Secure UAV (Drone) and the Great Promise of AI
UAVs have found their applications in numerous applications from recreational activities to
business in addition to military and strategic fields. However, research on UAVs is not going …
business in addition to military and strategic fields. However, research on UAVs is not going …
Performance evaluation of vehicular Visible Light Communication based on angle-oriented receiver
Abstract Visible Light Communication (VLC) has emerged as a promising technology to
complement radio frequency-based vehicular communications. Initial studies in Vehicle-to …
complement radio frequency-based vehicular communications. Initial studies in Vehicle-to …
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0
Industry 4.0 and the industrial Internet of Things (IIoT) aim to create a platform for data-driven
decision-making through machine-to-machine (M2M) communication, often facilitated by the …
decision-making through machine-to-machine (M2M) communication, often facilitated by the …
[PDF][PDF] SLAE6: Secure and Lightweight Authenticated Encryption Scheme for 6LoWPAN Networks.
The emergence of the Internet of things is highly related to the development of wireless
sensor networks (WSNs) and their evolving protocols, such as Internet Protocol version 6 …
sensor networks (WSNs) and their evolving protocols, such as Internet Protocol version 6 …
A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones
The drone technology has continuously been evolving since the beginning of the first
decade of the 21st century with exceptional growth over the last several years. To pave the …
decade of the 21st century with exceptional growth over the last several years. To pave the …
WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network
L Yin, M Zhu, W Liu, X Luo, C Wang, Y Li - Computer Communications, 2023 - Elsevier
Abstract Social Internet of Things (SIoT) network contains a huge number of smart devices
and is rich in social behavior relationships between these objects, especially in 5G-abled …
and is rich in social behavior relationships between these objects, especially in 5G-abled …
Secure automated video assistance in vehicular networks using unmanned aerial vehicles
A Salman, A Oracevic, L Ogburn - 2022 IEEE Global …, 2022 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), more commonly referred to as drones, are powered
aircraft that are operated either remotely or via a pre-programmed flight plan. UAVs offer a …
aircraft that are operated either remotely or via a pre-programmed flight plan. UAVs offer a …
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of
autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The …
autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The …
ECC-based authenticated key-agreement algorithm using time-stamps for IoD networks
Internet of Things (IoT) networks have advanced and have made the lives of humans much
easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory …
easier, during the past few decades. Raspberry Pi (RP) is a type of IoT device with memory …
[PDF][PDF] Securing the skies: A comprehensive survey on internet of drones security challenges and solutions
OO Felix - architecture, 2023 - researchgate.net
The rapid proliferation of Unmanned Aerial Vehicles (UAVs) in the Internet of Things (IoT)
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …