2016 IEEE 15th International Symposium on Network Computing and Applications (NCA) 2016
DOI: 10.1109/nca.2016.7778644
|View full text |Cite
|
Sign up to set email alerts
|

Confidential and authenticated communications in a large fixed-wing UAV swarm

Abstract: Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to 12a. DISTRIBUTION / AVAILABILITY STATEMENTApproved for public release. Distri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…It also potentially allows the UAVs to be dispersed across a larger area without sacrificing reliable data transfers. In addition, this approach allows some security concerns to be addressed at the infrastructure level, however it would be unlikely to fully satisfy the requirements of more sensitive information without additional application-layer features [6].…”
Section: Related Workmentioning
confidence: 99%
“…It also potentially allows the UAVs to be dispersed across a larger area without sacrificing reliable data transfers. In addition, this approach allows some security concerns to be addressed at the infrastructure level, however it would be unlikely to fully satisfy the requirements of more sensitive information without additional application-layer features [6].…”
Section: Related Workmentioning
confidence: 99%
“…Related research on UxS secure links focuses on ciphertext algorithm performance [8,9] or on the improvement of network topography to allow for current cryptographic protocols to continue to function [10,11]. Secure communication protocols such as TLS and DTLS have been tested for efficiency in IoT [12,13], a somewhat related domain to unmanned systems.…”
Section: Uxs Securitymentioning
confidence: 99%
“…As shown in (17), the eigenvalue, which evaluates the level of significance of the cross-layer attributes, are required to compute the linear transformation matrix. The different choices of cross-layer attributes will result in an individual linear transformation matrix.…”
Section: B Adaptive Cross-layer Attribute Selection Algorithmmentioning
confidence: 99%
“…One of the traditional techniques in authentication is encryption technology such as the Advanced Encryption Standard (AES) [17]. However, the rapid computational power development increases the potential of deciphering the encryption algorithms, which makes the attacker easier to impersonate a legitimate UAV and become the new CH [18].…”
Section: Introductionmentioning
confidence: 99%