2022
DOI: 10.1080/23311916.2022.2029080
|View full text |Cite
|
Sign up to set email alerts
|

Security in Internet of Drones: A Comprehensive Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 200 publications
0
13
0
Order By: Relevance
“… where = area of interest/the mapped area priority level, and = authorization permit/authentication key to operate within such a classified zone. Authenticating a drone’s authorization status in a DTN is an emerging research issue [ 28 , 29 , 30 ].…”
Section: Methodsmentioning
confidence: 99%
“… where = area of interest/the mapped area priority level, and = authorization permit/authentication key to operate within such a classified zone. Authenticating a drone’s authorization status in a DTN is an emerging research issue [ 28 , 29 , 30 ].…”
Section: Methodsmentioning
confidence: 99%
“…A specific feature of the scalar product calculation operation used to decrypt encrypted data is that the weights are pre-calculated (constants) and set in floating-point format, while the encrypted data 𝑦𝑦 𝑗𝑗 are received in block-floating-point format. The calculation of the scalar product using the tabular-algorithmic method is performed by formula (7). Preparation and calculation of possible variants of macro-partial products is performed as in the previous case under the formula (8).…”
Section: Xormentioning
confidence: 99%
“…A key problem is to guarantee cryptographic security of data transmission in the management of UAV [1,2], intelligent robots [3], microsatellites [4] and various mobile transport systems [5]. Due to the security vulnerabilities of UAVs, and illegal and malicious attacks against UAVs, especially against communication data and UAV control, solutions to prevent such attacks are needed, and one of them is to encrypt UAV's communication data [6,7,8]. Due to limited battery capacity, Unmanned Aerial Vehicles (UAVs) must use energy-efficient data processing [9].…”
Section: Introductionmentioning
confidence: 99%
“…A key problem is to guarantee cryptographic security of data transmission in the management of UAV [1,2], intelligent robots [3], microsatellites [4] and various mobile transport systems [5]. Due to the security vulnerabilities of UAVs, and illegal and malicious attacks against UAVs, especially against communication data and UAV control, solutions to prevent such attacks are needed, and one of them is to encrypt UAV's communication data [6,7,8]. Unmanned Aerial Vehicles (UAVs) must be energy-efficient, especially in data processing, because of limited battery capacity [9].…”
Section: Introductionmentioning
confidence: 99%