Computer Science ›› 2022, Vol. 49 ›› Issue (3): 322-328.doi: 10.11896/jsjkx.210200022
• Information Security • Previous Articles Next Articles
ZHAO Geng1,2, SONG Xin-yu1,2, MA Ying-jie2
CLC Number:
[1]HE D J,DU X,QIAO Y R,et al.A survey on cyber security of unmanned aerial vehicles [J].Chinese Journal of Computers,2019,42(5):1076-1094. [2]HARTMANN K,STEUP C.The vulnerability of UAVs to cy-ber attacks-An approach to the risk assessment[C]//2013 5th International Conference on Cyber Conflict (CYCON 2013).IEEE,2013:1-23. [3]MANSFIELD K,EVELEIGH T,HOLZERT H,et al.Un-manned aerial vehicle smart device ground control station cyber security threat model[C]//2013 IEEE International Conference on Technologies for Homeland Security (HST).IEEE,2013:722-728. [4]KERNS A J,SHEPARD D P,BHATTI J A,et al.Unmannedaircraft capture and control via GPS spoofing[J].Journal of Field Robotics,2014,31(4):617-636. [5]KOPEIKIN A,PONDA S S,JOHNSON L B,et al.Multi-uavnetwork control through dynamic task allocation:Ensuring data-rate and bit-error-rate support[C]//2012 IEEE Globecom Workshops.IEEE,2012:1579-1584. [6]KHUWAJA A A,CHEN Y,ZHAO N,et al.A survey of channel modeling for UAV communications [J].IEEE Communications Surveys & Tutorials,2018,20(4):2804-2821. [7]DJORDJEVIC I B.OFDM for wireless and optical communications [C]//Advanced Optical and Wireless Communications Systems.Springer,2018:495-573. [8]CONG W,LI H.OFDM-based UAV communication link[C]//2006 China UAV Conference.Chinese Society of Aeronautics and Astro,2006. [9]ZHAO H,ZHANG J,ZHOU J.The application of OFDM inUAV telemetry [J].Lecture Notes in Electrical Engineering,2013,187:89-97. [10]ZOU C H,LIU G W.Simulation and research of OFDM technique in UAV communication [J].Journal of System Simulation,2007(10):2293-2295,2327. [11]TAN X,SU S,GUO X,et al.Application of MIMO-OFDM technology in UAV communication network [C]//2020 2nd World Symposium on Artificial Intelligence (WSAI).IEEE,2020:1-4. [12]DONG W L,LI Y G,TONG X T.Channel coding based onOFDM high speed no performance simulation computer in data link system [J].Electronic Test,2013(22):83-87. [13]WEI Y,LI B.Application of OFDM technology in UAV communication [J].Modern Computer,2020(23):35-37. [14]FAN L H.Analysis on the principle and application of OFDM mobile communication technology [J].Wireless Internet Technology,2019,16(3):5-6. [15]NERMA M.A review of the transformation techniques in the OFDM system [J].Journal of Engineering Science and Techno-logy,2021,16(1):176-193. [16]CHEN S C.Advances in application research of modern information security and chaotic secure communication [J].Information Recording Materials,2018,19(9):2-4. [17]YU Y D,WANG Y C,WANG C L.Application research ofchaotic spread spectrum communication in UAV data link [J].Aerodynamic Missile Journal,2016(9):62-64. [18]FU M,RU L.Application of dual chaotic direct sequence spread spectrum technology in UAV telemetry tracking and control link [J].Transducer and Microsystem Technologies,2013(6):155-157. [19]ALI T S,ALI R.A novel medical image signcryption schemeusing tent-logistic-tent system and Henon chaotic map [J].IEEE Access,2020,8:71974-71992. [20]HU Z X.Design and implementation of the physical layer ofUAV high-speed communication link [D].Chengdu:University of Electronic Science and Technology of China,2017. [21]WANG Y,ZHANG X Z,ZENG J,et al.Secure OFDM transmission scheme based on two-stage chaos mapping[J].Journal on Communications,2016,37(7):132-139. |
[1] | ZHANG Heng-wei, HAN Ji-hong, WEI Bo and WANG Jin-dong. Research on Cloud Resource Scheduling Method Based on Map-Reduce [J]. Computer Science, 2015, 42(8): 118-123. |
|