2019
DOI: 10.3390/info10020043
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Security Scheme for Disaster Surveillance UAV Communication Networks

Abstract: The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance to the rescue and evacuation operations in the affected areas. Then, the reliability of UAV connections and the accuracy of exchanged information are critical parameters. In this paper, we propose networking and security architecture for disaster surveillance UAV system. The networking scheme involves a two-tier cluster network based on IEEE 802.11ah, which can provide tr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 49 publications
(16 citation statements)
references
References 30 publications
0
15
0
1
Order By: Relevance
“…For the areas with weak-connection, we list four typical regions that are construction sites in urban, disaster regions in urban, blind coverage spots in the city, and the transportation road. In these areas, some recent studies use UAVs to offer an extended network coverage and perform some specified applications such Areas with weak-connection Urban construction sites Construction project management [119]- [121] Indoor construction monitoring [122], [123] Disaster regions Disaster surveillance [80], [124], [125] Emergency networks construction [126]- [129] Urban coverage blind spots Enhanced coverage in urban area [29], [80], [130]- [133] Patrolling and surveillance [134]- [139] Transportation systems Intelligent transportation systems [140]- [143] Connection between ground vehicles [144]- [147] Areas without network deployment Farms Survey of UAV in agriculture [63], [148] Imagery analysis of crops [149]- [153] Deserts Disaster monitoring [154]- [156] Geomorphological analysis [61], [155], [157] Military detection [158] Forests Trees and plants monitoring [159]- [162] Forest growing volume prediction [163], [164] Oceans Coastal environment analysis [165]- [168] Ocean environment monitoring [169]- [171] Marine science and observation [18]...…”
Section: B Uav-enabled Ioementioning
confidence: 99%
“…For the areas with weak-connection, we list four typical regions that are construction sites in urban, disaster regions in urban, blind coverage spots in the city, and the transportation road. In these areas, some recent studies use UAVs to offer an extended network coverage and perform some specified applications such Areas with weak-connection Urban construction sites Construction project management [119]- [121] Indoor construction monitoring [122], [123] Disaster regions Disaster surveillance [80], [124], [125] Emergency networks construction [126]- [129] Urban coverage blind spots Enhanced coverage in urban area [29], [80], [130]- [133] Patrolling and surveillance [134]- [139] Transportation systems Intelligent transportation systems [140]- [143] Connection between ground vehicles [144]- [147] Areas without network deployment Farms Survey of UAV in agriculture [63], [148] Imagery analysis of crops [149]- [153] Deserts Disaster monitoring [154]- [156] Geomorphological analysis [61], [155], [157] Military detection [158] Forests Trees and plants monitoring [159]- [162] Forest growing volume prediction [163], [164] Oceans Coastal environment analysis [165]- [168] Ocean environment monitoring [169]- [171] Marine science and observation [18]...…”
Section: B Uav-enabled Ioementioning
confidence: 99%
“…A vast majority of works consider the existence of ground control stations or base stations of various types [10], [11], [16]- [19], [22], [23]. Abdallah et al [10] have proposed a protocol for drone networks. Their protocol provides integrity, availability, and confidentiality to some extent with low overhead and reasonable performance.…”
Section: Related Workmentioning
confidence: 99%
“…Which may result in various threats associated with data vulnerability [54]. Such type of data interruption also causes malicious data insertion from drone to controller device [55].…”
Section: Drones Current Intimidations and Susceptibilitiesmentioning
confidence: 99%