Security in Internet of Drones: A Comprehensive Review
Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian drones are used for various applications like construction site monitoring, natural disaster area monitoring, agriculture, etc. Military drone...
Saved in:
Published in | Cogent engineering Vol. 9; no. 1 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Abingdon
Cogent
31.12.2022
Taylor & Francis Ltd Taylor & Francis Group |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian drones are used for various applications like construction site monitoring, natural disaster area monitoring, agriculture, etc. Military drones are used for applications like monitoring a country's border, the transmission of information about the intruders to Ground Control Station (GCS), or to any other server which has been designed for the purpose. Before the real-time deployment of the Internet of Drones (IoD), the feasibility and efficiency of a proposed UAV framework should be tested in an open-source UAV simulator or any network simulator. AirSim simulator is an open-source UAV simulator that has different features like ease of development, efficient motion capture, efficient obstacle detections and collision detections, use of different sensor models, and physics models. Hence, a review has been done on recent UAV frameworks which have been designed and tested using the AirSim simulator. Since a vast amount of data is being transmitted between IoD devices in this era, there is a need for designing secure IoD communication frameworks, with the least compromise in the performance of the designed frameworks. Hence, an extensive review has been done on different secure IoD communication frameworks which have used different cryptography concepts like key agreement, authentication, encryption and decryption, integrity, blockchain, digital signatures, and have implemented their proposed frameworks in real-time, or by using network simulators. The common network simulators that have been used for simulating secure IoD frameworks/mechanisms are NS3 and OMNeT++. |
---|---|
AbstractList | Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian drones are used for various applications like construction site monitoring, natural disaster area monitoring, agriculture, etc. Military drones are used for applications like monitoring a country’s border, the transmission of information about the intruders to Ground Control Station (GCS), or to any other server which has been designed for the purpose. Before the real-time deployment of the Internet of Drones (IoD), the feasibility and efficiency of a proposed UAV framework should be tested in an open-source UAV simulator or any network simulator. AirSim simulator is an open-source UAV simulator that has different features like ease of development, efficient motion capture, efficient obstacle detections and collision detections, use of different sensor models, and physics models. Hence, a review has been done on recent UAV frameworks which have been designed and tested using the AirSim simulator. Since a vast amount of data is being transmitted between IoD devices in this era, there is a need for designing secure IoD communication frameworks, with the least compromise in the performance of the designed frameworks. Hence, an extensive review has been done on different secure IoD communication frameworks which have used different cryptography concepts like key agreement, authentication, encryption and decryption, integrity, blockchain, digital signatures, and have implemented their proposed frameworks in real-time, or by using network simulators. The common network simulators that have been used for simulating secure IoD frameworks/mechanisms are NS3 and OMNeT++. |
Author | K V, Prema Samanth, Snehal Balachandra, Mamatha |
Author_xml | – sequence: 1 givenname: Snehal surname: Samanth fullname: Samanth, Snehal organization: Manipal Institute of Technology,Manipal Academy of Higher Education – sequence: 2 givenname: Prema orcidid: 0000-0002-8847-0749 surname: K V fullname: K V, Prema email: prema.kv@manipal.edu organization: Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education – sequence: 3 givenname: Mamatha orcidid: 0000-0003-2201-8730 surname: Balachandra fullname: Balachandra, Mamatha organization: Manipal Institute of Technology, Manipal Academy of Higher Education |
BookMark | eNqFkFtrGzEQhUVJoUman1BYyLPTkbQ3JS8J7s0QKPTyLGa1s43MWnJGcoL_fXfrBEoe2geNxJn5joZzIo5CDCTEOwkXElp4r7SW0sj6QoFSczGT-kocz_pibhz99X4jzlJaA4DUZQUGjkX9ndyOfd4XPhSrkIkD5SIOxQee_kmXxU2xjJst0x2F5B-o-EYPnh7fitcDjonOnu5T8fPTxx_LL4vbr59Xy5vbhSsrmReyI5TY1BWgUyCbsm5L7EtnoOlM02Nrur4B3ba1cq4cai2BtNO1IU1Da3p9KlYH3z7i2m7Zb5D3NqK3f4TIvyxy9m4kO2FKtZ3U0Jalcz0a1xlXdw7lAI3Uk9f5wWvL8X5HKdt13HGY1reqqSoznaaapq4OU45jSkyDdT5j9jFkRj9aCXbO3T7nbufc7VPuE129oJ93_h93feB8GCJv8DHy2NuM-zHywBicT1b_2-I3vESYfw |
CitedBy_id | crossref_primary_10_1109_JIOT_2024_3379930 crossref_primary_10_3390_electronics12143131 crossref_primary_10_1109_TITS_2023_3343713 crossref_primary_10_1109_TVT_2023_3306813 crossref_primary_10_1016_j_aei_2023_101879 crossref_primary_10_1016_j_phycom_2023_102116 crossref_primary_10_1016_j_prime_2024_100471 crossref_primary_10_3390_electronics12234854 crossref_primary_10_3390_electronics14020339 crossref_primary_10_3390_fi16070250 crossref_primary_10_1007_s42979_025_03819_3 crossref_primary_10_1016_j_dt_2024_04_013 crossref_primary_10_3390_drones7080507 crossref_primary_10_3390_sym15101886 crossref_primary_10_3390_technologies13010023 crossref_primary_10_3390_s23031233 crossref_primary_10_3390_electronics14010149 crossref_primary_10_1109_JIOT_2023_3266843 crossref_primary_10_3390_educsci13020167 |
Cites_doi | 10.1109/JIOT.2018.2875065 10.1109/ICIP.2019.8803100 10.1016/j.ifacol.2016.11.119 10.1109/ACCESS.2018.2819189 10.1109/ICSPCS.2016.7843322 10.1109/CC.2018.8387987 10.1109/JSYST.2021.3057047 10.1145/3357613.3357635 10.1109/IRI49571.2020.00015 10.1109/CAC.2017.8243463 10.1007/s11036-018-1193-x 10.21817/indjcse/2021/v12i1/211201169 10.1109/WiMOB.2019.8923375 10.3390/electronics9010062 10.1109/MM.2017.4241339 10.3390/rs13020321 10.1109/TSMC.2013.2265083 10.1007/s11432-019-2903-2 10.1037/mil0000149 10.1145/3242102.3242118 10.1109/ICPEA51500.2021.9417847 10.1002/ett.4255 10.3390/electronics9081185 10.1109/TVT.2020.3000576 10.3390/drones3010013 10.1109/GLOCOMW.2016.7848992 10.1145/3414045.3415941 10.1017/dmp.2018.106 10.1109/JSYST.2019.2921798 10.3390/info10020043 10.1145/74850.74852 10.1109/VLSI-SoC.2017.8203494 10.1016/j.jnca.2015.06.021 10.1109/COMST.2019.2906228 10.1109/LRA.2020.3004780 10.1016/j.comcom.2020.11.009 10.1109/PIMRCW.2019.8880832 10.1007/978-3-540-79104-1_19 10.1016/j.sysarc.2020.101955 10.1016/j.iot.2020.100218 10.1109/GLOBECOM38437.2019.9013127 10.1109/ACCESS.2019.2934998 10.2514/6.2020-2018 10.1109/IES50839.2020.9231951 10.1007/s10846-013-9900-0 10.1109/TVT.2020.3033060 10.3390/computers8030058 10.3390/s19092066 10.1016/j.jii.2019.100106 10.3390/rs10111829 10.1109/TIT.1983.1056650 10.1080/21670811.2014.883184 10.1109/DASC.2006.313738 10.1109/VTCSpring.2018.8417687 10.3233/JCS-2001-91-203 10.1109/SECONWorkshops50264.2020.9149770 10.1109/CSFW.1993.246631 10.1145/168588.168596 10.1007/978-3-030-33792-6_11 10.1109/LANMAN49260.2020.9153239 10.1109/ACCESS.2020.2987622 10.1109/IWCMC.2018.8450505 10.1109/ACCESS.2020.2972958 10.1109/COMST.2019.2962207 10.34028/iajit/18/1/3 10.1109/ICRAE48301.2019.9043821 10.1016/j.comcom.2020.05.025 10.1109/eSmarTA52612.2021.9515754 10.1109/ACCESS.2016.2537208 10.3390/rs12132169 10.1007/3-540-46035-7_22 10.3390/s18072339 10.1109/TIFS.2018.2819126 10.3390/su13115908 10.1145/3444370.3444547 10.1109/INFOCOMWKSHPS50562.2020.9163066 10.1109/DASC.2016.7778031 10.1109/CSFW.1994.315945 10.1145/3209811.3209880 10.3390/electronics9010030 10.1145/3274667 10.1109/MSPEC.2017.7802742 10.1109/INFCOMW.2019.8845212 10.1109/WACV45572.2020.9093284 10.1109/MILCOM.2018.8599784 10.3390/s21030694 10.1016/j.adhoc.2017.09.004 10.1109/MCOM.2017.1600799CM 10.1109/TPAMI.2019.2909895 10.1109/JIOT.2021.3084946 10.1007/s12083-019-0718-9 10.1016/j.comnet.2021.107999 10.1109/SSRR.2017.8088163 10.1109/MobileCloud48802.2020.00020 10.1016/j.adhoc.2021.102600 10.1016/j.jnca.2020.102739 10.2514/6.2004-6244 