Filters








30 Hits in 3.6 sec

Avoiding collisions at any (low) cost: ADS-B like position broadcast for UAVs [article]

Franco Minucci, Evgenii Vinogradov, Sofie Pollin
2020 arXiv   pre-print
Our conclusions are that even on the simplest Wi-Fi chipsets, our protocol can be implemented to achieve a realistic location broadcast solution that still perfectly mimics simulation and analytical results  ...  The main challenges for Wi-Fi are (a) the multi-channel nature of the technology makes transmitter and receiver coordination difficult, and (b) standard chipsets are not designed for frequent broadcast  ...  In our previous work [18] , we investigated multiple strategies to exploit the Wi-Fi hardware for location broadcasting.  ... 
arXiv:2003.13499v2 fatcat:srasmtpxgzd6jjjtcrx66xbtc4

Avoiding collisions at any (low) cost: ADS-B like position broadcast for UAVs

Franco Minucci, Evgenii Vinogradov, Sofie Pollin
2020 IEEE Access  
Our conclusions are that, even on the simplest Wi-Fi chipsets, our protocol can be implemented to achieve a realistic location broadcast solution that still perfectly mimics simulation and analytical results  ...  The main challenges for Wi-Fi are (a) the multichannel nature of the technology makes transmitter and receiver coordination difficult, and (b) standard chipsets are not designed for frequent broadcast  ...  In our previous work [29] , we investigated multiple strategies to exploit the Wi-Fi hardware for location broadcasting.  ... 
doi:10.1109/access.2020.3007315 fatcat:n4qitucfnfdjtao4aoxx7zju5u

Wireless communication for safe UAVs: From Long-Range Deconfliction to short-range collision avoidance [article]

Evgenii Vinogradov, Franco Minucci, Sofie Pollin
2019 arXiv   pre-print
Finally, we present measurement results indicating that our new Wi-Fi-based messaging scheme is a potentially useful tool for the drone traffic management system.  ...  However, embedding the coordinates and drone ID in Wi-Fi Service Set Identifier (SSID) allows to broadcast this critical data in an ADS-B like manner, as it was shown in [14] .  ...  Wi-Fi Distance-based definition (urban) Wi-Fi, Bluetooth, URLLC Wi-Fi, URLLC  ... 
arXiv:1910.13744v1 fatcat:qfrttxjzlfaghekypmfx22bmfy

Design and Deployment of UAV-Aided Post-Disaster Emergency Network

Kirtan Gopal Panda, Shrayan Das, Debarati Sen, Wasim Arif
2019 IEEE Access  
In this paper, a UAV-assisted emergency Wi-Fi network is proposed to expedite the rescue operations by guiding the survivors to the nearest rescue camp location.  ...  Here, the Raspberry PI (RPI) development board, mounted on UAV is considered to form a Wi-Fi chain network over the disaster region.  ...  It registers a broadcast receiver for Wi-Fi direct, listens to Wi-Fi direct events, and displays available peers. In Fig. 4 , the screenshots of the designed application is shown.  ... 
doi:10.1109/access.2019.2931539 fatcat:a3fr27vowrffziuswgy5rmm35u

UAS Traffic Management Communications: The Legacy of ADS-B, New Establishment of Remote ID, or Leverage of ADS-B-Like Systems?

Neno Ruseno, Chung-Yan Lin, Shih-Cheng Chang
2022 Drones  
Unmanned aerial system (UAS) traffic management (UTM) requires each UAS to communicate with each other and to other stakeholders involved in the operation.  ...  In practice, there are two types of wireless communication systems established in the UAS community: automatic dependent surveillance broadcast (ADS-B) and remote identification (Remote ID).  ...  The first publication presented a method to broadcast short messages within the service set identifier (SSID) of a Wi-Fi network.  ... 
doi:10.3390/drones6030057 fatcat:lr34tuqsczaqhns75xhw5nx4x4

Drone Based Wireless Mesh Network for Disaster/Military Environment

Gudi Siva Leela Krishna Chand, Manhee Lee, Soo Young Shin
2018 Journal of Computer and Communications  
In this paper, we design a drone that can provide wireless infrastructure using high speed Wi-Fi.  ...  After reaching the target area, the drone can provide Wi-Fi using wireless mesh network and transmit the situation of local area through attached camera.  ...  It is possible to provide instant wireless communication infrastructure with high speed Wi-Fi.  ... 
doi:10.4236/jcc.2018.64004 fatcat:amyie47ve5adlkr24f2n4vdwem

Building up knowledge through passive WiFi probes

Alessandro E.C. Redondi, Matteo Cesana
2018 Computer Communications  
review here the main building blocks to develop a system based on passive WiFi monitors, that is, cheap and viable sniffers which collect data from end devices even without an explicit association to any Wi-Fi  ...  We provide an overview of the services which can be enabled by such approach with three practical scenarios: user localization, user profiling and device classification.  ...  is, the SSID of a Wi-Fi network to which the device associated at least once) N k, s .  ... 
doi:10.1016/j.comcom.2017.12.012 fatcat:oc4asxvuv5hsdnrmsph3dzpo6y

Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges [article]

Azade Fotouhi, Haoran Qiang, Ming Ding, Mahbub Hassan, Lorenzo Galati Giordano, Adrian Garcia-Rodriguez, Jinhong Yuan
2019 arXiv   pre-print
with the existing terrestrial base stations, (iii) the challenges and opportunities for assisting cellular communications with UAV-based flying relays and base stations, (iv) the ongoing prototyping and  ...  Indeed, the standardization bodies are currently exploring possibilities for serving commercial UAVs with cellular networks.  ...  Alternatively, a Wi-Fi access point (AP) could be hidden by disabling service set identifier (SSID) broadcasting and Wi-Fi UEs could be restricted to those with certain media access control (MAC) addresses  ... 
arXiv:1809.01752v2 fatcat:vrrkpv2s3jhw7itva64r5wpy4u

