2019 IEEE 10th Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2019
DOI: 10.1109/uemcon47517.2019.8992931
|View full text |Cite
|
Sign up to set email alerts
|

Drones' Face off: Authentication by Machine Learning in Autonomous IoT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Although encryption may only prolong the time for data loss, it can provide an extra level of defense and can get activated through the acknowledged command by the MSCs [61]. 3) High Complexity Level: When the aerial or terrestrial intruders launch sophisticated cyber attacks, such as side-channel attacks, fault injection attacks, software attacks, etc., into the legitimate UAV's link, UAVs should be equipped with advanced cryptographic mechanisms and secure key management to combat such attacks [62]. These attacks are complex to execute as they are supposed to surpass the security levels of the legitimate link to overhear the transmitted information.…”
Section: Overview Of Security Threats On Uavsmentioning
confidence: 99%
“…Although encryption may only prolong the time for data loss, it can provide an extra level of defense and can get activated through the acknowledged command by the MSCs [61]. 3) High Complexity Level: When the aerial or terrestrial intruders launch sophisticated cyber attacks, such as side-channel attacks, fault injection attacks, software attacks, etc., into the legitimate UAV's link, UAVs should be equipped with advanced cryptographic mechanisms and secure key management to combat such attacks [62]. These attacks are complex to execute as they are supposed to surpass the security levels of the legitimate link to overhear the transmitted information.…”
Section: Overview Of Security Threats On Uavsmentioning
confidence: 99%
“…For instance, in [4], the authors proposed an Elliptic Curve Cryptography (ECC)-based device identity proofing mechanism for drone authentication. In [9], an authentication mechanism based on Machine Learning (ML) algorithms for autonomous IoT systems. In [10], the authors proposed a lightweight key-based mutual authentication between anonymous UAVs through the shared ground station.…”
Section: Drones Authentication a Device Authenticationmentioning
confidence: 99%
“…The evolution of computer vision capabilities has made it possible to identify particular objects from various media sources, such as images and live streaming of videos [6][7][8][9][10][11]. One of the first papers on railway track object detection was proposed by Yuan et al They used the enhanced Ostu algorithm to segment the rail picture and calculated the rail surface area, although the selection of thresholds for this method was not uniform [12].…”
Section: Related Workmentioning
confidence: 99%