10.1109/ACCESS.2020.2991033 10.1145/3001836 10.1109/ACCESS.2020.2977817 10.1109/ICNSURV.2019.8735133 10.1109/ICNSURV.2016.7486326 10.1109/TMC.2019.2903048 10.1002/ett.4133 10.1007/s12524-020-01225-1 10.3390/app9245571 10.1109/ACCESS.2021.3060420 10.1109/ICRA40945.2020.9197364 10.1016/j.comcom.2020.02.067 10.1016/j.ins.2020.08.055 10.12716/1001.14.04.12 10.1109/ICUAS.2018.8453412 10.4018/IJDCF.2020010103 10.1109/RTEICT.2016.7807936 10.1016/j.micpro.2018.05.002 10.5194/isprsarchives-XL-1-W4-55-2015 10.1016/j.ijleo.2020.164923 10.1016/j.adhoc.2018.09.013 10.1109/TVT.2021.3055895 10.1109/AERO.2016.7500600 10.3390/electronics10050548 10.1007/978-3-540-30580-4_6 10.1007/s10846-013-9969-5 10.1109/ACCESS.2021.3070683 10.1109/VTCFall.2017.8288218 10.1145/3377049.3377062 10.1109/ICENCO.2017.8289821 10.1016/j.procs.2019.01.151 10.1108/JMTM-03-2019-0099 10.1109/IC3.2018.00014 10.1109/DASC.2018.8569730 10.1109/NAECON.2018.8556642 10.1007/978-90-481-8764-5_20 10.1109/EIT48999.2020.9208314 10.1007/s11227-020-03462-0 10.1016/j.ins.2020.03.053 10.1109/MNET.011.2000154 10.1145/2387027.2387030 10.1109/ICTC46691.2019.8939885 10.1007/11513988_27 10.23919/ACC45564.2020.9147400 10.3390/rs9050459 10.3390/s21041369 10.1007/s00170-017-1363-1 10.3390/s18103430 10.1007/978-3-540-45069-6_23 10.1109/ICC.2019.8761372 10.1016/j.comcom.2020.08.016 10.1109/ACCESS.2020.3019367 10.3390/rs11101241 10.1016/j.comcom.2020.03.009 10.1109/SSCI47803.2020.9308140 10.1109/NSysS.2017.7885810 10.1109/MNET.011.2000210 10.1016/j.comcom.2020.12.005 10.1109/NaNA.2019.00072 10.1109/IWCMC.2019.8766667 10.1109/ICUAS48674.2020.9213927 10.1109/DASC.2017.8101984 10.1109/TVT.2020.3018778 10.1109/ACCESS.2021.3076692 10.1109/GCWkshps45667.2019.9024530 10.1109/ICAR46387.2019.8981570 10.1007/978-3-030-24907-6_32 10.2514/6.2009-1617 10.1109/RISP.1990.63854 10.1155/2020/8858886 10.1155/2019/8583130 10.1109/GLOBECOM42002.2020.9322282 10.1109/TVT.2019.2911672 10.1109/ACDT47198.2019.9072714 10.1016/j.tre.2020.102090 10.1016/j.eswa.2019.113064 10.1109/ICTC49870.2020.9289387 10.1016/j.comcom.2020.02.011 10.1109/ICUAS.2014.6842296 10.3390/app10093149 10.3390/s21062057 10.1002/itl2.310 10.1109/TVT.2021.3082308 10.1007/s11042-020-10388-5 10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00042 10.1016/j.sysarc.2013.05.022 10.1109/ICUFN.2019.8806165 10.12928/telkomnika.v17i1.9255 10.1109/ACCESS.2019.2953900 10.1109/TII.2020.3048398 10.1016/j.jisa.2019.06.010 10.1109/JIOT.2018.2888821 10.1109/ACCESS.2020.2974381 10.1109/ICMLA.2011.159 10.1109/JIOT.2020.3014947 10.1145/2714576.2714616 10.1049/iet-com.2019.1009 10.1016/j.adhoc.2021.102505 10.1007/978-3-319-78963-7_37 10.1002/ett.4114 10.1007/s11227-017-2179-3 10.1007/978-3-540-70545-1_38 |
ContentType | Journal Article |
Copyright | 2022 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. 2022 2022 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. This work is licensed under the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: 2022 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. 2022 – notice: 2022 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license. This work is licensed under the Creative Commons Attribution License http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | 0YH AAYXX CITATION 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU COVID DWQXO HCIFZ L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PTHSS DOA |
DOI | 10.1080/23311916.2022.2029080 |
DatabaseName | Taylor & Francis Journals CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One Community College Coronavirus Research Database ProQuest Central Korea SciTech Premium Collection (via ProQuest) ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering Collection DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Engineering Database Technology Collection ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition Coronavirus Research Database ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest One Academic UKI Edition ProQuest Central Korea Materials Science & Engineering Collection ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) Engineering Collection |
DatabaseTitleList | Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 0YH name: Taylor & Francis Open Access url: https://www.tandfonline.com sourceTypes: Publisher – sequence: 3 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2331-1916 |
ExternalDocumentID | oai_doaj_org_article_c36228b130844ccda9cb9c6bca1f0713 10_1080_23311916_2022_2029080 2029080 |
Genre | Review Article |
GroupedDBID | 0YH 5VS 8FE 8FG AAFWJ ABDBF ABJCF ACUHS ADBBV ADCVX AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU EAP EBS ESX GROUPED_DOAJ H13 HCIFZ HZ~ KQ8 L6V M4Z M7S M~E O9- OK1 PIMPY PROAC PTHSS TDBHL TFMNY TFW AAYXX ADMLS CITATION PHGZM PHGZT ABUWG AZQEC COVID DWQXO PKEHL PQEST PQGLB PQQKQ PQUKI PUEGO |
ID | FETCH-LOGICAL-c451t-1bea1a7650ac20174684ad4c907b97da89bd7038862cc4f6310e3c369e3ef89d3 |
IEDL.DBID | 0YH |
ISSN | 2331-1916 |
IngestDate | Wed Aug 27 01:31:57 EDT 2025 Fri Jul 25 11:52:41 EDT 2025 Thu Apr 24 22:54:10 EDT 2025 Tue Jul 01 01:26:40 EDT 2025 Wed Dec 25 09:05:46 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | open-access: http://creativecommons.org/licenses/by/4.0/: You are free to: Share - copy and redistribute the material in any medium or format. Adapt - remix, transform, and build upon the material for any purpose, even commercially. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution - You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. No additional restrictions You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c451t-1bea1a7650ac20174684ad4c907b97da89bd7038862cc4f6310e3c369e3ef89d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8847-0749 0000-0003-2201-8730 |
OpenAccessLink | https://www.tandfonline.com/doi/abs/10.1080/23311916.2022.2029080 |
PQID | 2755975575 |
PQPubID | 2043312 |
ParticipantIDs | crossref_citationtrail_10_1080_23311916_2022_2029080 doaj_primary_oai_doaj_org_article_c36228b130844ccda9cb9c6bca1f0713 crossref_primary_10_1080_23311916_2022_2029080 proquest_journals_2755975575 informaworld_taylorfrancis_310_1080_23311916_2022_2029080 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-12-31 |
PublicationDateYYYYMMDD | 2022-12-31 |
PublicationDate_xml | – month: 12 year: 2022 text: 2022-12-31 day: 31 |
PublicationDecade | 2020 |
PublicationPlace | Abingdon |
PublicationPlace_xml | – name: Abingdon |
PublicationTitle | Cogent engineering |
PublicationYear | 2022 |
Publisher | Cogent Taylor & Francis Ltd Taylor & Francis Group |
Publisher_xml | – name: Cogent – name: Taylor & Francis Ltd – name: Taylor & Francis Group |
References | cit0077 cit0198 cit0078 cit0199 cit0075 cit0196 cit0076 cit0073 cit0194 cit0074 cit0195 cit0071 cit0192 cit0072 cit0193 cit0190 cit0070 cit0191 cit0079 cit0066 cit0187 cit0067 cit0188 cit0064 cit0185 cit0065 cit0186 cit0062 cit0183 cit0184 cit0060 cit0181 cit0061 cit0182 cit0180 Saif A. (cit0151) 2021 cit0068 cit0099 cit0097 cit0098 cit0095 cit0096 cit0093 cit0094 cit0091 cit0092 cit0090 Boyd C. (cit0040) 1993 Vogeltanz T. (cit0189) 2015; 1648 cit0088 cit0089 cit0086 cit0087 cit0084 cit0085 cit0083 cit0080 cit0081 Fuller B. (cit0069) 2014 cit0033 cit0154 cit0155 Haque M. S. (cit0082) 2017 cit0152 cit0032 cit0153 cit0150 cit0030 cit0039 cit0037 cit0158 cit0038 cit0159 cit0035 cit0156 cit0036 cit0157 cit0022 cit0143 cit0023 cit0144 cit0020 cit0141 cit0021 cit0142 cit0140 cit0028 cit0149 cit0026 cit0147 cit0027 cit0148 cit0024 cit0145 cit0025 cit0146 cit0055 cit0176 cit0056 cit0177 cit0053 cit0174 cit0054 cit0175 cit0051 cit0172 cit0052 cit0173 cit0170 cit0050 cit0171 cit0059 cit0178 cit0058 cit0179 cit0044 cit0165 cit0045 cit0166 cit0042 cit0163 cit0043 cit0164 cit0161 cit0041 cit0162 cit0160 Benzarti S. (cit0029) 2018 cit0048 cit0169 cit0049 cit0046 cit0167 cit0047 cit0168 cit0110 cit0111 cit0118 cit0119 cit0116 cit0117 cit0114 cit0115 cit0112 cit0113 cit0100 Kim S. (cit0103) 2019; 2019 Dobrea D.-M. (cit0057) 2020; 23 cit0109 cit0107 cit0108 cit0105 cit0106 cit0104 cit0101 cit0102 cit0011 cit0132 cit0012 cit0133 cit0130 cit0010 cit0131 cit0019 cit0017 cit0018 cit0139 cit0015 cit0136 cit0016 cit0137 cit0013 cit0134 cit0014 cit0135 cit0121 cit0001 cit0122 cit0120 cit0008 cit0129 cit0009 cit0127 cit0007 cit0128 cit0004 cit0125 Whittle R. (cit0197) 2017; 63 cit0005 cit0126 cit0002 cit0123 cit0003 cit0124 Blanchet B. (cit0034) 2013 Fan J. (cit0063) 2021; 2021 Ahn O. (cit0006) 2010; 6 Putera A. S. (cit0138) 2018; 10 cit0210 cit0213 Bera B. (cit0031) 2021; 9 cit0211 cit0212 cit0208 cit0209 cit0206 cit0207 cit0204 cit0205 cit0202 cit0203 cit0200 cit0201 |
References_xml | – ident: cit0047 doi: 10.1109/JIOT.2018.2875065 – ident: cit0091 doi: 10.1109/ICIP.2019.8803100 – ident: cit0207 doi: 10.1016/j.ifacol.2016.11.119 – ident: cit0049 doi: 10.1109/ACCESS.2018.2819189 – ident: cit0168 doi: 10.1109/ICSPCS.2016.7843322 – ident: cit0046 doi: 10.1109/CC.2018.8387987 – ident: cit0092 doi: 10.1109/JSYST.2021.3057047 – ident: cit0038 doi: 10.1145/3357613.3357635 – ident: cit0140 doi: 10.1109/IRI49571.2020.00015 – ident: cit0190 doi: 10.1109/CAC.2017.8243463 – ident: cit0212 doi: 10.1007/s11036-018-1193-x – volume: 6 volume-title: 27th Congress of International Council of the Aeronautical Sciences, ICAS year: 2010 ident: cit0006 – ident: cit0124 doi: 10.21817/indjcse/2021/v12i1/211201169 – ident: cit0068 doi: 10.1109/WiMOB.2019.8923375 – ident: cit0045 doi: 10.3390/electronics9010062 – ident: cit0072 doi: 10.1109/MM.2017.4241339 – ident: cit0165 doi: 10.3390/rs13020321 – ident: cit0125 doi: 10.1109/TSMC.2013.2265083 – ident: cit0086 doi: 10.1007/s11432-019-2903-2 – ident: cit0022 doi: 10.1037/mil0000149 – ident: cit0025 doi: 10.1145/3242102.3242118 – start-page: 54 volume-title: Foundations of security analysis and design VII year: 2013 ident: cit0034 – ident: cit0153 doi: 10.1109/ICPEA51500.2021.9417847 – volume: 10 start-page: 123 issue: 1 year: 2018 ident: cit0138 publication-title: Journal of Telecommunication, Electronic and Computer Engineering (JTEC) – ident: cit0016 doi: 10.1002/ett.4255 – ident: cit0178 doi: 10.3390/electronics9081185 – ident: cit0033 doi: 10.1109/TVT.2020.3000576 – ident: cit0018 doi: 10.3390/drones3010013 – ident: cit0083 doi: 10.1109/GLOCOMW.2016.7848992 – ident: cit0192 doi: 10.1145/3414045.3415941 – ident: cit0147 doi: 10.1017/dmp.2018.106 – ident: cit0188 doi: 10.1109/JSYST.2019.2921798 – ident: cit0002 doi: 10.3390/info10020043 – ident: cit0042 doi: 10.1145/74850.74852 – volume: 23 start-page: S53 year: 2020 ident: cit0057 publication-title: Roman Journal of Information Science and Technology – ident: cit0163 doi: 10.1109/VLSI-SoC.2017.8203494 – ident: cit0201 doi: 10.1016/j.jnca.2015.06.021 – ident: cit0067 doi: 10.1109/COMST.2019.2906228 – ident: cit0106 doi: 10.1109/LRA.2020.3004780 – ident: cit0077 doi: 10.1016/j.comcom.2020.11.009 – ident: cit0079 doi: 10.1109/PIMRCW.2019.8880832 – ident: cit0129 doi: 10.1007/978-3-540-79104-1_19 – ident: cit0127 doi: 10.1016/j.sysarc.2020.101955 – start-page: 113 volume-title: International Conference on Security and Privacy in Communication Systems year: 2017 ident: cit0082 – ident: cit0204 doi: 10.1016/j.iot.2020.100218 – ident: cit0202 doi: 10.1109/GLOBECOM38437.2019.9013127 – ident: cit0017 doi: 10.1109/ACCESS.2019.2934998 – ident: cit0133 doi: 10.2514/6.2020-2018 – ident: cit0148 doi: 10.1109/IES50839.2020.9231951 – ident: cit0130 doi: 10.1007/s10846-013-9900-0 – ident: cit0011 doi: 10.1109/TVT.2020.3033060 – ident: cit0066 doi: 10.3390/computers8030058 – ident: cit0024 doi: 10.3390/s19092066 – ident: cit0175 doi: 10.1016/j.jii.2019.100106 – ident: cit0206 doi: 10.3390/rs10111829 – ident: cit0058 doi: 10.1109/TIT.1983.1056650 – ident: cit0081 doi: 10.1080/21670811.2014.883184 – volume: 1648 start-page: 550014 volume-title: AIP Conference Proceedings year: 2015 ident: cit0189 – start-page: 226 volume-title: SoMeT year: 2018 ident: cit0029 – ident: cit0132 doi: 10.1109/DASC.2006.313738 – ident: cit0126 doi: 10.1109/VTCSpring.2018.8417687 – ident: cit0167 doi: 10.3233/JCS-2001-91-203 – ident: cit0117 doi: 10.1109/SECONWorkshops50264.2020.9149770 – ident: cit0121 doi: 10.1109/CSFW.1993.246631 – ident: cit0028 doi: 10.1145/168588.168596 – ident: cit0122 doi: 10.1007/978-3-030-33792-6_11 – ident: cit0137 doi: 10.1109/LANMAN49260.2020.9153239 – ident: cit0203 doi: 10.1109/ACCESS.2020.2987622 – ident: cit0087 doi: 10.1109/IWCMC.2018.8450505 – ident: cit0052 doi: 10.1109/ACCESS.2020.2972958 – ident: cit0191 doi: 10.1109/COMST.2019.2962207 – ident: cit0208 doi: 10.34028/iajit/18/1/3 – ident: cit0195 doi: 10.1109/ICRAE48301.2019.9043821 – ident: cit0010 doi: 10.1016/j.comcom.2020.05.025 – ident: cit0152 doi: 10.1109/eSmarTA52612.2021.9515754 – ident: cit0073 doi: 10.1109/ACCESS.2016.2537208 – volume: 9 start-page: 1 year: 2021 ident: cit0031 publication-title: IEEE Internet of Things Journal – ident: cit0020 doi: 10.3390/rs12132169 – ident: cit0043 doi: 10.1007/3-540-46035-7_22 – ident: cit0143 doi: 10.3390/s18072339 – ident: cit0164 doi: 10.1109/TIFS.2018.2819126 – ident: cit0013 doi: 10.3390/su13115908 – ident: cit0111 doi: 10.1145/3444370.3444547 – ident: cit0194 doi: 10.1109/INFOCOMWKSHPS50562.2020.9163066 – ident: cit0048 doi: 10.1109/DASC.2016.7778031 – volume: 2021 start-page: 1 year: 2021 ident: cit0063 publication-title: Security and Communication Networks – ident: cit0123 doi: 10.1109/CSFW.1994.315945 – ident: cit0036 doi: 10.1145/3209811.3209880 – ident: cit0097 doi: 10.3390/electronics9010030 – ident: cit0050 doi: 10.1145/3274667 – ident: cit0155 doi: 10.1109/MSPEC.2017.7802742 – ident: cit0134 doi: 10.1109/INFCOMW.2019.8845212 – ident: cit0037 doi: 10.1109/WACV45572.2020.9093284 – ident: cit0131 doi: 10.1109/MILCOM.2018.8599784 – ident: cit0149 doi: 10.3390/s21030694 – ident: cit0209 doi: 10.1016/j.adhoc.2017.09.004 – ident: cit0084 doi: 10.1109/MCOM.2017.1600799CM – ident: cit0157 doi: 10.1109/TPAMI.2019.2909895 – ident: cit0179 doi: 10.1109/JIOT.2021.3084946 – ident: cit0090 doi: 10.1007/s12083-019-0718-9 – ident: cit0044 doi: 10.1016/j.comnet.2021.107999 – ident: cit0107 doi: 10.1109/SSRR.2017.8088163 – ident: cit0135 doi: 10.1109/MobileCloud48802.2020.00020 – ident: cit0035 doi: 10.1016/j.adhoc.2021.102600 – ident: cit0159 doi: 10.1016/j.jnca.2020.102739 – ident: cit0196 doi: 10.2514/6.2004-6244 – ident: cit0116 doi: 10.1109/ACCESS.2020.2991033 – ident: cit0019 doi: 10.1145/3001836 – ident: cit0009 doi: 10.1109/ACCESS.2020.2977817 – ident: cit0008 doi: 10.1109/ICNSURV.2019.8735133 – volume: 63 start-page: 14 issue: 2 year: 2017 ident: cit0197 publication-title: Vertiflite – ident: cit0170 doi: 10.1109/ICNSURV.2016.7486326 – ident: cit0199 doi: 10.1109/TMC.2019.2903048 – ident: cit0174 doi: 10.1002/ett.4133 – ident: cit0144 doi: 10.1007/s12524-020-01225-1 – ident: cit0161 doi: 10.3390/app9245571 – ident: cit0205 doi: 10.1109/ACCESS.2021.3060420 – ident: cit0115 doi: 10.1109/ICRA40945.2020.9197364 – ident: cit0210 doi: 10.1016/j.comcom.2020.02.067 – ident: cit0080 doi: 10.1016/j.ins.2020.08.055 – ident: cit0027 doi: 10.12716/1001.14.04.12 – ident: cit0186 doi: 10.1109/ICUAS.2018.8453412 – ident: cit0039 doi: 10.4018/IJDCF.2020010103 – ident: cit0136 doi: 10.1109/RTEICT.2016.7807936 – ident: cit0060 doi: 10.1016/j.micpro.2018.05.002 – ident: cit0089 doi: 10.5194/isprsarchives-XL-1-W4-55-2015 – ident: cit0056 doi: 10.1016/j.ijleo.2020.164923 – ident: cit0105 doi: 10.1016/j.adhoc.2018.09.013 – ident: cit0098 doi: 10.1109/TVT.2021.3055895 – ident: cit0053 doi: 10.1109/AERO.2016.7500600 – ident: cit0176 doi: 10.3390/electronics10050548 – ident: cit0001 doi: 10.1007/978-3-540-30580-4_6 – ident: cit0118 doi: 10.1007/s10846-013-9969-5 – ident: cit0109 doi: 10.1109/ACCESS.2021.3070683 – ident: cit0065 doi: 10.1109/VTCFall.2017.8288218 – ident: cit0094 doi: 10.1145/3377049.3377062 – ident: cit0093 doi: 10.1109/ICENCO.2017.8289821 – ident: cit0061 doi: 10.1016/j.procs.2019.01.151 – ident: cit0120 doi: 10.1108/JMTM-03-2019-0099 – ident: cit0088 doi: 10.1109/IC3.2018.00014 – ident: cit0156 doi: 10.1109/DASC.2018.8569730 – ident: cit0213 doi: 10.1109/NAECON.2018.8556642 – ident: cit0070 doi: 10.1007/978-90-481-8764-5_20 – ident: cit0074 doi: 10.1109/EIT48999.2020.9208314 – ident: cit0064 doi: 10.1007/s11227-020-03462-0 – ident: cit0181 doi: 10.1016/j.ins.2020.03.053 – ident: cit0119 doi: 10.1109/MNET.011.2000154 – ident: cit0146 doi: 10.1145/2387027.2387030 – ident: cit0005 doi: 10.1109/ICTC46691.2019.8939885 – ident: cit0021 doi: 10.1007/11513988_27 – ident: cit0026 doi: 10.23919/ACC45564.2020.9147400 – ident: cit0171 doi: 10.3390/rs9050459 – ident: cit0108 doi: 10.3390/s21041369 – ident: cit0160 doi: 10.1007/s00170-017-1363-1 – ident: cit0059 doi: 10.3390/s18103430 – ident: cit0041 doi: 10.1007/978-3-540-45069-6_23 – ident: cit0004 doi: 10.1109/ICC.2019.8761372 – ident: cit0055 doi: 10.1016/j.comcom.2020.08.016 – ident: cit0180 doi: 10.1109/ACCESS.2020.3019367 – ident: cit0110 doi: 10.3390/rs11101241 – start-page: 240 volume-title: Workshop on the Theory and Application of of Cryptographic Techniques year: 1993 ident: cit0040 – ident: cit0062 doi: 10.1016/j.comcom.2020.03.009 – start-page: 1 volume-title: Proceedings of the 16th Australasian Conference on Robotics and Automation 2014 year: 2014 ident: cit0069 – ident: cit0101 doi: 10.1109/SSCI47803.2020.9308140 – ident: cit0154 doi: 10.1109/NSysS.2017.7885810 – ident: cit0015 doi: 10.1002/ett.4255 – ident: cit0200 doi: 10.1109/MNET.011.2000210 – ident: cit0032 doi: 10.1016/j.comcom.2020.12.005 – ident: cit0182 doi: 10.1109/NaNA.2019.00072 – ident: cit0012 doi: 10.1109/IWCMC.2019.8766667 – ident: cit0166 doi: 10.1109/ICUAS48674.2020.9213927 – ident: cit0007 doi: 10.1109/DASC.2017.8101984 – ident: cit0078 doi: 10.1109/TVT.2020.3018778 – ident: cit0095 doi: 10.1109/ACCESS.2021.3076692 – ident: cit0112 doi: 10.1109/GCWkshps45667.2019.9024530 – ident: cit0113 doi: 10.1109/ICAR46387.2019.8981570 – ident: cit0145 doi: 10.1007/978-3-030-24907-6_32 – ident: cit0096 doi: 10.2514/6.2009-1617 – ident: cit0076 doi: 10.1109/RISP.1990.63854 – ident: cit0100 doi: 10.1155/2020/8858886 – ident: cit0085 doi: 10.1155/2019/8583130 – ident: cit0003 doi: 10.1109/GLOBECOM42002.2020.9322282 – ident: cit0169 doi: 10.1109/TVT.2019.2911672 – ident: cit0139 doi: 10.1109/ACDT47198.2019.9072714 – ident: cit0142 doi: 10.1016/j.tre.2020.102090 – ident: cit0162 doi: 10.1016/j.eswa.2019.113064 – ident: cit0102 doi: 10.1109/ICTC49870.2020.9289387 – ident: cit0030 doi: 10.1016/j.comcom.2020.02.011 – ident: cit0187 doi: 10.1109/ICUAS.2014.6842296 – ident: cit0051 doi: 10.3390/app10093149 – ident: cit0104 doi: 10.3390/s21062057 – start-page: e310 year: 2021 ident: cit0151 publication-title: Internet Technology Letters doi: 10.1002/itl2.310 – ident: cit0141 doi: 10.1109/TVT.2021.3082308 – ident: cit0075 doi: 10.1007/s11042-020-10388-5 – ident: cit0114 doi: 10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00042 – ident: cit0150 doi: 10.1016/j.sysarc.2013.05.022 – ident: cit0023 doi: 10.1109/ICUFN.2019.8806165 – volume: 2019 start-page: 1 year: 2019 ident: cit0103 publication-title: Wireless Communications and Mobile Computing – ident: cit0173 doi: 10.12928/telkomnika.v17i1.9255 – ident: cit0183 doi: 10.1109/ACCESS.2019.2953900 – ident: cit0177 doi: 10.1109/TII.2020.3048398 – ident: cit0184 doi: 10.1016/j.jisa.2019.06.010 – ident: cit0193 doi: 10.1109/JIOT.2018.2888821 – ident: cit0099 doi: 10.1109/ACCESS.2020.2974381 – ident: cit0185 doi: 10.1109/ICMLA.2011.159 – ident: cit0071 doi: 10.1109/JIOT.2020.3014947 – ident: cit0198 doi: 10.1145/2714576.2714616 – ident: cit0211 doi: 10.1049/iet-com.2019.1009 – ident: cit0014 doi: 10.1016/j.adhoc.2021.102505 – ident: cit0128 doi: 10.1007/978-3-319-78963-7_37 – ident: cit0158 doi: 10.1002/ett.4114 – ident: cit0172 doi: 10.1007/s11227-017-2179-3 – ident: cit0054 doi: 10.1007/978-3-540-70545-1_38 |
SSID | ssj0001345090 |
Score | 2.399219 |
SecondaryResourceType | review_article |
Snippet | Unmanned Aerial Vehicles (UAVs), also called drones, are used for various applications with two basic classifications: civilian and military drones. Civilian... |
SourceID | doaj proquest crossref informaworld |
SourceType | Open Website Aggregation Database Enrichment Source Index Database Publisher |
SubjectTerms | AirSim authentication Construction sites Cryptography decryption Digital signatures Drone aircraft Drone vehicles Encryption Ground stations Internet internet of drones key agreement Monitoring Motion capture Natural disasters Real time security Simulation Simulators UAV Unmanned aerial vehicles |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxgQT1EoyANraPyIY7OVR1UhwQKVulm2YwskVFAJ_x9fnFQRDF1Yo0S2Pp_v7rvY3yF0SZi1piAyC8y5jBObZ6pwNmM0lGUoPJEV1CEfn8Rszh8WxaLX6gvOhCV54ATc2EUPS6WNrlZy7lxllLPKCesMCcCwwPvGmNcjU011hfEYCfPuyo7Mx5Qx0DKDUwkULmBR1UhB9oJRo9n_S7H0j4duws50D-22-SKepHnuoy2_PEA7PRXBQySe2x50-G2JU4XP1_gj4LsVCPFf4wmGXb_yr-mwOk7_A47QfHr_cjvL2nYImeMFqTNivSGmjCkVyCpGJiEkNxV3kd5aVVZGKluVIO4iqHM8iJi4eRbhU575IFXFjtFgGcc9QdhG0hXy3EIRKhIsayBTyKlhtqiIFWKIeIeLdq1WOLSseNeklRTt4NQAp27hHKKr9WefSSxj0wc3APr6ZdC6bh5EC9CtBehNFjBEqr9kum5KHSH1JdFswwRG3frqdvN-aVoCzSpiInv6H_M7Q9swZFKHHKFBvfr25zGTqe1FY7Q_b87oNg priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LS8QwEA66XvQgPnF9kYPXavNomngRV11EUMQHeAtJmqggu7rW_2-mTXVR0Gvb9DFpZr75knyD0B5h1pqCyCww5zJObJ6pwtmM0VCWofBEVsBDXl6J83t-8VA8JMLtPS2r7Hxi46irsQOO_ICWgH2LiC6OXt8yqBoFs6uphMYsmosuWMoemhucXV3ffLMsjMeImHdbd2R-QBkDTTNYnUBhIxZVjSTkVFBqtPt_KJf-8tRN-BkuocWEG_Fx29HLaMaPVtDClJrgKhK3qRYdfh7hlunzNR4HfDoBQf5DfIxh9E_8U7toHbfzAmvofnh2d3KepbIImeMFqTNivSGmjNAK5BVjRiEkNxV3Mc21qqyMVLYqQeRFUOd4EBHAeeaYUJ75IFXF1lFvFJ-7gbCNyVfIcwtkVEy0rAHEkFPDbFERK0Qf8c4u2iXNcChd8aJJkhbtzKnBnDqZs4_2v5q9tqIZ_zUYgNG_LgbN6-bAePKo0xDS8RMolTYGXcm5c5VRzionrDMkQK7dR2q6y3TdUB6hrU-i2T8vsN31r06D-F1__3Kbf5_eQvNws1b_cRv16smH34lYpba76Yf8BHLr4OQ priority: 102 providerName: ProQuest |
Title | Security in Internet of Drones: A Comprehensive Review |
URI | https://www.tandfonline.com/doi/abs/10.1080/23311916.2022.2029080 https://www.proquest.com/docview/2755975575 https://doaj.org/article/c36228b130844ccda9cb9c6bca1f0713 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT9wwELYKXMqhgtKKhWXlA9fQ-BEn7o0FlhUSqCogtSfL49hQqdpFu-n_rydxeApx4BIpVpw444xnvsn4G0L2mQCwBauyIJzLJIM804WDTPBQlqHwrKoxDnl-oabX8uxX0WcTLlNaJWLo0BFFtGs1KreFZZ8R940LgbRkmGDAcS8V17F1haxFS5xjEYP89_QhzCJkNIl5v3fntd5PrFJL3v-MuvTFUt3an8kG-ZQcR3rYzfQm-eBnn8n6IzrBLaIuUzE6-mdGu1Cfb-g80OMFMvJ_p4cU1X_hb7usddr9GPhCricnV0fTLNVFyJwsWJMx8JbZMvpWyK8YIYWqpK2lizgXdFnbSkNdIsuL4s7JoKIH54UTSnvhQ6Vr8ZWszuJztwmFiL5CngNGoyLSAosuQ86tgKJmoNSAyF4uxiXScKxd8dewxC3ai9OgOE0S54Ac3He761gz3uowRqHfX4yk123DfHFjkg6Z-AqcVxCtbiWlc7XVDrRT4CwLCLYHRD-eMtO0MY_QFSgx4o0BDPv5NUmLl4aXiLeK6NHuvOPWu-QjnnbskEOy2iz--b3oyTQwar_VeKwmpyOyNj65-PFz1EYF_gNP6OgK |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB7xOJQeUIFW3ULBBzimxI84cSWEaGG7PC8FiZtrO3ZBqnbpEoT6p_iNePKAFUjlxDWJnWQ89nwz9nwDsE65tSajRRK4c4mgNk1U5mzCWcjzkHlalBiHPD6RgzNxcJ6dT8FdlwuDxyq7NbFeqMuRwxj5JssR-2YRXWxf_U2wahTurnYlNBq1OPT_bqPLdr21vxvHd4Ox_t7p90HSVhVInMholVDrDTV5RCbIThgBuSyEKYWLXqJVeWkKZcscOVIkc04EGfGP545L5bkPhSp57HcaZgWPlhwz0_s_HmM6XET7m3aJQkW6yThHBjU8C8Ew7YupmoBywgTWlQKe8KQ-swu1seu_g_kWpZKdRq0WYMoPF-HtBHfhEsifbeU7cjkkTVzRV2QUyO4Y6f-_kh2Ca83YXzRH5EmzC_Eezl5FXB9gZhjf-xGIja5eSFOLoa_o1lmD-CRlhtuspFbKHohOLtq1DOVYKOOPpi2RaSdOjeLUrTh78OWh2VVD0fFSg28o9IeHkWG7vjAa_9bthNXxFxgrbDTxhRDOlUY5q5y0ztCAnn0P1OSQ6aoOsISmGormL3zASje-ul0yrvWjgn_6_-01eDM4PT7SR_snh8swhx03zJMrMFONb_zniJIqu1qrJoFfrz0X7gGAORvj |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3JTsQwDI1gkBAcEKsY1hy4FpqlacONbTSsQgIkOEVJmgASGtBM-X_iNmUV4sA1bbrYdeznOs8IbRFmjM5IkXhmbcKJSROZWZMw6vPcZ44UJeQhzy9E_4af3GZtNeEollUChvYNUUS9VoNxv5S-rYjboYwBLRkUGFDYS0VlGB1HE1nwvdC9Ib3rf6RZGA8uMW337vw2-4tXqsn7v1GX_liqa__Tm0UzMXDEe42m59CYG8yj6U90ggtIXMVmdPhxgJtUn6vws8eHQ2Dk38V7GMx_6B6aqnXc_BhYRDe9o-uDfhL7IiSWZ6RKiHGa6DzEVsCvGCCFKLguuQ0418i81IU0ZQ4sL4Jay70IEZxjlgnpmPOFLNkS6gzCfZcRNgF9-TQ1kI0KSMtoCBlSqpnJSmKE6CLeykXZSBoOvSueFIncoq04FYhTRXF20fb7tJeGNeOvCfsg9PeTgfS6Hnge3qtoQyq8AqWFCV634NzaUktrpBXGauIBbHeR_KwyVdU5D980KFHsjwdYa_WrohWPFM0Bb2Uhol35x6U30eTlYU-dHV-crqIpONIQRa6hTjV8deshqKnMRv3ZvgFpFOcy |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+in+Internet+of+Drones%3A+A+Comprehensive+Review&rft.jtitle=Cogent+engineering&rft.au=Samanth%2C+Snehal&rft.au=K+V%2C+Prema&rft.au=Balachandra%2C+Mamatha&rft.date=2022-12-31&rft.pub=Cogent&rft.eissn=2331-1916&rft.volume=9&rft.issue=1&rft_id=info:doi/10.1080%2F23311916.2022.2029080&rft.externalDBID=0YH&rft.externalDocID=2029080 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2331-1916&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2331-1916&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2331-1916&client=summon |