The employment of unmanned aerial vehicles, also known as UAVs, is expanding rapidly across various civil application areas. Some of these domains include real-time tracking, the provision of ...wireless coverage, sensing, searches and rescue, the delivery of goods, safety and surveillance, security, and safety checks of engineering structures. Smart UAVs represent the next technology revolution in UAV technology. They promise to provide new possibilities in various applications, notably lower risk and costs for civil infrastructure. The military has traditionally used unmanned aerial vehicles (UAVs) in countries such as the United Kingdom or the United States to partake in military and dangerous operations. The application and usage of these UAVs have become more commercial. Civilians can easily buy UAVs, commonly known as drones, from online platforms or shops. The main aim of this study is to review selected publications presenting previous efforts on using Civilian Drones in Safety applications. The study was accomplished using a systematic review research approach reviewing 45 publications. Drones have become more common, and it is crucial to understand how they work, especially since they entered the civilian domain. The research shows how civilian drones have been used in numerous safety applications, such as security cameras videotaping a house to ensure its safety.
The use of unmanned aerial vehicles (UAVs) has been rapidly increasing in both professional and recreational settings, leading to concerns about the safety and security of people and facilities. One ...area of research that has emerged in response to this concern is the development of detection systems for UAVs. However, many existing systems have limitations, such as detection failures or false detection of other aerial objects, including birds. To address this issue, the development of a standard dataset that provides images of both drones and birds is essential for training accurate and effective detection models. In this context, we present a dataset consisting of images of drones and birds operating in various environments. This dataset will serve as a valuable resource for researchers and developers working on UAV detection and classification systems. The dataset was created using Roboflow software, which enabled us to efficiently edit and manipulate the images using AI-assisted bounding boxes, polygons, and instance segmentation. The software supports a wide range of input and output formats, making it easy to import and export the dataset in different machine learning frameworks. To ensure the highest possible accuracy, we manually segmented each image from edge to edge, providing the YOLO model with detailed and accurate information for training. The dataset includes both training and testing sets, allowing for the evaluation of model performance and accuracy. Our dataset offers several advantages over existing datasets, including the inclusion of both drones and birds, which are commonly misclassified by detection systems. Additionally, the images in our dataset were collected in diverse environments, providing a wide range of scenarios for model training and testing. The presented dataset provides a valuable resource for researchers and developers working on UAV detection and classification systems. The inclusion of both drones and birds, as well as the diverse range of environments and scenarios, makes this dataset a unique and essential tool for training accurate and effective models. We hope that this dataset will contribute to the advancement of UAV detection and classification systems, improving safety and security in both professional and recreational settings.
The Internet of Drones (IoD) has become a hot research topic in academia, industry, and management in current years due to its wide potential applications, such as aerial photography, civilian, and ...military. This paper presents a comprehensive survey of IoD and its applications, deployments, and integration. We focused in this review on two main sides; IoD Applications include smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms; integration of IoD includes privacy protection, security authentication, neural network, blockchain, and optimization based-method. A discussion highlights the hot research topics and problems to help researchers interested in this area in their future works. The keywords that have been used in this paper are Internet of Drones.
Leveraging recent advances in autonomous flight capabilities of commercially available drone equipment, we report on the development of a modular solution for multi-drone control that implements the ...functionality required for planning, execution, and monitoring of procedural, multi-step missions with optional drone cooperation. The platform consists of loosely coupled components interacting via message brokers, which we evaluate through a pair of real-life experiments that emulate reference use-cases. We then look into the performance of drone-to-ground communications, with a particular focus on latency. We implement a dedicated, low-resource communications module with efficient serialization protocols and asynchronous message handling, to compare against the built-in message broker approach. Our data shows the importance of low-level prioritization of drone control requests and indicates that message broker approaches may not be suitable for drone swarms.
There has been a a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, in several applications. In many application scenarios, UAVs are ...deployed in missions where sensitive data is collected, such as monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to the sensitive and/or safety critical nature of the data collected in these applications, it is imperative to consider the security, and privacy aspects of the UAVs used in these scenarios. In this article, we propose an efficient privacy aware authenticated key agreement scheme for edge-assisted UAVs (Internet of Drones). Unlike the existing security solutions for UAVs, the proposed scheme does not need to store any secret keys in the devices but still can provide the desired security features. To the best of our knowledge, this is the first work where physical security of the UAV has been taken into account. The proposed system allows third-party communication, and mobile edge computing service providers to authenticate the UAVs without any loss of provacy, and outperforms existing methods in terms of computational complexity.
In the absence of effective and scalable human intervention, up to 95% of the world's ecosystems will be affected by anthropogenic degradation by 2050. Therefore, immediate and large‐scale ecological ...restoration is imperative to stem biodiversity loss and ecosystem decline. Ecologists must draw upon the most effective and efficient tools available to achieve successful restoration goals. Drones (i.e., unmanned aerial vehicles) are a valuable set of tools in the environmental, forestry, and agriculture sectors; however, there has been limited uptake in restoration ecology.
