小型无人机安全研究综述

刘炜, 冯丙文, 翁健 - 网络与信息安全学报, 2016 - infocomm-journal.com
近年来, 随着制造成本的降低和技术的发展, 小型无人机正逐渐从军用和高端商用走向大众消费
级市场, 并引起了学界较为广泛的关注. 小型无人机在给人们生活带来便利的同时 …

A Random Label and Lightweight Hash‐Based Security Authentication Mechanism for a UAV Swarm

F Hu, H Qian, L Liu - Wireless Communications and Mobile …, 2021 - Wiley Online Library
Nowadays, the application of a UAV swarm is becoming more and more widespread in the
military field, and more and more attention is paid to the security of mission resource …

In vivo evaluation of the secure opportunistic schemes middleware using a delay tolerant social network

CE Baker, A Starke, TG Hill-Jarrett… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have
thrived and experienced rapid growth to over 1 billion users. A major evolution would be to …

Optimal and heuristic decision strategies for load balancing and user association on hetnets

AT Hirata, EC Xavier, JF Borin - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
User association and load balancing are among the main challenges in designing
Heterogeneous Networks (HetNets). Both problems are highly interdependent and have …

Secure information forwarding through fragmentation in delay-tolerant networks

S Datta, S Madria, J Milligan… - 2018 IEEE 37th …, 2018 - ieeexplore.ieee.org
In application environments like international military coalitions or multi-party relief work in a
disaster zone, passing secure messages using Delay Tolerant Networks (DTNs) is …

A lightweight certificate revocation scheme for hybrid mobile ad hoc networks

H Xu, R Wang, Z Jia - International Journal of Security and Its …, 2016 - earticle.net
A Lightweight Certificate Revocation Scheme for Hybrid Mobile ad Hoc Networks - earticle
Earticle 34.64.82.74 기관회원 로그인 개인회원 로그인 개인회원 가입 HOME 고객센터 이용 …

Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks

CE Baker, A Starke, S Xing… - 2017 IEEE Conference on …, 2017 - ieeexplore.ieee.org
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have
thrived and experienced rapid growth to over 1 billion users [1]. A major evolution would be …

Research on Data Security of Unmanned Aerial Vehicles

Y Chen, Y Hao, K Wu, Z Yi, H Peng… - … on Networking and …, 2021 - ieeexplore.ieee.org
With the development of unmanned platforms, there are large numbers of unmanned aerial
vehicles (UAVs), due to UAVs' new features such as lightweight, high speed mobility and …

A new method for sharing the public keys in opportunistic networks

S Rashidibajgan, R Doss - Future Network Systems and Security: 4th …, 2018 - Springer
Opportunistic Networks do not have a fundamental infrastructure, and different nodes in
these networks have the role of a sender, receiver and a router. Intermediate nodes should …

Pinning Synchronization of Independent Chaotic Systems on Complex Networks with Double Delays

F Nian, J Li - Wireless Personal Communications, 2020 - Springer
In this paper, aiming at the problem of different signals acting on the same node on a
complex network with double time delay, two independent chaotic systems are established …