检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:陈世康[1] 周冰[1] 曹宝[1] 何远杭[1] CHEN Shikang;ZHOU Bing;CAO Bao;HE Yuanhang(No.30 Institute of CETC,Chengdu Sichuan 610041,China)
机构地区:[1]中国电子科技集团公司第三十研究所,四川成都610041
出 处:《通信技术》2024年第3期213-221,共9页Communications Technology
基 金:国家自然科学基金(重点):边缘低资源条件下的智能物联网安全事件信息推理与溯源(U21B2019)。
摘 要:随着新技术的快速发展,无人机(Unmanned Aerial Vehicle,UAV)在民事及军事活动中的应用越来越广泛。尽管无人机具有实用性优势,但是由于其无线信道的广播特性,导致其通信易受监听、篡改,甚至可能被劫持,无人机面临的这些安全性问题亟待解决。为了克服这些安全威胁,研究人员一直致力于安全通信协议的研究,以保护无人机,使其免受攻击者的攻击。无人机是资源受限的空中平台,因此研究轻量级、实时性强、安全性高的通信协议,分析其漏洞和弱点变得至关重要。探索了适用于无人机通信的安全协议技术体制,为未来各场景中无人机安全协议设计及工程实践提供有意义的借鉴。With the rapid development of new technologies,UAVs(Unmanned Aerial Vehicles)are becoming more widely used in civil and military activities.Despite the practical advantages of UAVs,the security issues faced by UAVs need to be urgently addressed due to the broadcast features of wireless channels,which make their communications vulnerable to eavesdropping,tampering,and possibly even hijacking.In order to overcome these security threats,researchers have been studying secure communication protocols to protect UAVs from attacks.UAVs are resource-constrained airborne platforms,so it becomes crucial to study lightweight,real-time and secure communication protocols and analyze their vulnerabilities and weaknesses.This paper explores the technical regime of security protocols applicable to UAV communication,which provides meaningful reference for the design and engineering practice of UAV security protocols in various application scenarios in the future.
分 类 号:TN918.91[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.200