scholarly journals Qualitative and Quantitative Risk Analysis and Safety Assessment of Unmanned Aerial Vehicles Missions Over the Internet

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 53392-53410 ◽  
Author(s):  
Azza Allouch ◽  
Anis Koubaa ◽  
Mohamed Khalgui ◽  
Tarek Abbes
2020 ◽  
Vol 20 (13) ◽  
pp. 7460-7471 ◽  
Author(s):  
Mohammad Javad Sobouti ◽  
Zahra Rahimi ◽  
Amir Hossein Mohajerzadeh ◽  
Seyed Amin Hosseini Seno ◽  
Reza Ghanbari ◽  
...  

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5586
Author(s):  
Shreya Khisa ◽  
Sangman Moh

The Internet of Things (IoT), which consists of a large number of small low-cost devices, has become a leading solution for smart cities, smart agriculture, smart buildings, smart grids, e-healthcare, etc. Integrating unmanned aerial vehicles (UAVs) with IoT can result in an airborne UAV-based IoT (UIoT) system and facilitate various value-added services from sky to ground. In addition to wireless sensors, various kinds of IoT devices are connected in UIoT, making the network more heterogeneous. In a UIoT system, for achieving high throughput in an energy-efficient manner, it is crucial to design an efficient medium access control (MAC) protocol because the MAC layer is responsible for coordinating access among the IoT devices in the shared wireless medium. Thus, various MAC protocols with different objectives have been reported for UIoT. However, to the best of the authors’ knowledge, no survey had been performed so far that dedicatedly covers MAC protocols for UIoT. Hence, in this study, state-of-the-art MAC protocols for UIoT are investigated. First, the communication architecture and important design considerations of MAC protocols for UIoT are examined. Subsequently, different MAC protocols for UIoT are classified, reviewed, and discussed with regard to the main ideas, innovative features, advantages, limitations, application domains, and potential future improvements. The reviewed MAC protocols are qualitatively compared with regard to various operational characteristics and system parameters. Additionally, important open research issues and challenges with recommended solutions are summarized and discussed.


2021 ◽  
Vol 5 (2) ◽  
pp. 197-208
Author(s):  
Nurhattati Nurhattati ◽  
Rihlah Nuraulia ◽  
Faisal M. Jasin ◽  
Santi Anugrahsari

This study aims to analyze the empowerment of students through the Internet Of Think-based E-Farming, which was conducted at the Ittifaq eco-Islamic boarding school in Bandung. The methodology in this study uses qualitative methods. Through a qualitative approach, several things were found; first, ittifaq Islamic boarding school Bandung, is a role model for empowering e-Farming students based on the Internet Of Think (IoT); second, empowerment of students is carried out through the steps of the empowerment process, starting with collecting state data, analyzing state data, identifying problems, selecting problems to solve. Solved, and formulation the objectives of the Ittifaq eco-Islamic boarding school problem. The empowerment of E-Farming students based on the Internet Of Think is carried out through three stages of empowerment: training programs, collaboration, and groups. Third, the Internet Of Think-based santri E-farming empowerment model carried out by the Ittifaq Islamic boarding school including using the precision farming model, the use of unmanned aerial vehicles (UAV), and Smart GreenHouse.


2018 ◽  
Vol 7 (3.13) ◽  
pp. 183 ◽  
Author(s):  
Vishal Sharma ◽  
Dushantha Nalin K. Jayakody ◽  
Kathiravan Srinivasan ◽  
Ravinder Kumar

Unmanned Aerial Vehicles (UAVs) have grasped an important role in the modern day networking. A lot of applications are being developed using aerial vehicles as a pivot. These vehicles provide a vast range of support to modern day networks. Modern computing applications such as Urban Computing, Internet of Things, Ubiquitous Computing, and the Internet for All have sought applications of UAVs to attain complex tasks. However, securing aerial vehicles in a network is not an easy task because of the difference in communication standards and range of applicability. Aerial nodes are prone to various types of attack in a network such as Sybil attack, wormhole attack, sinkhole attack, or impersonation attack. These attacks lead to a large number of vulnerabilities causing fatal incidents. A new attack is introduced in this paper termed as "Coagulation Attack". This term is derived from the clotting properties of fluids. This paper introduces the concept, issues, challenges, and research aspects of coagulation attack. A simulation study is also presented that shows the impact of such attacks over networked UAVs.   


Sign in / Sign up

Export Citation Format

Share Document