Investigating Patterns of UAV Attacks for Building Secure UAV Network.
Ishu SharmaKeshav KaushikGunjan ChhabraPublished in: IC3I (2023)
Keyphrases
- traffic analysis
- unmanned aerial vehicles
- security threats
- vision based navigation
- security measures
- security protocols
- path planning
- countermeasures
- security mechanisms
- network anomaly detection
- stream cipher
- control algorithm
- network structure
- denial of service attacks
- dynamic environments
- network attacks
- peer to peer
- cryptographic protocols
- computer networks
- wireless sensor networks
- security risks
- security architecture
- security issues
- network intrusion
- network security
- application level
- complex networks
- security flaws
- intrusion detection and prevention
- chosen plaintext