Secure UAV (Drone) and the Great Promise of AI

B Zolfaghari, M Abbasmollaei, F Hajizadeh… - ACM Computing …, 2024 - dl.acm.org
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …

Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver

S Yahia, Y Meraihi, A Ramdane-Cherif… - Computer …, 2022 - Elsevier
Abstract Visible Light Communication (VLC) has emerged as a promising technology to
complement radio frequency-based vehicular communications. Initial studies in Vehicle-to …

Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0

FF Ashrif, EA Sundararajan, MK Hasan… - Computer …, 2024 - Elsevier
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven
decision-making through machine-to-machine (M2M) communication, often facilitated by the …

[PDF][PDF] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks.

FF Ashrif, EA Sundarajan, R Ahmed, MK Hasan - SENSORNETS, 2023 - scitepress.org
The emergence of the Internet of things is highly related to the development of wireless
sensor networks (WSNs) and their evolving protocols, such as Internet Protocol version 6 …

A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones

C Pu, KKR Choo, D Korać - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The drone technology has continuously been evolving since the beginning of the first
decade of the 21st century with exceptional growth over the last several years. To pave the …

WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network

L Yin, M Zhu, W Liu, X Luo, C Wang, Y Li - Computer Communications, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) network contains a huge number of smart devices
and is rich in social behavior relationships between these objects, especially in 5G-abled …

Secure automated video assistance in vehicular networks using unmanned aerial vehicles

A Salman, A Oracevic, L Ogburn - 2022 IEEE Global …, 2022 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), more commonly referred to as drones, are powered
aircraft that are operated either remotely or via a pre-programmed flight plan. UAVs offer a …

Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment

S Mittal, AK Mishra, M Wazid, DP Singh… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of
autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The …

ECC-based authenticated key-agreement algorithm using time-stamps for IoD networks

S Samanth, KV Prema… - … on Distributed Computing …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) networks have advanced and have made the lives of humans much
easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory …

[PDF][PDF] Securing the skies: A comprehensive survey on internet of drones security challenges and solutions

OO Felix - architecture, 2023 - researchgate.net
The rapid proliferation of Unmanned Aerial Vehicles (UAVs) in the Internet of Things (IoT)
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …