2014
DOI: 10.1117/12.2050765
|View full text |Cite
|
Sign up to set email alerts
|

Simulation study of unmanned aerial vehicle communication networks addressing bandwidth disruptions

Abstract: To date, Unmanned Aerial Vehicles (UAVs) have been widely used for numerous applications. UAVs can directly connect to ground stations or satellites to transfer data. Multiple UAVs can communicate and cooperate with each other and then construct an ad-hoc network. Multi-UAV systems have the potential to provide reliable and timely services for end users in addition to satellite networks. In this paper, we conduct a simulation study for evaluating the network performance of multi-UAV systems and satellite netwo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 23 publications
0
10
0
Order By: Relevance
“…In the network layer, the adversary can disrupt the routing protocol and disconnect the network. In the application layer, the adversary can shut down high-level services [85]. • Command Injection: Overtaking control by interjection of access such as Buffer-Overflow Attack [51].…”
Section: B Cyber Avionics Vulnerabilitiesmentioning
confidence: 99%
“…In the network layer, the adversary can disrupt the routing protocol and disconnect the network. In the application layer, the adversary can shut down high-level services [85]. • Command Injection: Overtaking control by interjection of access such as Buffer-Overflow Attack [51].…”
Section: B Cyber Avionics Vulnerabilitiesmentioning
confidence: 99%
“…Access to the data requires secure communications which is dynamic, data-driven, and application specific. Performance evaluation for BMC2 situation awareness [73] needs to be studied as for cases of UAVs [74] to that of BM systems.…”
Section: Information Managementmentioning
confidence: 99%
“…10,[14][15][16][17][18][19][20][21][22] For example, Yu et al 10 investigated the localization attacks aiming to identify the location of monitor sensors and proposed a formal model of such attacks using communication channels. Ouyang et al 14 proposed a detection framework to deal with denial-of-service (DoS) attacks (e.g., jamming, flooding, etc.)…”
Section: Related Workmentioning
confidence: 99%