Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Aug 29, 2017 · In this paper, we introduce a low-cost approach based on a swarm of UAVs and a common radio frequency protocol, e.g., WiFi. By experimental ...
ABSTRACT. The capability to verify positions reported by devices is called secure location verification. The majority of the proposed.
The capability to verify positions reported by devices is called secure location verification. The majority of the proposed solutions entail the use of many ...
In this paper, we introduce a low-cost approach based on a swarm of UAVs and a common radio frequency protocol, e.g., WiFi. By experimental simulations, we show ...
People also ask
Bibliographic details on A Low-Cost UAV-Based Secure Location Verification Method.
VerifierBee is presented: a path planning algorithm that allows a drone to perform a secure location verification of a set of devices and respects aSet of ...
Mar 21, 2024 · To preserve the privacy of UAVs, anonymous certificates and zero-knowledge proof are used. The security of the proposed scheme is analyzed.
knowledge about secure location verification techniques as well as MDToA are not required. ... A Low-Cost UAV-Based Secure Location Verification Method. In ...
Nov 28, 2023 · To sum up, the framework can help organizations and authorities to detect and identify unauthorized WiFi based UAVs and take necessary actions ...
In this paper, we propose a location verification (LV) protocol as a security solution for autonomous and intelligent moving devices such as drones and robots ...