Xinshu Ma | Zhe Liu | Xinshu Ma | Chunpeng Ge
[1] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[2] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[3] Camelia Avram,et al. Flying Ad Hoc Network for Emergency Applications Connected to a Fog System , 2018, EIDWT.
[4] Alex R. Pinto,et al. Pattern Recognition in Thermal Images of Plants Pine Using Artificial Neural Networks , 2013, International Conference on Engineering Applications of Neural Networks.
[5] Aaron Burmeister,et al. An Automated UAV Mission System , 2003 .
[6] Kim-Kwang Raymond Choo,et al. A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.
[7] Inwhee Joe,et al. An Adaptive Security Approach According to the Reliability Level of Drones Using Blockchain , 2018 .
[8] Anis Koubaa,et al. Poster: Dronemap - A Cloud-based Architecture for the Internet-of-Drones , 2016, EWSN.
[9] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[10] Burkhard Stiller,et al. Blockchains everywhere - a use-case of blockchains in the pharma supply-chain , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
[11] Andrey Bogdanov,et al. spongent: A Lightweight Hash Function , 2011, CHES.
[12] Zhihui Lu,et al. Smart-toy-edge-computing-oriented data exchange based on blockchain , 2018, J. Syst. Archit..
[13] Jin Sun,et al. Improving Availability of Multicore Real-Time Systems Suffering Both Permanent and Transient Faults , 2019, IEEE Transactions on Computers.
[14] Soo Young Shin,et al. BUS: A Blockchain-Enabled Data Acquisition Scheme With the Assistance of UAV Swarm in Internet of Things , 2019, IEEE Access.
[15] Lui Sha,et al. A Container-based DoS Attack-Resilient Control Framework for Real-Time UAV Systems , 2018, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[16] Bin Cao,et al. Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[17] Paulo Esteves-Verissimo,et al. RepuCoin: Your Reputation Is Your Power , 2019, IEEE Transactions on Computers.
[18] Jin Sun,et al. Resource Management for Improving Soft-Error and Lifetime Reliability of Real-Time MPSoCs , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[19] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[20] Kun Cao,et al. A survey of optimization techniques for thermal-aware 3D processors , 2019, J. Syst. Archit..
[21] Inseok Hwang,et al. Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles , 2012, Infotech@Aerospace.
[22] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[23] X. Rong Li,et al. A New Performance Metric for Search and Track Missions 2: Design and application to UAV search , 2009, 2009 12th International Conference on Information Fusion.
[24] Tim Güneysu,et al. Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices , 2012, CARDIS.
[25] J. Jithish,et al. Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[26] Noureddine Boudriga,et al. A Blockchain based Secure IoT Solution for the Dam Surveillance , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[27] Rishi Gupta,et al. Health Monitoring of Civil Structures with Integrated UAV and Image Processing System , 2015 .
[28] Zdobysław Goraj,et al. Security analysis of uav radio communication system , 2009 .
[29] Ramesh Karri,et al. Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.
[30] Alexander Kuzmin,et al. Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles , 2018, 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI).
[31] María Naya-Plasencia,et al. Quark: A Lightweight Hash , 2010, CHES.
[32] Aníbal Ollero,et al. A cooperative perception system for multiple UAVs: Application to automatic detection of forest fires , 2006, J. Field Robotics.
[33] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[34] Jianfeng Ma,et al. Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network , 2019, IEEE Transactions on Vehicular Technology.
[35] Karthik Dantu,et al. UB-ANC emulator: An emulation framework for multi-agent drone networks , 2016, 2016 IEEE International Conference on Simulation, Modeling, and Programming for Autonomous Robots (SIMPAR).
[36] Rizwan Patan,et al. An Intelligent approach for UAV and Drone Privacy Security Using Blockchain Methodology , 2019, 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
[37] Salil S. Kanhere,et al. Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).
[38] Ismail Güvenç,et al. UAV Air-to-Ground Channel Characterization for mmWave Systems , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[39] Praveen Gauravaram,et al. Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).
[40] David R. Jacques. Modeling considerations for wide area search munition effectiveness analysis , 2002, Proceedings of the Winter Simulation Conference.
[41] Dejan Vujičić,et al. Blockchain technology, bitcoin, and Ethereum: A brief overview , 2018, 2018 17th International Symposium INFOTEH-JAHORINA (INFOTEH).
[42] Robin R. Murphy,et al. A review on cybersecurity vulnerabilities for unmanned aerial vehicles , 2017, 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR).
[43] Junyong Liu,et al. Unmanned Aerial Vehicles for Power Line Inspection: A Cooperative Way in Platforms and Communications , 2014, J. Commun..
[44] Thomas Peyrin,et al. The PHOTON Family of Lightweight Hash Functions , 2011, IACR Cryptol. ePrint Arch..
[45] Konstantin Kondak,et al. Journal of Intelligent and Robotic Systems manuscript No. , 2022 .
[46] Qingqing Wu,et al. Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.
[47] Bin Yu,et al. Proof-of-QoS: QoS based blockchain consensus protocol , 2019, Comput. Secur..
[48] G. Natarajan. Ground control stations for unmanned air vehicles (Review Paper) , 2001 .
[49] Sachin Shetty,et al. Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack , 2017, 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
[50] Michael A. Goodrich,et al. Towards combining UAV and sensor operator roles in UAV-enabled visual search , 2008, 2008 3rd ACM/IEEE International Conference on Human-Robot Interaction (HRI).
[51] Walid Saad,et al. A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems , 2018, IEEE Communications Surveys & Tutorials.
[52] Mohamed Amine Ferrag,et al. Blockchain Technologies for the Internet of Things: Research Issues and Challenges , 2018, IEEE Internet of Things Journal.
[53] Mani Golparvar-Fard,et al. Visual monitoring of civil infrastructure systems via camera-equipped Unmanned Aerial Vehicles (UAVs): a review of related works , 2016 .
[54] Eduardo Castelló Ferrer. The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.
[55] Laurel D. Riek,et al. A decomposition of UAV-related situation awareness , 2006, HRI '06.
[56] Kai-Kit Wong,et al. Blockchain-Empowered Decentralized Storage in Air-to-Ground Industrial Networks , 2019, IEEE Transactions on Industrial Informatics.
[57] Xinwen Fu,et al. Rise of Mini-Drones: Applications and Issues , 2015, PAMCO '15.
[58] Gyu-In Jee,et al. Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal , 2015 .
[59] Riham Altawy,et al. Security, Privacy, and Safety Aspects of Civilian Drones , 2016, ACM Trans. Cyber Phys. Syst..
[60] Ahmad Y. Javaid,et al. Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation , 2017, Simul..
[61] P. Venkata Krishna,et al. A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things , 2011, 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing.