Many dependable systems rely implicitly on the integrity of the positions of their components. For example, let us consider a sensor network for pollution monitoring: it is sufficient that a hostile actor physically moves some sensors to completely disrupt the monitoring. In such scenarios, a key question is: how to securely verify the positions of devices? To answer this question, researchers proposed several solutions. However, these generally require several fixed stations (anchors) with trusted positions. In this paper, we explore the possibility to use the emerging drone technology in order to overcome the limitation of using several fixed anchors. In particular, our approach is to replace all the fixed anchors with a single drone that...
So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial...
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military app...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...
Many dependable systems rely implicitly on the integrity of the positions of their components. For e...
Many dependable systems rely on the integrity of the position of their components. In such systems, ...
The capability to verify positions reported by devices is called secure location verification. The m...
In this paper, we study the sensor localization problem using a drone. Our goal is to localize each ...
A path planning algorithm for drone swarms is presented. From the outset, none of the drones knows t...
The widespread use of quadcopters as unmanned aerial ve- hicles (UAVs) provides a number of applicat...
In this paper, we study a sensor localization technique that replaces fixed anchors with a drone equ...
UAVs (Unmanned Aerial Vehicles) are nowadays being used more and more in Structural Health Monitorin...
Emerging surveillance applications of UAV teams rely on secure communication to exchange information...
Due to the frequent unauthorized access by commercial drones to Critical Infrastructures (CIs) such ...
The Teal Group estimated worldwide drone expenditure in 2013 to be $5.2 billion. Since then, worldwi...
Robots are swiftly developing from manufacturing unit workhouses to robot companions. They are used ...
So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial...
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military app...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...
Many dependable systems rely implicitly on the integrity of the positions of their components. For e...
Many dependable systems rely on the integrity of the position of their components. In such systems, ...
The capability to verify positions reported by devices is called secure location verification. The m...
In this paper, we study the sensor localization problem using a drone. Our goal is to localize each ...
A path planning algorithm for drone swarms is presented. From the outset, none of the drones knows t...
The widespread use of quadcopters as unmanned aerial ve- hicles (UAVs) provides a number of applicat...
In this paper, we study a sensor localization technique that replaces fixed anchors with a drone equ...
UAVs (Unmanned Aerial Vehicles) are nowadays being used more and more in Structural Health Monitorin...
Emerging surveillance applications of UAV teams rely on secure communication to exchange information...
Due to the frequent unauthorized access by commercial drones to Critical Infrastructures (CIs) such ...
The Teal Group estimated worldwide drone expenditure in 2013 to be $5.2 billion. Since then, worldwi...
Robots are swiftly developing from manufacturing unit workhouses to robot companions. They are used ...
So far, the problem of positioning in wireless networks has been mainly studied in a non-adversarial...
Unmanned aerial vehicle (UAV) is becoming increasingly important in modern civilian and military app...
Security provisioning for low-complex and constrained devices in the Internet of Things (IoT) is exa...