A Secure Group Communication Architecture for a Swarm of Autonomous Unmanned Aerial Vehicles
暂无分享,去创建一个
[1] Bobby Bhattacharjee,et al. Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[2] Gustav Julio Jordt. Evaluation of Energy Costs and Error Performance of Range-Aware, Anchor-Free Localization Algorithms for Wireless Sensor Networks , 2012 .
[3] Michael A. Brown,et al. Evaluation of autonomy in recent ground vehicles using the autonomy levels for unmanned systems (ALFUS) framework , 2007, PerMIS.
[4] Andrew Adams,et al. Protocol Independent Multicast - Dense Mode (PIM-DM): Protocol Specification (Revised) , 2005, RFC.
[5] Michael A. Temple,et al. Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[6] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[7] Robert F. Mills,et al. Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements , 2006, IEEE Communications Magazine.
[8] Danilo Bruschi,et al. Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues , 2002, Mob. Networks Appl..
[9] Robert Nesbit,et al. Defense Science Board Study on Unmanned Aerial Vehicles and Uninhabited Combat Aerial Vehicles , 2004 .
[10] Vaduvur Bharghavan,et al. MCEDAR: multicast core-extraction distributed ad hoc routing , 1999, WCNC. 1999 IEEE Wireless Communications and Networking Conference (Cat. No.99TH8466).
[11] Keith W. Ross,et al. Computer networking - a top-down approach featuring the internet , 2000 .
[12] Robert F. Mills,et al. Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements , 2007, IEEE Network.
[13] Daniel Thalmann,et al. Autonomy , 2005, SIGGRAPH Courses.
[14] Richard E. Hayes,et al. Power to the Edge: Command, Control in the Information Age , 2003 .
[15] Peter S. Kruus,et al. A Survey of Multicast Security Issues and Architectures , 1998 .
[16] Mohammad Umar Siddiqi,et al. Key Management for Secure Multicast over IPv6 Wireless Networks , 2006, EURASIP J. Wirel. Commun. Netw..
[17] M.A. Temple,et al. Adaptation, modeling, and analysis of PIM-DM in a LEO satellite network environment , 2006, 2006 IEEE Aerospace Conference.
[18] N. F. Mir. A survey of data multicast techniques, architectures, and algorithms , 2001 .
[19] Y. C. Tay,et al. Ad hoc Multicast Routing protocol utilizing Increasing id-numberS (AMRIS) Functional Specification , 1999 .
[20] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[21] Office Of The Secretary Of Defense (OSD) , 2022 .
[22] Lusheng Ji,et al. Differential destination multicast-a MANET multicast routing protocol for small groups , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[23] Mostafa H. Ammar,et al. Gothic: a group access control architecture for secure multicast and anycast , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[24] Radha Poovendran,et al. Power proximity based key management for secure multicast in ad hoc networks , 2007, Wirel. Networks.
[25] Dharma P. Agrawal,et al. Multicast over wireless mobile ad hoc networks: present and future directions , 2003, IEEE Netw..
[26] Anthony McAuley,et al. AMRoute: Adhoc Multicast Routing Protocol , 1999 .
[27] Robert E. Levin,et al. The Global Information Grid and Challenges Facing Its Implementation , 2004 .
[28] Naonobu Okazaki,et al. A proposal and its evaluations of a re-keying system for dynamic secure group communications , 2006 .
[29] Sung-Ju Lee,et al. On-Demand Multicast Routing Protocol (ODMRP) for Ad-Hoc Networks , 2002 .
[30] Biswanath Mukherjee,et al. Multicast routing algorithms and protocols: a tutorial , 2000, IEEE Netw..
[31] J. J. Garcia-Luna-Aceves,et al. The core-assisted mesh protocol , 1999, IEEE J. Sel. Areas Commun..
[32] John Moy,et al. Multicast Extensions to OSPF , 1994, RFC.
[33] Upkar Varshney,et al. Multicast over wireless networks , 2002, CACM.
[34] Charles E. Perkins,et al. Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .
[35] Haitham S. Cruickshank,et al. Networking issues in IP multicast over satellite , 2003, Int. J. Satell. Commun. Netw..
[36] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[37] U. S. Air Force. The U.S. Air Force Remotely Piloted Aircraft and Unmanned Aerial Vehicle Strategic Vision , 2005 .
[38] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[39] David A. Kearney,et al. Managing power amongst a group of networked embedded fpgas using dynamic reconfiguration and task migration , 2006, Dynamically Reconfigurable Architectures.
[40] Haitham S. Cruickshank,et al. Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.
[41] S. N. Balakrishnan,et al. Communication Control in Multiple UAV applications , 2006 .