Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 528-532.doi: 10.11896/jsjkx.201100199
• Information Security • Previous Articles Next Articles
WANG Yu-chen, QI Wen-hui, XU Li-zhen
CLC Number:
[1]LIU H F,SU J M,FU Y J.Summary of Research on Unmanned System Cluster and Its Countermeasure Technology[J].Flying Missile,2018(11):35-40,91. [2]GHAMRY K A,KAMEL M A,ZHANG Y.Multiple UAVs in forest fire fighting mission using particle swarm optimization[C]//2017 International Conference on Unmanned Aircraft Systems (ICUAS).IEEE,2017:1404-1409. [3]CHEN S J,ZHANG K,HE Y.High dynamic self-organizingdrone network architecture design and model research[J].Computer Science,2015,42(2):50-54. [4]JAVAID A Y,SUN W,DEVABHAKTUNI V K,et al.Cyber security threat analysis and modeling of an unmanned aerial vehicle system[C]//2012 IEEE Conference on Technologies for Homeland Security (HST).IEEE,2012:585-590. [5]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15. [6]DUAN H B,SHEN Y K,WANG Y,et al.Hot reviews in the field of drones in 2018[J].Science & Technology Review,2019,37(3):82-90. [7]DUAN H B,QIU H X,CHEN L,et al.Research Prospects of UAV Autonomous Cluster Technology[J].Science & Techno-logy Review,2018,36(21):90-98. [8]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Block-chain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Symposium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7. [9]RODDAY N M,SCHMIDT R O,PRAS A.Exploring security vulnerabilities of unmanned aerial vehicles[C]//NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium.IEEE,2016:993-994. [10]SEDJELMACI H,SENOUCI S M,ANSARI N.Intrusiondetection Andean framework againstlethaltacksin UAV-aided Networks:A Bayesiangame-theoretic metrology[J].IEEE Transformaton International Transportation Transportation Systems,2016(99):1-11. [11]YOON K,PARK D,YIM Y,et al.Security authentication system using encrypted channel on uav network[C]//2017 First IEEE International Conference on Robotic Computing (IRC).IEEE,2017:393-398. [12]GORENFLO C,LEE S,GOLAB L,et al.Fastfabric:Scaling hyperledger fabric to 20 000 transactions per second[C]//2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).IEEE,2019:455-463. [13]H CHAO,MAHESHWARI A,SUDARSANAN V,et al.UAV traffic information exchange network[OL].http://dx.doi.org/10.252018:14/6.2018-3347. [14]DORRI A,KANHERE S S,JURDAK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//2017 IEEE International Conference on Pervasive Computing and Communications Workshops.PerComWorkshops,2017:618-623. [15]LIANG X,ZHAO J,SHETTY S,et al.Towards data assurance and resilience in IoT using blockchain[C]//MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM).IEEE,2017:261-266. [16]BOZIC N,PUJOLLE G,SECCI S,A tutorial on blockchain and applications to secure network control-planes[C]//2016 3rd Smart Cloud Networks Systems.SCNS,2016:1-8. [17]VADLAMANI S,EKSIOGLU B,NANDI H M,et al.Jamming attacks on wireless networks:A taxonomic survey[J].Int.J.Prod.Econ.,2016(172):76-94. [18]ZHOU Y.Summary of UAV Ground Station Development[J].Aviation Electronics Technology,2010,41(1):1-6. [19]CAMPION M,RANGANATHAN P,FARUQUE S.UAVswarm communication and control architectures:a review[J].Journal of Unmanned Vehicle Systems,2018,7(2):93-106. [20]MCGOVERN S.Blockchain for Unmanned Aircraft Systems[R].John A.Volpe National Transportation Systems Center (US),2020. [21]JENSEN I J,SELVARAJ D F,RANGANATHAN P.Blockchain Technology for Networked Swarms of Unmanned Aerial Vehicles (UAVs)[C]//2019 IEEE 20th International Sympo-sium on A World of Wireless,Mobile and Multimedia Networks(WoWMoM).IEEE,2019:1-7. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[4] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[5] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[8] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[9] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[10] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[11] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[12] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[13] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[14] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[15] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
|