Spreading Code Identification of Legal Drones in IoT Environment

The widespread use of drones has become very common today with large-scale civil and military applications. In the next few coming years, the outlook is expected that the number of drones will reach millions. So, these need to be well organised and managed in order to achieve the benefits of IoT with this accelerated environment. Drones or Unmanned Aerial Vehicles (UAVs) must achieved a level of communications to authenticate a legal working. The proposed approach concentrated on preparing each drone with identification key based on the combination of its international sim number with the date of the first action and the local country code. This approach is called Drone IDentification (DID) that generate a unique code for each drone via spreading technique. In this case any drone not apply this regulation is considered as unauthenticated drone and does not allowed to fly. This approach is very important to establish drone regulation via IoT.

[1]  Jian Zhang,et al.  Seeing the forest from drones: Testing the potential of lightweight drones as a tool for long-term forest monitoring , 2016 .

[2]  Partha Pratim Pande,et al.  Wireless Small-World NoCs , 2016 .

[3]  G. Reiner,et al.  A drone fleet model for last-mile distribution in disaster relief operations , 2018, International Journal of Disaster Risk Reduction.

[4]  Jingyuan Zhan,et al.  Outdoor flocking of quadcopter drones with decentralized model predictive control. , 2017, ISA transactions.

[5]  M. Rosenqvist,et al.  Drones may be used to save lives in out of hospital cardiac arrest due to drowning. , 2017, Resuscitation.

[6]  Jennifer Ann Kurtz Wireless Technology Overview , 2017 .

[7]  Liang Liu,et al.  Transmit beamforming for simultaneous wireless information and power transfer , 2018 .

[8]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[9]  S. Ahmadi Wireless broadband standards and technologies , 2016 .

[10]  Austin Choi-Fitzpatrick,et al.  Up in the Air: Applying the Jacobs Crowd Formula to Drone Imagery☆ , 2015 .

[11]  Harsh Kupwade Patil,et al.  Wireless Sensor Network Security: The Internet of Things , 2017 .

[12]  Oliver Kearns Secrecy and absence in the residue of covert drone strikes , 2017 .

[13]  Roger Clarke,et al.  Understanding the drone epidemic , 2014, Comput. Law Secur. Rev..

[14]  Rocci Luppicini,et al.  A technoethical review of commercial drone use in the context of governance, ethics, and privacy , 2016 .

[15]  Alessandra Capolupo,et al.  Photogrammetry for environmental monitoring: the use of drones and hydrological models for detection of soil contaminated by copper. , 2015, The Science of the total environment.

[16]  Huimin Lu,et al.  Automatic road detection system for an air-land amphibious car drone , 2018, Future Gener. Comput. Syst..

[17]  Chase C. Murray,et al.  The flying sidekick traveling salesman problem: Optimization of drone-assisted parcel delivery , 2015 .

[18]  Pedro Castillo-García,et al.  Indoor Navigation Strategies for Aerial Autonomous Systems , 2016 .

[19]  Dimitrios Zorbas,et al.  Optimal drone placement and cost-efficient target coverage , 2016, J. Netw. Comput. Appl..

[20]  Junwon Seo,et al.  Drone-enabled bridge inspection methodology and application , 2018, Automation in Construction.

[21]  Marilena Vendittelli,et al.  Vision-Based Loitering Over a Target for a Fixed-Wing UAV , 2012, SyRoCo.

[22]  Khattab M Ali Alheeti,et al.  A hierarchical detection method in external communication for self-driving vehicles based on TDMA , 2018, PloS one.

[23]  Frank Thornton Chapter 8 – Kismet Drones , 2008 .

[24]  Rachel Finn,et al.  Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications , 2012, Comput. Law Secur. Rev..

[25]  Yunus Karaca,et al.  The potential use of unmanned aircraft systems (drones) in mountain search and rescue operations , 2017, The American journal of emergency medicine.

[26]  Roger Clarke,et al.  The regulation of civilian drones' impacts on public safety , 2014, Comput. Law Secur. Rev..

[27]  Muzhir Shaban Al-Ani Flying with Internet of Things via Global Structure , 2017 .

[28]  Laura E. Reardon,et al.  An analysis of post-traumatic stress symptoms in United States Air Force drone operators. , 2014, Journal of anxiety disorders.

[29]  Michael Brooks Welcome to the personal drone revolution , 2012 .

[30]  Jens Hauch,et al.  Comparison of Drone-based IR-imaging with Module Resolved Monitoring Power Data , 2017 .

[31]  Steve Van Till IoT Technology and Standards , 2018 .

[32]  Jordán Pascual Espada,et al.  Platform for controlling and getting data from network connected drones in indoor environments , 2019, Future Gener. Comput. Syst..

[33]  Dimitrios Zorbas,et al.  Energy Efficient Mobile Target Tracking Using Flying Drones , 2013, ANT/SEIT.

[34]  Nicolas Larrieu,et al.  Application to Communications in a Drone Fleet , 2018 .

[35]  Robert J. de Boer,et al.  The Integration of Drones in Today's Society , 2015 .

[36]  Muhammad R. A. Khandaker,et al.  Signal processing for massive MIMO communications , 2018 .

[37]  Drag reduction effects facilitated by microridges inside the mouthparts of honeybee workers and drones. , 2016, Journal of theoretical biology.

[38]  Tsuyoshi Murata,et al.  {m , 1934, ACML.