2018
DOI: 10.1155/2018/7475357
|View full text |Cite
|
Sign up to set email alerts
|

UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication

Abstract: Ensuring the desired level of security is an important issue in all communicating systems, and it becomes more challenging in wireless environments. Flying Ad Hoc Networks (FANETs) are an emerging type of mobile network that is built using energy-restricted devices. Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. In the literature, various solutions have been proposed to ensure secure and reliable in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
10

Relationship

2
8

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…An Internet-of-Drones ( Edwin et al, 2019 ) is a very potential future. Research into the use of flying ad-hoc networks to monitor and manage deviant drone behaviour ( Bahloul et al, 2017 ; Barka et al, 2018 , Karthikeyan and Vadivel, 2019) are in progress, as are geofencing ( Boselli et al, 2017 ) and signal jamming ( Chowdhury et al, 2017 ) that act on the navigation systems within drones to prevent drone incursion into restricted areas. Though to implement some of these preventative technologies, it is, of course, necessary that the relevant drones have navigation technologies installed to be acted upon by the countermeasures, which for a substantial number of retail drones is not the case.…”
Section: Managing the Drone Revolution – Where To From Here?mentioning
confidence: 99%
“…An Internet-of-Drones ( Edwin et al, 2019 ) is a very potential future. Research into the use of flying ad-hoc networks to monitor and manage deviant drone behaviour ( Bahloul et al, 2017 ; Barka et al, 2018 , Karthikeyan and Vadivel, 2019) are in progress, as are geofencing ( Boselli et al, 2017 ) and signal jamming ( Chowdhury et al, 2017 ) that act on the navigation systems within drones to prevent drone incursion into restricted areas. Though to implement some of these preventative technologies, it is, of course, necessary that the relevant drones have navigation technologies installed to be acted upon by the countermeasures, which for a substantial number of retail drones is not the case.…”
Section: Managing the Drone Revolution – Where To From Here?mentioning
confidence: 99%
“…The authors programmed the occurrence of ten events around five randomly distributed critical infrastructure. Detection rates in the order of 95% were observed in simulation with lower false alarm rates as compared to classical approaches [62], [63]. The authors concluded that the high detection ratios and reduced overhead showed that a blockchain-based sUAS could provide accurate decisions which are crucial in monitoring critical infrastructure.…”
Section: A Simulation Studiesmentioning
confidence: 95%
“…As shown in Figure 5(b), unlike RW, the mobile nodes frequently appear towards the area of interest center. RWP is deployed in several protocols involving UAVs hovering at the same altitudes [105]- [107].…”
Section: A Random-based Mobility Modelsmentioning
confidence: 99%