[1]王利, 王普, 闫峥. 无人机通信网络安全综述[J]. 网络空间安全, 2019, 10(9): 1319[2]李隆, 袁作林, 朱正. 猎鹰无人机应急救援装备应用场景及作业方法研究[J]. 决策探索(中), 2020 (10): 1925[3]陈墨桐. 一种无人机物流运输装置: 中国,202020551303.3[P]. 20210226[4]刘刚. 无人机在地质勘探中的应用探讨[J]. 产业科技创新, 2019, 1(13): 5354[5]李超. 基于无人机的安防监控系统在智慧城市中的应用前景与实现[J]. 科技广场, 2014 (6): 7275[6]袁征, 武毅. 微小型无人机应急通信系统设计[J]. 电子世界, 2015 (20): 8081[7]Kriz V, Gabrlik P. UranusLinkcommunication protocol for UAV with small overhead and encryption ability[J]. IFACPapersOnLine, 2015, 48(4): 474479[8]Allouch A, Cheikhrouhou O, Koubaa A, et al. MAVSec: Securing the MAVLink protocol for ardupilotPX4 unmanned aerial systems[C] Proc of the 15th Int Wireless Communications & Mobile Computing Conf (IWCMC). Piscataway, NJ: IEEE, 2019: 621628[9]Kouba A, Qureshi B, Sriti M F, et al. A serviceoriented Cloudbased management system for the InternetofDrones[C] Proc of 2017 IEEE Int Conf on Autonomous Robot Systems and Competitions (ICARSC). Piscataway, NJ: IEEE, 2017: 329335[10]Kwon Y M, Yu J, Cho B M, et al. Empirical analysis of MAVLink protocol vulnerability for attacking unmanned aerial vehicles[J]. IEEE Access, 2018 (6): 4320343212[11]Atoev S, Kwon K R, Lee S H, et al. Data analysis of the MAVLink communication protocol[C] Proc of 2017 Int Conf on Information Science and Communications Technologies (ICISCT). Piscataway, NJ: IEEE, 2017: 13[12]Khan N A, Jhanjhi N Z, Brohi S N, et al. A Secure communication protocol for unmanned aerial vehicles[J]. Computers, Materials & Continua, 2022, 70(1): 601618[13]张凌浩, 王胜, 周辉, 等. 基于MAVLink协议的无人机系统安全通信方案[J]. 计算机应用, 2020, 40(8): 22862292[14]Hoque N, Bhattacharyya D K, Kalita J K. Botnet in DDoS attacks: Trends and challenges[J]. IEEE Communications Surveys & Tutorials, 2015, 17(4): 22422270[15]Vasconcelos G, Carrijo G, Miani R, et al. The impact of DoS attacks on the AR.Drone 2.0[C] Proc of 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARSSBR). Piscataway, NJ: IEEE, 2016: 127132[16]Zhang W, Gong X, Han G, et al. An improved ant colony algorithm for path planning in one scenic area with many spots[J]. IEEE Access, 2017, 5: 1326013269[17]高明. 浅谈对称加密算法与非对称加密算法的应用[J]. 电子世界, 2015 (15): 5960[18]Mouha N, Preneel B. A proof that the ARX cipher salsa20 is secure against differential cryptanalysis[EBOL]. (20131113) [20221215]. https:eprint.iacr.org2013328[19]张振宾. 国密SM4和SM2算法功耗攻击关键技术研究与实现[D]. 北京: 清华大学, 2015[20]冯秀涛. 3GPP LTE国际加密标准ZUC算法[J]. 信息安全与通信保密, 2011 (12): 4546 |