Abstract
The use of unmanned aerial vehicles or drones are a valuable technique in coping with issues related to life in the general public’s daily routines. Given the growing number of drones in low-altitude airspace, linking drones to form the Internet of drones (IoD) is a highly desirable trend to improve the safety as well as the quality of flight. However, there remain security, privacy, and communication issues related to IoD. In this paper, we discuss the key requirements of security, privacy, and communication and we present a taxonomy of IoD based on the most relevant considerations. Furthermore, we present the most commonly used commercial case studies and address the latest advancements and solutions proposed for the IoD environments. Lastly, we discuss the challenges and future research directions of IoD.
Highlights
The Internet of drones (IoD) can be described as an infrastructure designed to provide control and access over the Internet between drones and users
The key advantage of a unmanned aerial vehicles (UAVs) with fixed wings compared to a UAV with rotary wings is that a less complex repair and maintenance process is required by simple structure, thereby giving the consumer more operating time at a reduced cost
Researchers have created several security and privacy approaches to secure the Internet of drones (IoD) network to protect the location of unmanned aerial vehicles (UAVs) and the privacy and security problems that come with using the IoD network
Summary
The Internet of drones (IoD) can be described as an infrastructure designed to provide control and access over the Internet between drones and users. To facilitate personal and business drones for independent flight, a cer-a certain of authentication key exchange protocols are required between the entwo tain typetype of authentication and and key exchange protocols are required between the two entities in the. Both entities create symmetricsecurity securitykey keyfor forfuture futuredata data tities in the sky.sky. This includes data required by the user’s cellular equipment that control signals and sigGPS equipment. This includes data required by the user’s cellular equipment that control signals This is an example of an interception of information giving enemies the ability nals and GPS signals. Discuss the IoD open challenges and prospective study directions (Section 7)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have