2008
DOI: 10.1007/s10846-008-9261-2
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of UAS Technologies for Command, Control, and Communication (C3)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…In a UAV environment it is very common to use different links to support communication at different ranges and to provide redundancy in the case a link is down 1 . These point-to-point links usually do not support multicast and may have associated costs (economical or power-consumption) that restrict their usage to specific situations or very important transmissions 1 .…”
Section: Communication Gatewaymentioning
confidence: 99%
See 1 more Smart Citation
“…In a UAV environment it is very common to use different links to support communication at different ranges and to provide redundancy in the case a link is down 1 . These point-to-point links usually do not support multicast and may have associated costs (economical or power-consumption) that restrict their usage to specific situations or very important transmissions 1 .…”
Section: Communication Gatewaymentioning
confidence: 99%
“…These point-to-point links usually do not support multicast and may have associated costs (economical or power-consumption) that restrict their usage to specific situations or very important transmissions 1 . The UAV should be intelligent enough to send the data through the most appropriate channel.…”
Section: Communication Gatewaymentioning
confidence: 99%
“…Three or two dimensional mobile platforms in the air (two by moving at a fixed height), such as Unmanned Aerial Vehicles ( UAVs ) [ 8 ], may provide better results as they have the ability to freely move the sensor to the desired locations, avoiding obstacles. Small UAVs, such as those presented by MLB Spyplanes [ 9 ], are much cheaper than large UAV platforms, such as Predator and Globalhawk [ 10 ] and are able to perform missions in regions which large platforms would not be able to access, such as urban environments [ 11 , 12 ]. Based on these arguments, the interest for small UAV platforms to act as the mobile sensors is reasonably rational.…”
Section: Introductionmentioning
confidence: 99%
“…In certain situations, dynamic roots of trust [McCune 2008] can be used to reduce the number of levels. Even then, security is assured only if Trusted computing has become a recognized domain of computing with several annual conferences and workshops [TCI 2010, Trust 2010. Hardware-based trusted computing platforms have been widely deployed, if not fully utilized.…”
Section: Introductionmentioning
confidence: 99%
“…Examples include avionics systems, all but the simplest automated medical devices, embedded automotive systems, and complex supervisory control and data acquisition (SCADA) devices. Unmanned aerial vehicles (UAVs) and other autonomous and remotely controlled vehicles provide especially good examples and serve as the focus of this work [Stansbury 2008, DoD 2010.…”
Section: Introductionmentioning
confidence: 99%