A Survey of Medium Access Control Protocols for Unmanned Aerial Vehicle (UAV) Networks

Jyoti Anon, Ranbir Singh Batth, Sahil Vashisht
2021 International Journal of Computer Networks And Applications  
Many different types of UAVs are being developed to meet the demands of diverse users. Therefore, the research areas in the UAV domain are evolving as the types and number of UAVs increase.  ...  Dey et al, [14] proposed a few countermeasures against Wi-Fi encryption (WPA), Telnet Secret, MAC, and Concealed Service Identifier attacks (SSID).  ...  Specifically, ad-hoc MAC wireless network Figure 4 4 Classification of Antenna antennas are less difficult for conventional Wi-Fi networks.  ... 
doi:10.22247/ijcna/2021/209191 fatcat:4he3rig43jfdxdralkzlr33acq

Unmaned Aerial Vehicles Threats and Defence Solutions

Ameer Hamza, Urooj Akram, Ali Samad, Saima Noreen Khosa, Rida Fatima, Muhammad Faheem Mushtaq
2020 2020 IEEE 23rd International Multitopic Conference (INMIC)  
Unmanned aerial vehicles likely know as drones have become the most optimistic solution with a bundle of applications in the field of monitoring environment, transportation, media live streaming, and military  ...  The autopilot UAV system is normally used in exigent operations to acquire critical information.  ...  One approach is using encryption. however, a Wi-Fi protracted access protocol is used for communication inefficient and secure approach.  ... 
doi:10.1109/inmic50486.2020.9318207 fatcat:wgw4eg5wsjfklmmgyreuszvpwi

IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDALONE COMMUNICATION SYSTEM FOR DISASTER SCENARIOS

Regin Cabacas, In-Ho Ra
2019 International Journal of Computer Networks & Communications  
Specifically, the study employed Raspberry Pi (RPi) devices as rapidly deployable relay nodes designed with a context-aware routing mechanism.  ...  Results show a high delivery probability, faster delivery time (low latency) and reduced message overhead when using the proposed approach compared with the other routing schemes.  ...  The two Wi-Fi interfaces are used to separate the connection (SSID) for the relay node connections and user connections.  ... 
doi:10.5121/ijcnc.2019.11301 fatcat:xfcqija365er7l6edjssziinsm

Wi-Fi and Bluetooth Contact Tracing Without User Intervention [article]

Brosnan Yuen, Yifeng Bie, Duncan Cairns, Geoffrey Harper, Jason Xu, Charles Chang, Xiaodai Dong, Tao Lu
2022 arXiv   pre-print
Unlike the systems above, we propose a new privacy preserving Wi-Fi and Bluetooth (BLE) contact tracing system that does not require smartphone applications, joining wireless networks, or custom user devices  ...  Moreover, we can track the absolute positions of user devices within 1.0 m due to using bidirectional long short-term memory neural networks that are trained with data pre-collected by an autonomous robot  ...  Location Method APs RMSE (m) MAE (m) Training Time (s) Testing Time (µs) EOW 3rd Floor BiLSTM+Wi-Fi FTM 8 0.80 0.57 4.59 360 EOW 3rd Floor BiLSTM+Wi-Fi RSSI 8 0.82 0.62 5.57 366 EOW 3rd Floor BiLSTM+Wi-Fi  ... 
arXiv:2204.07446v2 fatcat:nx3gmkxpajcn5pqjfaliej5kuy

Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification [article]

Omar M. Alhawi, Mustafa A. Mustafa, Lucas C. Cordeiro
2019 arXiv   pre-print
As a result, we demonstrate real cyber-threats with the possibility of exploiting further security vulnerabilities in real-world UAV software in the foreseeable future.  ...  The proliferation of Unmanned Aerial Vehicles (UAVs) embedded with vulnerable monolithic software has recently raised serious concerns about their security due to concurrency aspects and fragile communication  ...  Vulnerability Type UAV Model Tool Result Spoofing DJI Tello Wi-Fi transmitter Full Control Denial of service Full Control Spoofing Parrot bebop 2 Wi-Fi transmitter Full Control  ... 
arXiv:1906.11488v2 fatcat:uf3sd57t4raw5ki4e4k4f73ufy

Application Specific Drone Simulators: Recent Advances and Challenges

Aakif Mairaj, Asif I. Baba, Ahmad Y. Javaid
2019 Simulation modelling practice and theory  
Besides, UAV networks (UAVNets) are distinctive from other ad-hoc networks.  ...  Therefore, it is necessary to address these issues to ensure proper functioning of these UAVs while keeping their uniqueness in mind.  ...  ., Wi-Fi data in the drone is not always encrypted.  ... 
doi:10.1016/j.simpat.2019.01.004 fatcat:oy4rssrl5fagtixx5wrr747apm

Drone Forensics and Machine Learning: Sustaining the Investigation Process

Zubair Baig, Majid Ali Khan, Nazeeruddin Mohammad, Ghassen Ben Brahim
2022 Sustainability  
Drones are readily available for deployment in hard to access locations for delivery of critical medical supplies, for surveillance, for weather data collection and for home delivery of purchased goods  ...  The Mavic comprises four propellers, light sensors, GPS and Wi-Fi based communication. On-device memory includes 8 GB storage.  ...  Data can be acquired through both a USB connection and a Wi-Fi access point, which is established by the drone at booting time.  ... 
doi:10.3390/su14084861 fatcat:zmzkfh3rwvfqzmnf33oozcpjqy
« Previous Showing results 1 — 15 out of 30 results