2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services (UPINLBS) 2018
DOI: 10.1109/upinlbs.2018.8559744
|View full text |Cite
|
Sign up to set email alerts
|

Next Generation Security And Surveillance System Using Autonomous Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Terrorists or criminals may use UAVs to establish wireless communications for committing crimes and terrorism [6,7]. For instance, the eavesdroppers in the UAV communication networks can overhear the secure message, thus improving the capacity of communication network by reporting faked channel state information on the basis of the continuously changing channel environments [8,9]. More seriously, criminals can use UAV communication networks to commit bombing activities, and business spies may use them to filch trade secrets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Terrorists or criminals may use UAVs to establish wireless communications for committing crimes and terrorism [6,7]. For instance, the eavesdroppers in the UAV communication networks can overhear the secure message, thus improving the capacity of communication network by reporting faked channel state information on the basis of the continuously changing channel environments [8,9]. More seriously, criminals can use UAV communication networks to commit bombing activities, and business spies may use them to filch trade secrets.…”
Section: Introductionmentioning
confidence: 99%
“…In this scenario, we assume that the suspicious pair of UAVs (known as UAV ST and UAV SR ) has been detected by authorized agencies at the beginning, and they are eavesdropped by a legitimate UAV monitor ( UAV L ). Suspicious users’ detection and association can be referred to in Reference [9].…”
Section: Introductionmentioning
confidence: 99%