2020
DOI: 10.1109/mwc.01.1900545
|View full text |Cite
|
Sign up to set email alerts
|

UAV-Assisted Attack Prevention, Detection, and Recovery of 5G Networks

Abstract: Unmanned aerial vehicles (UAVs) are emerging as enablers for supporting many applications and services, such as precision agriculture, search and rescue, temporary network deployment or coverage extension, and security. UAVs are being considered for integration into emerging 5G networks as aerial users or network support nodes. We propose to leverage UAVs in 5G to assist in the prevention, detection, and recovery of attacks on 5G networks. Specifically, we consider jamming, spoofing, eavesdropping and the corr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 68 publications
(17 citation statements)
references
References 12 publications
0
17
0
Order By: Relevance
“…Furthermore, PID u is integrated in the message R 1 =h(PID G ||T 1 ) ⊕PID u during mutual authentication process. It is hard problem in polynomial terms to recover the 160-bit random integer on account of guessing the values [25], so it is not feasible to calculate the legitimate identity of mobile drone CMD i without compromising the high entropy factor k. Thus our scheme affirms anonymity to the participants in protocol.…”
Section: Anonymitymentioning
confidence: 93%
“…Furthermore, PID u is integrated in the message R 1 =h(PID G ||T 1 ) ⊕PID u during mutual authentication process. It is hard problem in polynomial terms to recover the 160-bit random integer on account of guessing the values [25], so it is not feasible to calculate the legitimate identity of mobile drone CMD i without compromising the high entropy factor k. Thus our scheme affirms anonymity to the participants in protocol.…”
Section: Anonymitymentioning
confidence: 93%
“…Hence the most effective approach is to apply authentication for LEO SCSs. The authors of [94] proposed an Unmanned Aerial Vehicle (UAV) [95], [96]assisted authentication method to tackle spoofing jamming.…”
Section: Uplink Beammentioning
confidence: 99%
“…Presented in Table I is a detailed content comparison between this article and other relevant surveys and tutorials [6]- [14]. Shorter overview articles can be found in [17]- [22], whereas [23]- [43] comprise other surveys or tutorials with less relevance to the present article.…”
Section: B Contributionmentioning
confidence: 99%