UAVouch: A Secure Identity and Location Validation Scheme for UAV-Networks
暂无分享,去创建一个
Alexey Vinel | Mikael Asplund | Edison Pignaton de Freitas | Felipe Boeira | Tulio Dapper e Silva | Jorgito Matiuzzi Stocchero | Carlos Felipe Emygdio de Melo | A. Vinel | Tulio Dapper e Silva | E. P. de Freitas | Mikael Asplund | Felipe Boeira | J. M. Stocchero
[1] Carlisle M. Adams. Impersonation Attack , 2011, Encyclopedia of Cryptography and Security.
[2] Zeeshan Ali,et al. Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles , 2020, IEEE Access.
[3] Miguel L. Pardal,et al. Witness-Based Location Proofs for Mobile Devices , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[4] Prasant Mohapatra,et al. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users , 2016, IEEE/ACM Transactions on Networking.
[5] Mauro Conti,et al. A New Secure Data Dissemination Model in Internet of Drones , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[6] Kim-Kwang Raymond Choo,et al. Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.
[7] George Loukas,et al. A taxonomy and survey of cyber-physical intrusion detection approaches for vehicles , 2019, Ad Hoc Networks.
[8] Gaurav Raj,et al. Surveillance drone for disaster management and military security , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).
[9] Mikael Asplund,et al. Vouch: A Secure Proof-of-Location Scheme for VANETs , 2018, MSWiM.
[10] Michail Maniatakos,et al. Security and Privacy in Cyber-Physical Systems: A Survey of Surveys , 2017, IEEE Design & Test.
[11] Mikael Asplund,et al. Decentralized proof of location in vehicular Ad Hoc networks , 2019, Comput. Commun..
[12] Prakash Ranganathan,et al. Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs) , 2019, 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[13] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[14] Edison Pignaton de Freitas,et al. Employing SDN to control video streaming applications in military mobile networks , 2017, 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA).
[15] K. Anuradha,et al. Enabling Privacy-Preserving Location Proofs for Mobile Users , 2018 .
[16] Mohsen Guizani,et al. Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey and Future Directions , 2018, IEEE Communications Surveys & Tutorials.
[17] Mohsen Guizani,et al. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges , 2018, IEEE Access.
[18] Wisnu Jatmiko,et al. Intruder Drone Localization Based on 2D Image and Area Expansion Principle for Supporting Military Defence System , 2019, 2019 IEEE International Conference on Communication, Networks and Satellite (Comnetsat).
[19] Peter Han Joo Chong,et al. An expedite group key establishment protocol for Flying Ad-Hoc Network(FANET) , 2016, 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV).
[20] Ashish Khanna,et al. APD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET , 2018, IEEE Access.
[21] Marisol Gutierrez,et al. Use of Drones for Surveillance and Reconnaissance of Military Areas , 2018 .
[22] Edison Pignaton de Freitas,et al. Effects of colluding Sybil nodes in message falsification attacks for vehicular platooning , 2017, 2017 IEEE Vehicular Networking Conference (VNC).
[23] Ajay Kaul,et al. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..
[24] Muttukrishnan Rajarajan,et al. Security in networks of unmanned aerial vehicles for surveillance with an agent-based approach inspired by the principles of blockchain , 2019, Ad Hoc Networks.
[25] Vinay Bhatia,et al. Detection Of Malicious Nodes in Flying Ad-HOC Networks (FANET) , 2018 .
[26] Aakanksha Chowdhery,et al. Model Predictive Compression for Drone Video Analytics , 2018, 2018 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops).
[27] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[28] Eduardo Castelló Ferrer. The blockchain: a new framework for robotic swarm systems , 2016, Proceedings of the Future Technologies Conference (FTC) 2018.
[29] Yong Xiang,et al. SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[30] Mahbub Hassan,et al. Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges , 2018, IEEE Communications Surveys & Tutorials.
[31] Pascal Lorenz,et al. Routing in Flying Ad Hoc Networks: Survey, Constraints, and Future Challenge Perspectives , 2019, IEEE Access.
[32] Bart Engberts,et al. Policing from Above: Drone Use by the Police , 2016 .
[33] Abolfazl Razi,et al. A unified framework for joint mobility prediction and object profiling of drones in UAV networks , 2018, Journal of Communications and Networks.
[34] Joel J. P. C. Rodrigues,et al. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.
[35] Frank Eliassen,et al. Self-Organization as a Supporting Paradigm for Military UAV Relay Networks , 2016, IEEE Communications Letters.
[36] Fernando Santos Osório,et al. Authentication Methods for UAV Communication , 2019, 2019 IEEE Symposium on Computers and Communications (ISCC).
[37] Mohammed Atiquzzaman,et al. On the routing in Flying Ad Hoc Networks , 2015, 2015 Federated Conference on Computer Science and Information Systems (FedCSIS).