Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (57)
  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks

    Jaime Ortiz Córdoba, Alejandro Molina Zarca*, Antonio Skármeta

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2307-2333, 2023, DOI:10.32604/iasc.2023.039607

    Abstract 5G/Beyond 5G (B5G) networks provide connectivity to many heterogeneous devices, raising significant security and operational issues and making traditional infrastructure management increasingly complex. In this regard, new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures, especially regarding policy-based security, abstraction, flexibility, and extensibility. This paper presents the design, workflow, and implementation of a security solution based on Unmanned Aerial Vehicles (UAVs), able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas. The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic… More >

  • Open Access

    ARTICLE

    Submarine Hunter: Efficient and Secure Multi-Type Unmanned Vehicles

    Halah Hasan Mahmoud1, Marwan Kadhim Mohammed Al-Shammari1, Gehad Abdullah Amran2,3,*, Elsayed Tag eldin4,*, Ala R. Alareqi5, Nivin A. Ghamry6, Ehaa ALnajjar7, Esmail Almosharea8

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 573-589, 2023, DOI:10.32604/cmc.2023.039363

    Abstract Utilizing artificial intelligence (AI) to protect smart coastal cities has become a novel vision for scientific and industrial institutions. One of these AI technologies is using efficient and secure multi-environment Unmanned Vehicles (UVs) for anti-submarine attacks. This study’s contribution is the early detection of a submarine assault employing hybrid environment UVs that are controlled using swarm optimization and secure the information in between UVs using a decentralized cybersecurity strategy. The Dragonfly Algorithm is used for the orientation and clustering of the UVs in the optimization approach, and the Re-fragmentation strategy is used in the Network layer of the TCP/IP protocol… More >

  • Open Access

    ARTICLE

    Coati Optimization-Based Energy Efficient Routing Protocol for Unmanned Aerial Vehicle Communication

    Hanan Abdullah Mengash1, Hamed Alqahtani2, Mohammed Maray3, Mohamed K. Nour4, Radwa Marzouk1, Mohammed Abdullah Al-Hagery5, Heba Mohsen6, Mesfer Al Duhayyim7,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4805-4820, 2023, DOI:10.32604/cmc.2023.037810

    Abstract With the flexible deployment and high mobility of Unmanned Aerial Vehicles (UAVs) in an open environment, they have generated considerable attention in military and civil applications intending to enable ubiquitous connectivity and foster agile communications. The difficulty stems from features other than mobile ad-hoc network (MANET), namely aerial mobility in three-dimensional space and often changing topology. In the UAV network, a single node serves as a forwarding, transmitting, and receiving node at the same time. Typically, the communication path is multi-hop, and routing significantly affects the network’s performance. A lot of effort should be invested in performance analysis for selecting… More >

  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Toward Optimal Periodic Crowd Tracking via Unmanned Aerial Vehicle

    Khalil Chebil1,2, Skander Htiouech3, Mahdi Khemakhem1,2,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 233-263, 2023, DOI:10.32604/cmes.2023.026476

    Abstract Crowd management and analysis (CMA) systems have gained a lot of interest in the vulgarization of unmanned aerial vehicles (UAVs) use. Crowd tracking using UAVs is among the most important services provided by a CMA. In this paper, we studied the periodic crowd-tracking (PCT) problem. It consists in using UAVs to follow-up crowds, during the life-cycle of an open crowded area (OCA). Two criteria were considered for this purpose. The first is related to the CMA initial investment, while the second is to guarantee the quality of service (QoS). The existing works focus on very specified assumptions that are highly… More >

  • Open Access

    ARTICLE

    Optimization of Resource Allocation in Unmanned Aerial Vehicles Based on Swarm Intelligence Algorithms

    Siling Feng1, Yinjie Chen1, Mengxing Huang1,2,*, Feng Shu1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4341-4355, 2023, DOI:10.32604/cmc.2023.037154

