2022
DOI: 10.1002/dac.5237
|View full text |Cite
|
Sign up to set email alerts
|

Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks

Abstract: Summary A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone, disaster management, healthcare sector, smart cities, Internet of Things (IoT), urban air mobility, and many more. In contrast, UAV's limited computational capability and low‐energy sources pose significant challenges for real‐time data processing, storage, networking, and security that are critical in emergencies such a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 242 publications
0
10
0
Order By: Relevance
“…The virtualization of resources generates numerous problems. These difficulties include delay, start‐up, positioning, movement of virtual network devices within a fog network, and other related issues 3,19,33,48,52 …”
Section: Challenges Identifiedmentioning
confidence: 99%
See 3 more Smart Citations
“…The virtualization of resources generates numerous problems. These difficulties include delay, start‐up, positioning, movement of virtual network devices within a fog network, and other related issues 3,19,33,48,52 …”
Section: Challenges Identifiedmentioning
confidence: 99%
“…The virtualization of resources generates numerous problems. These difficulties include delay, start-up, positioning, movement of virtual network devices within a fog network, and other related issues 3,19,33,48,52 Real-world issues: While considering the real time application domains that utilizes the fog computing are the time sensitive fields like the traffic light systems and the health-care system. The response delay due to the DDoS attacks in the network makes the application processing a challenging task 25,38,57…”
Section: Challenges Identifiedmentioning
confidence: 99%
See 2 more Smart Citations
“…UAV-fog network helps to control and estimate the risk of disaster and handles post-disaster recoveries. 12 Moreover, the collaboration of UAVs and fog computing is a challenge because of the intricacy of the working environment, the unpredictability of terminal user distribution, and the restrictions of the UAV's energy. Thus, it is required to plan an optimal path for UAVs when employing collaboratively with fog computing to address these challenges.…”
mentioning
confidence: 99%