Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by
Tsourdos, Antonios
, Sen, Muhammet A.
, Al-Rubaye, Saba
in
Analysis
/ authentication protocol
/ Authentication protocols
/ Cloning
/ Communication channels
/ Confidentiality
/ Cryptography
/ Drone aircraft
/ Embedded systems
/ Ground stations
/ Internet of Things
/ physical unclonable function
/ Protocol
/ Public Key Infrastructure
/ Security management
/ Telecommunication systems
/ Unmanned aerial vehicles
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by
Tsourdos, Antonios
, Sen, Muhammet A.
, Al-Rubaye, Saba
in
Analysis
/ authentication protocol
/ Authentication protocols
/ Cloning
/ Communication channels
/ Confidentiality
/ Cryptography
/ Drone aircraft
/ Embedded systems
/ Ground stations
/ Internet of Things
/ physical unclonable function
/ Protocol
/ Public Key Infrastructure
/ Security management
/ Telecommunication systems
/ Unmanned aerial vehicles
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
by
Tsourdos, Antonios
, Sen, Muhammet A.
, Al-Rubaye, Saba
in
Analysis
/ authentication protocol
/ Authentication protocols
/ Cloning
/ Communication channels
/ Confidentiality
/ Cryptography
/ Drone aircraft
/ Embedded systems
/ Ground stations
/ Internet of Things
/ physical unclonable function
/ Protocol
/ Public Key Infrastructure
/ Security management
/ Telecommunication systems
/ Unmanned aerial vehicles
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
Journal Article
Securing UAV Flying Ad Hoc Wireless Networks: Authentication Development for Robust Communications
2025
Request Book From Autostore
and Choose the Collection Method
Overview
Unmanned Aerial Vehicles (UAVs) have revolutionized numerous domains by introducing exceptional capabilities and efficiencies. As UAVs become increasingly integrated into critical operations, ensuring the security of their communication channels emerges as a paramount concern. This paper investigates the importance of safeguarding UAV communication against cyber threats, considering both intra-UAV and UAV–ground station interactions in the scope of the Flying Ad Hoc Networks (FANETs). To leverage the advancements in security methodologies, particularly focusing on Physical Unclonable Functions (PUFs), this paper proposes a novel authentication framework tailored for UAV networking systems. Investigating the existing literature, we categorize related studies into authentication strategies, illuminating the evolving landscape of UAV security. The proposed framework demonstrated a high level of security with lower communication and computation costs in comparison with selected studies with similar types of attacks. This paper highlights the urgent need for strong security measures to mitigate the increasing threats that UAVs encounter and ensure their sustained effectiveness in a variety of applications. The results indicate that the proposed protocol is sufficiently secure and, in terms of communication cost, achieves an 18% improvement compared to the best protocol in the referenced studies.
Publisher
MDPI AG,MDPI
Subject
This website uses cookies to ensure you get the best experience on our website.