    Abstract Due to their adaptability, Unmanned Aerial Vehicles (UAVs) play an essential role in the Internet of Things (IoT). Using wireless power transfer (WPT) techniques, an UAV can be supplied with energy while in flight, thereby extending the lifetime of this energy-constrained device. This paper investigates the optimization of resource allocation in light of the fact that power transfer and data transmission cannot be performed simultaneously. In this paper, we propose an optimization strategy for the resource allocation of UAVs in sensor communication networks. It is a practical solution to the problem of marine sensor networks that are located far from… More >

  • Open Access

    REVIEW

    Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications

    Saifur Rahman Sabuj1, Mohammad Saadman Alam2, Majumder Haider2, Md Akbar Hossain3, Al-Sakib Khan Pathan4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1053-1089, 2023, DOI:10.32604/cmes.2023.024078

    Abstract This paper discusses the significance and prospects of low altitude small satellite aerial vehicles to ensure smooth aerial-ground communications for next-generation broadband networks. To achieve the generic goals of fifthgeneration and beyond wireless networks, the existing aerial network architecture needs to be revisited. The detailed architecture of low altitude aerial networks and the challenges in resource management have been illustrated in this paper. Moreover, we have studied the coordination between promising communication technologies and low altitude aerial networks to provide robust network coverage. We talk about the techniques that can ensure userfriendly control and monitoring of the low altitude aerial… More > Graphic Abstract

    Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications

  • Open Access

    ARTICLE

    Received Power Based Unmanned Aerial Vehicles (UAVs) Jamming Detection and Nodes Classification Using Machine Learning

    Waleed Aldosari*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1253-1269, 2023, DOI:10.32604/cmc.2023.036111

    Abstract This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks on Wireless Sensor Networks (WSNs). Jamming is a type of Denial of Service (DoS) attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly. To defend and prevent such attacks, the first step is to detect them. The current detection approaches use centralized techniques to detect jamming, where each node collects information and forwards it to the base station. As a result, overhead and communication costs… More >

  • Open Access

    ARTICLE

    Optimal Deep Learning Model Enabled Secure UAV Classification for Industry 4.0

    Khalid A. Alissa1, Mohammed Maray2, Areej A. Malibari3, Sana Alazwari4, Hamed Alqahtani5, Mohamed K. Nour6, Marwa Obbaya7, Mohamed A. Shamseldin8, Mesfer Al Duhayyim9,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5349-5367, 2023, DOI:10.32604/cmc.2023.033532

    Abstract Emerging technologies such as edge computing, Internet of Things (IoT), 5G networks, big data, Artificial Intelligence (AI), and Unmanned Aerial Vehicles (UAVs) empower, Industry 4.0, with a progressive production methodology that shows attention to the interaction between machine and human beings. In the literature, various authors have focused on resolving security problems in UAV communication to provide safety for vital applications. The current research article presents a Circle Search Optimization with Deep Learning Enabled Secure UAV Classification (CSODL-SUAVC) model for Industry 4.0 environment. The suggested CSODL-SUAVC methodology is aimed at accomplishing two core objectives such as secure communication via image… More >

  • Open Access

    ARTICLE

    3D Path Optimisation of Unmanned Aerial Vehicles Using Q Learning-Controlled GWO-AOA

    K. Sreelakshmy1, Himanshu Gupta1, Om Prakash Verma1, Kapil Kumar2, Abdelhamied A. Ateya3, Naglaa F. Soliman4,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2483-2503, 2023, DOI:10.32604/csse.2023.032737

    Abstract Unmanned Aerial Vehicles (UAVs) or drones introduced for military applications are gaining popularity in several other fields as well such as security and surveillance, due to their ability to perform repetitive and tedious tasks in hazardous environments. Their increased demand created the requirement for enabling the UAVs to traverse independently through the Three Dimensional (3D) flight environment consisting of various obstacles which have been efficiently addressed by metaheuristics in past literature. However, not a single optimization algorithms can solve all kind of optimization problem effectively. Therefore, there is dire need to integrate metaheuristic for general acceptability. To address this issue,… More >

Displaying 21-30 on page 3 of 57. Per Page