2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC) 2017
DOI: 10.1109/smc.2017.8123042
|View full text |Cite
|
Sign up to set email alerts
|

Securing a UAV using individual characteristics from an EEG signal

Abstract: Abstract-Unmanned aerial vehicles (UAVs) have gained much attention in recent years for both commercial and military applications. The progress in this field has gained much popularity and the research has encompassed various fields of scientific domain. Cyber securing a UAV communication has been one of the active research field since the attack on Predator UAV video stream hijacking in 2009. Since UAVs rely heavily on on-board autopilot to function, it is important to develop an autopilot system that is robu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…e key technology of key generation EEG-based biometric cryptosystems is the use of EEG signals to generate a unique and repeatable key. Some researchers have proved [79] to generate keys for encryption [80] or authentication [81]. e measured EEG biometrics has a high entropy across subjects.…”
Section: Key Generation Eeg-based Biometric Cryptosystemsmentioning
confidence: 99%
See 2 more Smart Citations
“…e key technology of key generation EEG-based biometric cryptosystems is the use of EEG signals to generate a unique and repeatable key. Some researchers have proved [79] to generate keys for encryption [80] or authentication [81]. e measured EEG biometrics has a high entropy across subjects.…”
Section: Key Generation Eeg-based Biometric Cryptosystemsmentioning
confidence: 99%
“…Using BAN logic, the proposed authentication scheme was proved to be effective and practical [81]. Singandhupe et al [80] used a fuzzy extractor to generate a 128 bit AES encryption key from the EEG signal in the beta band.…”
Section: Key Generation Eeg-based Biometric Cryptosystemsmentioning
confidence: 99%
See 1 more Smart Citation
“…f (q, p 1 , p 2 , ..., p n )φ(q, t)dq, (9) where f (q, p 1 , p 2 , ..., p n ) represents some cost to cover a certain point q of the environment. The function φ(q, t), which is known as distribution density function, level of interestingness, or strategic importance, indicates the specific weight of the point q in that environment at time t. In this paper, the cost we are interested in is the quality of images when covering a spreading fire with a limited number of cameras.…”
Section: Coverage and Tracking Objectivementioning
confidence: 99%
“…UAV technology continues attracting a huge amount of research [8], [9]. Researchers developed controllers for UAVs to help them attain stability and effectiveness in completing their tasks [10].…”
Section: Introduction a Wildfire Monitoring And Trackingmentioning
confidence: 99%