Here, we aim to highlight the existing and emerging uses of drones in restoration science and practice. We discuss the strengths and weaknesses of these applications and provide a roadmap for increasing the utilisation of drones to refine and enhance restoration objectives. Our article is presented with the restoration continuum in mind, including sections for restoration planning, implementation and monitoring. We also take a novel approach by describing how drones relate to a globally recognised restoration tool published by the Society for Ecological Restoration.
Drones are used in several restoration scenarios from mapping habitats and managing wildfires, to monitoring the effectiveness of restoration interventions. Many applications in other disciplines can also be transferred to restoration scenarios. However, the use of drones will be context‐dependent, and several technical and practical constraints need to be addressed.
Drones have considerable potential to improve the science and practice of restoration at all stages of a restoration project, which is vital to realising the goals of the UN Decade on Ecosystem Restoration.
Unmanned aerial vehicles (UAVs) are deployed in various mission-critical applications to collect sensitive data and disseminate it to the server placed on the ground station. Users mostly require ...real-time data from the drones, instead of the information stored by the server, in specific applications to perform timely actions. However, performing real-time communication with a drone through the public communication channel, which exposed to different security risks mandates an authenticated key exchange between users and drones in the Internet of Drones (IoD) networks for enabling users to communicate securely with the drone through the public communication infrastructure. This paper proffers a resource-efficient authentication scheme for the IoD networks, called REAS-IoD. The proposed REAS-IoD utilizes the lightweight hash function and authenticated encryption primitive, known as ACE to accomplish the AKE process securely. In REAS-IoD, a user's authentication is performed, followed by establishing a secure session key (SK) between a specific drone and the user, for future encrypted communication. The SK's security is established utilizing a random oracle model. A comparative study demonstrates that REAS-IoD requires fewer resource, without compromising security and privacy features than related eminent security schemes.
The Internet of Drones (IoD) is widely used in a wide range of applications from military to civilian applications from the past years. However, during communication either with the control ...room/ground station server(s) or moving access points in the sky, security and privacy is one the crucial issues which needs to be tackled efficiently. In this direction, blokchain technology can be one of the viable solutions due to the immutability and traceability of various transactions and decentralized nature. In this paper, we provide in-depth challenges and issues of applicability of blokchain in 5G-based Internet of Things (IoT)-enabled IoD environment. We propose and analyze a new blokchain based secure framework for data management among IoD communication entities. The proposed scheme has ability to resist several potential attacks that are essential in IoT-enabled IoD environment. A detailed comparative analysis exhibits that the proposed scheme offers better security and functionality requirements, and also provides less communication and computation overheads as compared to other related schemes.
Over the last few years, unmanned aerial vehicles (UAV), also called drones, have attracted considerable interest in the academic field and exploration in the research field of wireless sensor ...networks (WSN). Furthermore, the application of drones aided operations related to the agriculture industry, smart Internet of things (IoT), and military support. Now, the usage of drone-based IoT, also called Internet of drones (IoD), and their techniques and design challenges are being investigated by researchers globally. Clustering and routing aid to maximize the throughput, reducing routing, and overhead, and making the network more scalable. Since the cluster network used in a UAV adopts an open transmission method, it exposes a large surface to adversaries that pose considerable network security problems to drone technology. This study develops a new dwarf mongoose optimization-based secure clustering with a multi-hop routing scheme (DMOSC-MHRS) in the IoD environment. The goal of the DMOSC-MHRS technique involves the selection of cluster heads (CH) and optimal routes to a destination. In the presented DMOSC-MHRS technique, a new DMOSC technique is utilized to choose CHs and create clusters. A fitness function involving trust as a major factor is included to accomplish security. Besides, the DMOSC-MHRS technique designs a wild horse optimization-based multi-hop routing (WHOMHR) scheme for the optimal route selection process. To demonstrate the enhanced performance of the DMOSC-MHRS model, a comprehensive experimental assessment is made. An extensive comparison study demonstrates the better performance of the DMOSC-MHRS model over other approaches.
•This paper proves that the user access to drone scheme of Wazid et al. is vulnerable to several attacks including stolen verifier, traceability attacks.•In Wazid et al.s scheme, the attacker with ...access to the verifier, can impersonate any user, drone or server of the system. Moreover, the access to verifier enhances the attacker’s capability to disclose the session key computed between a user and a drone.•An enhanced scheme is then proposed to cope with these weaknesses.•The security claims of proposed scheme are proved by formal and informal security analysis.•The performance and security comparisons show that proposed scheme has slight overhead in performance, while maintaining the security.
The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach inaccessible and hard to access sites and can save lot of effort, time and cost. However, in addition to traditional threats, the IoD may suffer from new threats and requires customized methods to combat the security weaknesses. Very recently, Wazid et al. proposed a security solution for securing IoD application scenario and claimed its security. However, in this paper we show that their scheme cannot resist stolen verifier and traceability attacks. Moreover, an attacker with access to the verifier, can impersonate any user, drone or server of the system. An enhanced scheme is then proposed to cope with these weaknesses. The security claims of proposed scheme are endorsed by formal and informal security analysis. Moreover, the performance and security comparisons show that proposed scheme completes a cycle of authentication with a slight increase in computation time, but it offers all the required security features as compared with the scheme of Wazid et al.