Eyes in the sky: drones applications in the built environment under climate change challenges

N Bayomi, JE Fernandez - Drones, 2023 - mdpi.com
This paper reviews the diverse applications of drone technologies in the built environment
and their role in climate change research. Drones, or unmanned aerial vehicles (UAVs) …

Security in internet of drones: A comprehensive review

S Samanth, P KV, M Balachandra - Cogent Engineering, 2022 - Taylor & Francis
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …

Ai based drones for security concerns in smart cities

B Rawat, AS Bist, D Apriani, NI Permadi… - APTISI Transactions on …, 2023 - ijc.ilearning.co
The concept of a smart city has attracted the attention of all corners of the world. It updated
with new technologies like AI, Blockchain, IoT, Drones, and many other things. Security in …

Global analysis of active defense technologies for unmanned aerial vehicle

C Lyu, R Zhan - IEEE Aerospace and Electronic Systems …, 2022 - ieeexplore.ieee.org
The main purpose of this article is to enhance the systematicness, comprehensiveness, and
profundity of the counter-unmanned aerial system (C-UAS) theoretical system, laying a …

GPS Spoofing attacks in FANETs: A systematic literature review

A Altaweel, H Mukkath, I Kamel - IEEE Access, 2023 - ieeexplore.ieee.org
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to
accomplish a common mission. The widespread acceptance of UAVs due to their low cost …

A GNSS instrumentation covert directional spoofing algorithm for UAV equipped with tightly-coupled GNSS/IMU

Y Gao, G Li - IEEE Transactions on Instrumentation and …, 2023 - ieeexplore.ieee.org
Measurement and navigation users cannot operate without the positioning, navigation, and
timing (PNT) service provided by the global navigation satellite system (GNSS) …

GPS location spoofing attack detection for enhancing the security of autonomous vehicles

M Kamal, A Barua, C Vitale… - 2021 IEEE 94th …, 2021 - ieeexplore.ieee.org
Attacks on the GPS receiver of Connected and Autonomous Vehicles (CAV) and specifically
GPS location spoofing is of great concern for the automotive industry as the attacker can …

Protecting autonomous UAVs from GPS spoofing and jamming: A comparative analysis of detection and mitigation techniques

PC Joeaneke, OO Val, OO Olaniyi… - Journal of …, 2024 - eprints.classicrepository.com
This study investigates the vulnerabilities of unmanned aerial vehicles (UAVs) to GPS
spoofing and jamming, addressing three key research questions:(1) What are the common …

Communications security in Industry X: A survey

I Ahmad, F Rodriguez, T Kumar… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Industry 4.0 is moving towards deployment using 5G as one of the main underlying
communication infrastructures. Thus, the vision of the Industry of the future is getting more …

Demonstration of enhanced long-range cosmic time synchronization for wireless and secure dissemination of standard time

HKM Tanaka - Scientific Reports, 2024 - nature.com
Accurate traceability of time is prerequisite to the proper functioning of many necessary
aspects of our modern life including making financial transactions, managing automated …