Internet of Things a to Z 2018
DOI: 10.1002/9781119456735.ch19
|View full text |Cite
|
Sign up to set email alerts
|

The Internet of Flying Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(10 citation statements)
references
References 28 publications
0
10
0
Order By: Relevance
“…In this paper, we assume that there are four locations, whose coordinates are as follows: location 1 (-400, -400), location 2 (400, -400), location 3 (400, 400), and location 4 (-400, 400). Synchronously, every two UAVs fly from location n to (n mod 4) + 1, n ∈ [1,4]. Given the predefined path, if one UAV does not have sufficient time to reach the location of b, it will directly fly to the final location.…”
Section: Simulation Results and Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we assume that there are four locations, whose coordinates are as follows: location 1 (-400, -400), location 2 (400, -400), location 3 (400, 400), and location 4 (-400, 400). Synchronously, every two UAVs fly from location n to (n mod 4) + 1, n ∈ [1,4]. Given the predefined path, if one UAV does not have sufficient time to reach the location of b, it will directly fly to the final location.…”
Section: Simulation Results and Performance Analysismentioning
confidence: 99%
“…The Flying Ad Hoc Networks (FANETs) paradigm has emerged by exploring the cooperation and collaboration between the UAVs [3]. Recently, some researchers have started to investigate the integration of FANETs into the IoT, which has led to the Internet of Flying Things (IoFT) [4]. The emergent IoFT aims at bringing the potential new degree of freedom into IoT, by utilizing the flexible mobility and deployment of UAVs.…”
mentioning
confidence: 99%
“…Jamming is an attack in the physical layer which causes a high interference to a spectrum band by overloading it. It may provoke the attacked devices to present an excessive energy consumption due to package retransmission, or even interrupt its communication channel [7]. When a CR is under a jamming attack, it simply understands that spectrum band as being busy or overcrowded, and then it switches its transmission to a new channel, thus avoiding the attack.…”
Section: Securitymentioning
confidence: 99%
“…Location spoofing attacks also happen in the physical layer, and they have become more frequent. It happens when an attacker uses a signal that is stronger than and mimics the attributes of a genuine location satellite signal to spoof the receiver [7]. By using a location spoofing attack, attackers may capture UAVs and/or take control of their flight path.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation