The modern warfare scenario has immense challenges that can risk personnel's lives, highlighting the need for data acquisition to win a military operation successfully. In this context, unmanned aerial vehicles (UAVs) play a significant role by covertly acquiring reconnaissance data from an enemy location to make the friendly troops aware. The acquired data is mission-critical and needs to be secured from the intruders, which can implicitly manipulate it for their benefit. Moreover, UAVs collect a large amount of data, including high-definition images and surveillance videos; handling such a massive amount of data is a bottleneck on traditional communication networks. To mitigate these issues, this article proposes a blockchain and machine ...
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. H...
While 5G can provide high-speed Internet connectivity and over-the-horizon control for Unmanned Aeri...
Verification of the geographic location of a moving device is vital. This verification is important ...
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective a...
With the exponential growth in the number of vital infrastructures such as nuclear plants and transp...
UAVs have numerous emerging applications in various domains of life. However, it is extremely challe...
Softwarized Unmanned Aerial Vehicles (UAVs) use network programmability concept of Software-Defined ...
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructur...
Unmanned Aerial Vehicles (UAVs) are widely deployed in military surveillance operations, especially ...
Drone security is currently a major topic of discussion among researchers and industrialists. Althou...
This thesis explores the use of blockchains along with the Internet Protocol version 6 (IPv6) data p...
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, ...
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A sw...
Advances in technology have enabled the increased use of autonomous systems such as unmanned aerial ...
This paper demonstrates a broad exploration of existing authentication and secure communication of u...
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. H...
While 5G can provide high-speed Internet connectivity and over-the-horizon control for Unmanned Aeri...
Verification of the geographic location of a moving device is vital. This verification is important ...
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-effective a...
With the exponential growth in the number of vital infrastructures such as nuclear plants and transp...
UAVs have numerous emerging applications in various domains of life. However, it is extremely challe...
Softwarized Unmanned Aerial Vehicles (UAVs) use network programmability concept of Software-Defined ...
Unmanned aerial vehicles (UAVs) can support surveillance even in areas without network infrastructur...
Unmanned Aerial Vehicles (UAVs) are widely deployed in military surveillance operations, especially ...
Drone security is currently a major topic of discussion among researchers and industrialists. Althou...
This thesis explores the use of blockchains along with the Internet Protocol version 6 (IPv6) data p...
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G) networks, ...
Today, intelligent drone technology is rapidly expanding, particularly in the defense industry. A sw...
Advances in technology have enabled the increased use of autonomous systems such as unmanned aerial ...
This paper demonstrates a broad exploration of existing authentication and secure communication of u...
Unmanned aerial systems (UAVs) are dramatically evolving and promoting several civil applications. H...
While 5G can provide high-speed Internet connectivity and over-the-horizon control for Unmanned Aeri...
Verification of the geographic location of a moving device is vital. This verification is important ...