Dahiya, 2023 - Google Patents
Internet of Drone Things: A New Age InventionDahiya, 2023
- Document ID
- 3561901241776320287
- Author
- Dahiya P
- Publication year
- Publication venue
- Machine Intelligence, Big Data Analytics, and IoT in Image Processing: Practical Applications
External Links
Snippet
Summary The Internet of Drones (IoD) has attracted the major commercial sector by its technological advancements and utility functions and capabilities. It is a layered network that is designed mainly for unnamed aerial vehicles, which are used in a controlled airspace. It …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kang et al. | Protect your sky: A survey of counter unmanned aerial vehicle systems | |
Laghari et al. | Unmanned aerial vehicles: A review | |
Zhi et al. | Security and privacy issues of UAV: A survey | |
Alladi et al. | Applications of blockchain in unmanned aerial vehicles: A review | |
Yaacoub et al. | Security analysis of drones systems: Attacks, limitations, and recommendations | |
Ding et al. | An amateur drone surveillance system based on the cognitive Internet of Things | |
Akram et al. | Security, privacy and safety evaluation of dynamic and static fleets of drones | |
Derhab et al. | Internet of drones security: Taxonomies, open issues, and future directions | |
Omolara et al. | Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey | |
Majeed et al. | Drone security: Issues and challenges | |
US11521128B2 (en) | Threat assessment of unmanned aerial systems using machine learning | |
Rolly et al. | Unmanned aerial vehicles: Applications, techniques, and challenges as aerial base stations | |
Pigatto et al. | The internet of flying things | |
Katalin | Possibilities and security challenges of using IoT for military purposes | |
Tan et al. | System analysis of counter-unmanned aerial systems kill chain in an operational environment | |
Butt et al. | The deployment of autonomous drones during the COVID-19 pandemic | |
Alam et al. | Smart cities and the internet of drones | |
Sindiramutty et al. | Data Security and Privacy Concerns in Drone Operations | |
Krichen et al. | Unmanned aerial vehicles communications security challenges: A survey | |
Lee et al. | A systems analysis of energy usage and effectiveness of a counter-unmanned aerial system using a cyber-attack approach | |
Raj et al. | Leveraging Precision Agriculture Techniques using UAVs and Emerging Disruptive Technologies | |
Best et al. | How to analyze the cyber threat from drones | |
Dahiya | Internet of Drone Things: A New Age Invention | |
Kumar et al. | Security Analysis of UAV Communication Protocols: Solutions, Prospects, and Encounters | |
Laraib et al. | Addresses the Security Issues and Safety in Cyber-Physical Systems of Drones |