2016
DOI: 10.1007/s10846-016-0356-x
|View full text |Cite
|
Sign up to set email alerts
|

The HAMSTER Data Communication Architecture for Unmanned Aerial, Ground and Aquatic Systems

Abstract: This paper presents HAMSTER, the HeAlthy, Mobility and Security based data communication archiTEctuRe. HAMSTER is designed for Unmanned Vehicles and addresses mainly three types of communications: machine-to-machine, machine-to-infrastructure and internal machine communications. It is divided into three main versions: Flying HAMSTER (for aerial systems), Running HAMSTER (for terrestrial systems) and Swimming HAMSTER (for aquatic systems). Every version of such architecture is also equipped with Sphere and Nimb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 44 publications
0
7
0
Order By: Relevance
“…In [12], the authors presented their HAMSTER (HeAlthy, Mobility and Security based data communication archiTEctuRe) solution for unmanned vehicles. However the paper rather describes a security framework and cryptographic schemes than secure channel protocols.…”
Section: Related Work On Security Concerns Of Uavs Fleetsmentioning
confidence: 99%
“…In [12], the authors presented their HAMSTER (HeAlthy, Mobility and Security based data communication archiTEctuRe) solution for unmanned vehicles. However the paper rather describes a security framework and cryptographic schemes than secure channel protocols.…”
Section: Related Work On Security Concerns Of Uavs Fleetsmentioning
confidence: 99%
“…In the HAMSTER (HeAlthy, Mobility and Security based data communication archiTEctuRe) solution for unmanned vehicles [39], the authors presented a security framework and cryptographic schemes without discussing specifically of secure channel protocols and issues of captured drones.…”
Section: Drones In Fleetmentioning
confidence: 99%
“…An important concern that needs careful attention is the process used for key management schemes for symmetric shared keys. 10 At present, pre-deployed keying mechanism is the most commonly used method for bootstrapping secret keys in e-voting systems, where the keys are loaded into PSs prior to deployment.…”
Section: Introductionmentioning
confidence: 99%