2021
DOI: 10.3390/s21062057
|View full text |Cite
|
Sign up to set email alerts
|

Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone

Abstract: Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
75
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(75 citation statements)
references
References 35 publications
0
75
0
Order By: Relevance
“…In addition, for communicating entities to have mutual authentication, two of the communicating entities have to be a monitoring drone and a ground-control station. To guarantee full forward secrecy, it is essential to employ a secure key exchange using a method that produces session keys that are impossible to recover [ 24 ].…”
Section: Requirements Of Internet Of Drones (Iod)mentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, for communicating entities to have mutual authentication, two of the communicating entities have to be a monitoring drone and a ground-control station. To guarantee full forward secrecy, it is essential to employ a secure key exchange using a method that produces session keys that are impossible to recover [ 24 ].…”
Section: Requirements Of Internet Of Drones (Iod)mentioning
confidence: 99%
“…Confidentiality or privacy of the wireless communication channel protects from the unauthorized disclosure of information [ 24 ]. Another significant barrier to IoD implementation is making data available, and controlling access to that data (data confidentiality).…”
Section: Requirements Of Internet Of Drones (Iod)mentioning
confidence: 99%
See 2 more Smart Citations
“…The list of UAV's civilian application is numerous and not limited to: Military missions(KO et al, 2021;ZHOU et al, 2020;CHATURVEDI et al, 2019); …”
mentioning
confidence: 99%