2023
DOI: 10.11591/eei.v12i1.4239
|View full text |Cite
|
Sign up to set email alerts
|

Design security architecture for unmanned aerial vehicles by 5G cloud network based implementation of SDN with NFV and AI

Abstract: A recent progression of unmanned aerial vehicles (UAV) augmentation its employments for different applications. It’s also vulnerable to being, stolen, lost, stray, or destroyed at status of a security infringements for the UAV network. The proposed strategy is defending against of different attacks through using artificial intelligence by implements five steps: RGSK, GCSCS, SEDC, HSSC, and FVNF. UAV authentication is happened in the first step through the Curve448. We performance deep reinforcement learning to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 30 publications
0
3
0
Order By: Relevance
“…Addressing all these security challenges requires the widespread adoption and scale commercial application of technology of C-V2X. Therefore, the development of C-V2X security technology needs to be synchronized with its communication technology [10], [14], [19].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Addressing all these security challenges requires the widespread adoption and scale commercial application of technology of C-V2X. Therefore, the development of C-V2X security technology needs to be synchronized with its communication technology [10], [14], [19].…”
Section: Methodsmentioning
confidence: 99%
“…Authentication serves as a fundamental defense mechanism against unauthorized access to sensitive applications or devices, both offline and online as shown in Figure 1. Traditionally, transactions were authenticated through physical means, such as the use of wax seals [1]- [10]. The left side represents a traditional physical method, symbolized by a wax seal stamp, to physically verify the authenticity and integrity of a transaction or document.…”
Section: Introductionmentioning
confidence: 99%
“…Packet forwarding is delayed because of the predetermined waiting time if batch hashing is used directly for service path validation, resulting in longer average waiting times between packets. The fixed waiting time must be accurately determined to adopt batch hashing efficiently 27 . Let the packets arrive in a queue at an arrival rate and inter-packet arrival time, as indicated in Fig.…”
Section: Methodsmentioning
confidence: 99%