2018
DOI: 10.1109/mcom.2018.1700434
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…The authors of [39] proposed the SHARK protocol for secured autonomous and heterogeneous swarm drones for ensuring the security of swarm drone applications over smart cities. Also, the authors of [126] explored a novel solution for securing information sharing (and provided a 3D visualization) between swarm drones in a smart city. The findings of the proposed technique showed the security prowess of drone context exchange validation and provided a secured path for drone to drone collaboration.…”
Section: Privacy and Security Issues In Drones And Iot Collaboramentioning
confidence: 99%
“…The authors of [39] proposed the SHARK protocol for secured autonomous and heterogeneous swarm drones for ensuring the security of swarm drone applications over smart cities. Also, the authors of [126] explored a novel solution for securing information sharing (and provided a 3D visualization) between swarm drones in a smart city. The findings of the proposed technique showed the security prowess of drone context exchange validation and provided a secured path for drone to drone collaboration.…”
Section: Privacy and Security Issues In Drones And Iot Collaboramentioning
confidence: 99%
“…However, to take benefit from localization services, applications must trust the localization data and make sure that the positions are not manipulated by malicious nodes. Therefore, several research works are addressing the problem of secure localization in the Internet of Things, such as [8], [9], [10], [11], [12]. In fact, many localization algorithms such as those based on triangulation [7], or RSSI-based algorithms [13], [14] are very dependent on the correctness of the location of nodes participating in the localization algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to the vehicular networks, broadcasting among multiple unmanned aerial vehicles (UAVs) are also widely used in many applications of UAV networks, such as civilian, military, and agriculture. In [5], UAVs cooperate with each other to realise cooperative map building and cooperative task resolutions by broadcasting, which facilitates urban surveillance. In addition to surveillance, autonomous UAVs can prevent collisions in the applications of air combat by broadcasting safety messages based on UAV-to-UAV (U2U) [6].…”
Section: Introductionmentioning
confidence: 99%