{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:04:25Z","timestamp":1730214265795,"version":"3.28.0"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/dcoss52077.2021.00059","type":"proceedings-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T20:19:04Z","timestamp":1637180344000},"page":"319-326","source":"Crossref","is-referenced-by-count":17,"title":["Towards Secure Wireless Mesh Networks for UAV Swarm Connectivity: Current Threats, Research, and Opportunities"],"prefix":"10.1109","author":[{"given":"Martin Andreoni","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Michael","family":"Baddeley","sequence":"additional","affiliation":[]},{"given":"Willian T.","family":"Lunardi","sequence":"additional","affiliation":[]},{"given":"Anshul","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Giacalone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259407"},{"key":"ref38","article-title":"A Competition to Push the Dependability of Low-Power Wireless Protocols to the Edge","author":"schu\u00df","year":"2017","journal-title":"Proc of the 14th EWSN Conf"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2019.8767250"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.035"},{"key":"ref31","article-title":"LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"23rd Int Conf Distributed Computing Systems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3140263"},{"article-title":"Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services","year":"2020","author":"zimmerling","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846299"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2973023"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102598"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s18103319"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062174"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.03.001"},{"journal-title":"IEEE Std 802 11-2020 (Rev of IEEE Std 802 11-2016)","year":"2020","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3059644"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN48934.2020.9071380"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.2016189"},{"key":"ref21","article-title":"Toward a monitoring and threat detection system based on stream processing as a virtual network function for big data","volume":"31","author":"lopez","year":"2019","journal-title":"Concurrency and Computation Prac And Exp"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3355193"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00013"},{"key":"ref26","article-title":"Drone hacking with raspberry-pi 3 and wifi pineapple: Security and privacy threats for the IoT","author":"westerlund","year":"2019","journal-title":"1st Intl Conf on UVS"},{"article-title":"Maldrone the first backdoor for drones","year":"2015","author":"sasi","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1007\/s10846-008-9257-y","article-title":"Vision-based odometry and slam for medium and high altitude flying uavs","volume":"54","author":"caballero","year":"2009","journal-title":"Journal of Intelligent and Robotic Systems"},{"key":"ref52","article-title":"Snaploc: An ultra-fast uwb-based indoor localization system for an unlimited number of tags","author":"gro?windhager","year":"2019","journal-title":"18th (IPSN) Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5857-5_2"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-SoC.2017.8203494"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462115"},{"key":"ref13","article-title":"Paser: secure and efficient routing approach for airborne mesh networks","volume":"15","author":"sbeiti","year":"2015","journal-title":"IEEE Trans on Wireless Comms"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879758"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900050"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-208"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2617328"},{"key":"ref19","article-title":"Survey on UAANET routing protocols and network security challenges","volume":"37","author":"maxa","year":"2017","journal-title":"Adhoc & Sensor Wireless Networks"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"journal-title":"IEEE Std 802 15 4-2020 (Rev of IEEE Std 802 15 4-2015)","year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2930813"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MUE.2007.187"},{"key":"ref7","article-title":"Software Defined Networking for the Industrial Internet of Things","author":"baddeley","year":"2020","journal-title":"Ph D Dissertation"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2525938"},{"article-title":"Better Approach To Mobile Ad-hoc Networking (B.A.T.M.A.N.)","year":"2008","author":"neumann","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/e22111261"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120014"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530068"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2932753"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900051"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3060420"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7498103"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2019.8923325"}],"event":{"name":"2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)","start":{"date-parts":[[2021,7,14]]},"location":"Pafos, Cyprus","end":{"date-parts":[[2021,7,16]]}},"container-title":["2021 17th International Conference on Distributed Computing in Sensor Systems (DCOSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9599877\/9599881\/09599886.pdf?arnumber=9599886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:50:57Z","timestamp":1652187057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9599886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/dcoss52077.2021.00059","relation":{},"subject":[],"published":{"date-parts":[[2021,7]]}}}