2017
DOI: 10.1109/mwc.2016.1600073wc
|View full text |Cite
|
Sign up to set email alerts
|

Communication Security of Unmanned Aerial Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 178 publications
(60 citation statements)
references
References 12 publications
0
58
0
2
Order By: Relevance
“…On the other hand, in our TOE model, in addition to a wireless communication interface, there are more than one entry point. We also refer to recent research on drones [79,80].…”
Section: Results Of Phases 1 Andmentioning
confidence: 99%
“…On the other hand, in our TOE model, in addition to a wireless communication interface, there are more than one entry point. We also refer to recent research on drones [79,80].…”
Section: Results Of Phases 1 Andmentioning
confidence: 99%
“…Effective detection algorithms could be applied and transmitted frames could be encrypted. For example, WPA2 (802.11i-2004) encryption mechanism with proper key length is recommended as a countermeasure [177]. Moreover, dynamic secret key generation could provide a even stronger protection [178].…”
Section: A Cyber Securitymentioning
confidence: 99%
“…The ADr jamming can be done by using excess power and global positioning services (GPS) spoofing [14]. In literature, numerous jamming methods such as triangle method and genetic algorithm based jamming methods are proposed.…”
Section: F Mdr Jamming and Hunting Technologiesmentioning
confidence: 99%