[1] BENJDIRA B, KHURSHEED T, KOUBAA A, et al. Car detection using unmanned aerial vehicles:comparison between faster R-CNN and YOLOv3[C]//Proceedings of the 1st International Conference on Unmanned Vehicle Systems-Oman. Piscataway:IEEE, 2019:1-6. [2] KOUBÂA A, QURESHI B. DroneTrack:cloud-based real-time object tracking using unmanned aerial vehicles over the internet[J]. IEEE Access, 2018, 6:13810-13824. [3] PAJARES G. Overview and current status of remote sensing applications based on Unmanned Aerial Vehicles (UAVs)[J]. Photogrammetric Engineering and Remote Sensing, 2015, 81(4):281-329. [4] HAYAT S, YANMAZ E, MUZAFFAR R. Survey on unmanned aerial vehicle networks for civil applications:a communications viewpoint[J]. IEEE Communications Surveys and Tutorials, 2016, 18(4):2624-2661. [5] 刘炜,冯丙文,翁健. 小型无人机安全研究综述[J]. 网络与信息安全学报, 2016, 2(3):39-45. (LIU W, FENG B W, WENG J. Survey on research of mini-drones security[J]. Journal of Network and Information Security, 2016, 2(3):39-45.) [6] LI J, ZHOU Y, LAMONT L. Communication architectures and protocols for networking unmanned aerial vehicles[C]//Proceedings of the 2013 IEEE Globecom Workshops. Piscataway:IEEE, 2013:1415-1420. [7] KOUBÂA A, QURESHI B, SRITI M F, et al. Dronemap planner:a service-oriented cloud-based management system for the internet-of-drones[J]. Ad Hoc Networks, 2019, 86:46-62. [8] KWON Y M, YU J, CHO B M, et al. Empirical analysis of MAVLink protocol vulnerability for attacking unmanned aerial vehicles[J]. IEEE Access, 2018, 6:43203-43212. [9] RAJATHA B S, ANANDA C M, NAGARAJ S. Authentication of MAV communication using Caesar cipher cryptography[C]//Proceedings of the 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials. Piscataway:IEEE, 2015:58-63. [10] 何道敬,杜晓,乔银荣,等. 无人机信息安全研究综述[J]. 计算机学报, 2019, 42(5):1076-1094. (HE D J, DU X, QIAO Y R, et al. A survey on cyber security of unmanned aerial vehicles[J]. Chines Journal of Computers, 2019, 42(5):1076-1094.) [11] AKOS D M. Who's afraid of the spoofer? GPS/GNSS spoofing detection via Automatic Gain Control (AGC)[J]. Navigation:Journal of the Institute of Navigation, 2012, 59(4):281-290. [12] BASTIDE F, AKOS D, MACABIAU C, et al. Automatic Gain Control (AGC) as an interference assessment tool[C]//Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation. Manassas, VA:Institute of Navigation, 2003:2042-2053. [13] WARNER J S, JOHNSTON R G. GPS spoofing countermeasures[J]. Homeland Security Journal, 2003, 25(2):19-27. [14] JAHROMI A J, BROUMANDAN A, NIELSEN J, et al. GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements[J]. International Journal of Satellite Communications and Networking, 2012, 30(4):181-191. [15] SCHMIDT A D, BYE R, SCHMIDT H G, et al. Static analysis of executables for collaborative malware detection on android[C]//Proceedings of the 2009 IEEE International Conference on Communications. Piscataway:IEEE, 2009:1-5. [16] SHABTAI A. Malware detection on mobile devices[C]//Proceedings of the 11th International Conference on Mobile Data Management. Piscataway:IEEE, 2010:289-290. [17] WON J, SEO S H, BERTINO E. A secure communication protocol for drones and smart objects[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015:249-260. [18] BUTCHER N, STEWART A, BIAZ S. Securing the MAVLink communication protocol for unmanned aircraft systems[EB/OL].[2020-03-13].https://pdfs.semanticscholar.org/4ce0/68b40089549f3d445d30e45fe8b53a141c88.pdf. [19] MARTY J A. Vulnerability analysis of the mavlink protocol for command and control of unmanned aircraft[EB/OL].(2014-03-14)[2019-11-05].https://scholar.afit.edu/cgi/viewcontent.cgi?article=1613&context=etd. [20] PRAPULLA N, VEENA S, SRINIVASALU G. Development of algorithms for MAV security[C]//Proceedings of the 2016 IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology. Piscataway:IEEE, 2016:799-802. [21] ATOEV S, KWON K R, LEE S H, et al. Data analysis of the MAVLink communication protocol[C]//Proceedings of the 2017 International Conference on Information Science and Communications Technologies. Piscataway:IEEE, 2017:1-3. [22] ANDREW TRIDGELL M L. Some proposals for MAVlink 2.0[EB/OL].[2019-11-12].https://docs.google.com/document/d/1XtbD0ORNkhZ8eKrsbSIZNLyg9sFRXMXbsR2mp37KbIg/edit#heading=h.ovqxr52ozscu. [23] RACHMAWATI D, TARIGAN J T, GINTING A B C. A comparative study of Message Digest 5(MD5) and SHA256 algorithm[J]. Journal of Physics:Conference Series, 2018, 978(1):No.012116. |