2021
DOI: 10.1109/ojcs.2021.3058001
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Scheme to Protect 5G UAV Communication Networks

Abstract: As the increasing demands of social services, unmanned aerial vehicles (UAVs)-assisted networks promote the promising prospect for implementing high-rate information transmission and applications. The sensing data can be collected by UAVs, a large number of applications based on UAVs have been realized in the 5G networks. However, the malicious UAVs may provide false information and destroy the services. The 5G UAV communication systems face the security threats. Therefore, this paper develops a novel trust-ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 33 publications
0
8
0
1
Order By: Relevance
“…Other general solutions address the security of SDMN [Liyanage et al, 2015;Bouras et al, 2017a], security policies [Zhao et al, 2021b;Batalla et al, 2020], security schemes (models or protocols) [Ksentini and Frangoudis, 2020;Chaikalis et al, 2020;Dutta and Hammad, 2020;Angelogianni et al, 2020;Ghafoor et al, 2021;Settembre, 2021;Sharma et al, 2020a;Wazid et al, 2021;Ghosh et al, 2019;Kiyemba Edris et al, 2020;Preuß Mattsson and Nakarmi, 2021;Sun et al, 2019;Shang et al, 2019;Cho et al, 2019;Hsu et al, 2020b,a;Kim et al, 2020;Haddar et al, 2019;Boubakri et al, 2017;Namiot and Sneps-Sneppe, 2021;Letafati et al, 2020;Al-Musawi et al, 2020;Krzywiecki et al, 2021;Zhang et al, 2021;Su, 2021;Boubakri et al, 2019;Ren et al, 2022], security architectures (or frameworks) [Vijay and Umadevi, 2019;Siddiqui et al, 2016;Mantas et al, 2021;Monir Mansour, 2019;Kecskés et al, 2021;Kunz and Zhang, 2018;Mars et al, 2019;Nieto et al, 2018;…”
Section: Smart Agriculturementioning
confidence: 99%
“…Other general solutions address the security of SDMN [Liyanage et al, 2015;Bouras et al, 2017a], security policies [Zhao et al, 2021b;Batalla et al, 2020], security schemes (models or protocols) [Ksentini and Frangoudis, 2020;Chaikalis et al, 2020;Dutta and Hammad, 2020;Angelogianni et al, 2020;Ghafoor et al, 2021;Settembre, 2021;Sharma et al, 2020a;Wazid et al, 2021;Ghosh et al, 2019;Kiyemba Edris et al, 2020;Preuß Mattsson and Nakarmi, 2021;Sun et al, 2019;Shang et al, 2019;Cho et al, 2019;Hsu et al, 2020b,a;Kim et al, 2020;Haddar et al, 2019;Boubakri et al, 2017;Namiot and Sneps-Sneppe, 2021;Letafati et al, 2020;Al-Musawi et al, 2020;Krzywiecki et al, 2021;Zhang et al, 2021;Su, 2021;Boubakri et al, 2019;Ren et al, 2022], security architectures (or frameworks) [Vijay and Umadevi, 2019;Siddiqui et al, 2016;Mantas et al, 2021;Monir Mansour, 2019;Kecskés et al, 2021;Kunz and Zhang, 2018;Mars et al, 2019;Nieto et al, 2018;…”
Section: Smart Agriculturementioning
confidence: 99%
“…To improve the effectiveness of communication in VANETs in earlier research several trust models are introduced in VANETs. They are trust cascading-based emergency message dissemination (TCEMD) model [13], risk-based trust evaluation advanced model (RTEAM) [14], trust model for location privacy protection [15], context-aware trust management model [16], anonymous cloaking zone creation approach based on a trust mechanism [17], "VAR2" strategy that permits autonomous trust model [18], a vehicle trust evaluation approach based on a hidden markov model (HMM) that increases the accuracy in the identification of malicious activity [19], a trusted routing strategy based on block-chain and fuzzy logic to enhance the identification of rogue nodes in VANET [20], a consortium block-chain-based strategy for preventing insider assaults in the VANET system utilizing the trusted AODV protocol [21], adaptive traffic-management system (ATM), an effective active-detection trust management system [22], the trust model to protect the UAVs assisted VANETs [23], UAV-assisted ubiquitous trust evaluation (UUTE) framework [24], and lightweight attestation mechanism [25]. Once after analysis the earlier research which is based on trust in UAV assisted VANETs the major drawback which is identified are increased energy consumption, delay and overhead in the network.…”
Section: Related Workmentioning
confidence: 99%
“…The taxonomy of various security attacks is categorized into four main categories, such as trust, integrity, availability, and confidentiality, as shown in Figure 5. Some of the security attacks 179–181 are based on trust, integrity, availability, authentication, and confidentiality in UAV‐assisted networks discussed in this subsection, and we also provide advanced defense mechanisms to handle these attacks during storage, computation, and communication. False data update: False data update attack is trust‐based attack.…”
Section: Collaboration Of Uavs For a Hetnet With Fog Computingmentioning
confidence: 99%