{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T18:47:19Z","timestamp":1774550839602,"version":"3.50.1"},"reference-count":83,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2018,11,17]],"date-time":"2018-11-17T00:00:00Z","timestamp":1542412800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Unmanned aerial vehicles (UAVs) have enormous potential in enabling new applications in various areas, ranging from military, security, medicine, and surveillance to traffic-monitoring applications. Lately, there has been heavy investment in the development of UAVs and multi-UAVs systems that can collaborate and complete missions more efficiently and economically. Emerging technologies such as 4G\/5G networks have significant potential on UAVs equipped with cameras, sensors, and GPS receivers in delivering Internet of Things (IoT) services from great heights, creating an airborne domain of the IoT. However, there are many issues to be resolved before the effective use of UAVs can be made, including security, privacy, and management. As such, in this paper we review new UAV application areas enabled by the IoT and 5G technologies, analyze the sensor requirements, and overview solutions for fleet management over aerial-networking, privacy, and security challenges. Finally, we propose a framework that supports and enables these technologies on UAVs. The introduced framework provisions a holistic IoT architecture that enables the protection of UAVs as \u201cflying\u201d things in a collaborative networked environment.<\/jats:p>","DOI":"10.3390\/s18114015","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T09:18:25Z","timestamp":1542878305000},"page":"4015","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":173,"title":["UAV IoT Framework Views and Challenges: Towards Protecting Drones as \u201cThings\u201d"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0749-9794","authenticated-orcid":false,"given":"Thomas","family":"Lagkas","sequence":"first","affiliation":[{"name":"Computer Science Department, The University of Sheffield International Faculty, CITY College, 54626 Thessaloniki, Greece"}]},{"given":"Vasileios","family":"Argyriou","sequence":"additional","affiliation":[{"name":"Department of Networks and Digital Media, Kingston University, Surrey KT1 2EE, UK"}]},{"given":"Stamatia","family":"Bibi","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunication Engineering, University of Western Macedonia, 50100 Kozani, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0355","authenticated-orcid":false,"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"Department of Informatics and Telecommunication Engineering, University of Western Macedonia, 50100 Kozani, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2018,11,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2017.1600587CM","article-title":"UAV-based IoT platform: A crowd surveillance use case","volume":"55","author":"Motlagh","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Kersnovski, T., Gonzalez, F., and Morton, K. (2017, January 4\u201311). A UAV system for autonomous target detection and gas sensing. Proceedings of the Aerospace Conference, Big Sky, MT, USA.","DOI":"10.1109\/AERO.2017.7943675"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1109\/ACCESS.2017.2776120","article-title":"Exploiting LTE-Advanced HetNets and FeICIC for UAV-assisted public safety communications","volume":"6","author":"Kumbhar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bupe, P., Haddad, R., and Rios-Gutierrez, F. (2015, January 9\u201312). Relief and emergency communication network based on an autonomous decentralized UAV clustering network. Proceedings of the SoutheastCon, Fort Lauderdale, FL, USA.","DOI":"10.1109\/SECON.2015.7133027"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Merwaday, A., and Guvenc, I. (2015, January 9\u201312). UAV assisted heterogeneous networks for public safety communications. Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), New Orleans, LA, USA.","DOI":"10.1109\/WCNCW.2015.7122576"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Luo, C., Nightingale, J., Asemota, E., and Grecos, C. (2015, January 11\u201314). A UAV-cloud system for disaster sensing applications. Proceedings of the 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK.","DOI":"10.1109\/VTCSpring.2015.7145656"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of Things for Smart Cities","volume":"1","author":"Zanella","year":"2014","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"139735","DOI":"10.1155\/2015\/139735","article-title":"Architecting the IoT paradigm: A middleware for autonomous distributed sensor networks","volume":"11","author":"Eleftherakis","year":"2015","journal-title":"Int. J. Distr. Sens. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MCOM.2017.1700450","article-title":"Technologies for efficient amateur drone detection in 5G millimeter-wave cellular infrastructure","volume":"56","author":"Solomitckii","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mozaffari, M., Saad, W., Bennis, M., Nam, Y.H., and Debbah, M. (arXiv, 2018). A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems, arXiv.","DOI":"10.1109\/COMST.2019.2902862"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Al-Hourani, A., Kandeepan, S., and Jamalipour, A. (2014, January 8\u201312). Modeling air-to-ground path loss for low altitude platforms in urban environments. Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA.","DOI":"10.1109\/GLOCOM.2014.7037248"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2016.7470933","article-title":"Wireless communications with unmanned aerial vehicles: Opportunities and challenges","volume":"54","author":"Zeng","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"7574","DOI":"10.1109\/TWC.2017.2751045","article-title":"Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications","volume":"16","author":"Mozaffari","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Soorki, M.N., Mozaffari, M., Saad, W., Manshaei, M.H., and Saidi, H. (2016, January 4\u20138). Resource Allocation for Machine-to-Machine Communications with Unmanned Aerial Vehicles. Proceedings of the 2016 IEEE Globecom Workshops (GC Wkshps), Washington, DC, USA.","DOI":"10.1109\/GLOCOMW.2016.7849026"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1647","DOI":"10.1109\/LCOMM.2016.2578312","article-title":"Efficient Deployment of Multiple Unmanned Aerial Vehicles for Optimal Wireless Coverage","volume":"20","author":"Mozaffari","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/LCOMM.2017.2776215","article-title":"Optimum Placement of UAV as Relays","volume":"22","author":"Chen","year":"2018","journal-title":"IEEE Commun. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Kalantari, E., Yanikomeroglu, H., and Yongacoglu, A. (2016, January 18\u201321). On the Number and 3D Placement of Drone Base Stations in Wireless Cellular Networks. Proceedings of the 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada.","DOI":"10.1109\/VTCFall.2016.7881122"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3949","DOI":"10.1109\/TWC.2016.2531652","article-title":"Unmanned Aerial Vehicle With Underlaid Device-to-Device Communications: Performance and Tradeoffs","volume":"15","author":"Mozaffari","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3747","DOI":"10.1109\/TWC.2017.2688328","article-title":"Energy-Efficient UAV Communication With Trajectory Optimization","volume":"16","author":"Zeng","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1109\/MNET.2017.1600307","article-title":"Cooperative Hierarchical Caching in 5G Cloud Radio Access Networks","volume":"31","author":"Tran","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Anton, S.R., and Inman, D.J. (2011). Performance modeling of unmanned aerial vehicles with on-board energy harvesting. Active and Passive Smart Structures and Integrated Systems, International Society for Optics and Photonics.","DOI":"10.1117\/12.880473"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"e3034","DOI":"10.1002\/ett.3034","article-title":"Optimal energy allocation policies for a high altitude flying wireless access point","volume":"28","author":"Ceran","year":"2017","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1109\/JIOT.2016.2612119","article-title":"Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives","volume":"3","author":"Motlagh","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Shaikh, Z., Baidya, S., and Levorato, M. (2018, January 11\u201313). Robust Multi-Path Communications for UAVs in the Urban IoT. Proceedings of the 2018 IEEE International Conference on Sensing, Communication and Networking (SECON Workshops), Hong Kong, China.","DOI":"10.1109\/SECONW.2018.8396356"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Yan, S., Peng, M., and Cao, X. (2018). A Game Theory Approach for Joint Access Selection and Resource Allocation in UAV Assisted IoT Communication Networks. IEEE Internet Things J.","DOI":"10.1109\/JIOT.2018.2873308"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chakareski, J. (2017, January 1\u20134). Aerial UAV-IoT sensing for ubiquitous immersive communication and virtual human teleportation. Proceedings of the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA.","DOI":"10.1109\/INFCOMW.2017.8116465"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MCOM.2018.1701111","article-title":"An Air-Ground Integration Approach for Mobile Edge Computing in IoT","volume":"56","author":"Zhou","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Mozaffari, M., Saad, W., Bennis, M., and Debbah, M. (2016, January 4\u20138). Mobile Internet of Things: Can UAVs Provide an Energy-Efficient Mobile Architecture?. Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM), Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7841993"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"525640","DOI":"10.1155\/2012\/525640","article-title":"Collaborative relay beamforming strategies for multiple destinations with guaranteed QoS in wireless machine-to-machine networks","volume":"8","author":"Wang","year":"2012","journal-title":"Int. J. Distr. Sens. Netw."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1049\/iet-net.2017.0069","article-title":"Hybrid 5G optical-wireless SDN-based networks, challenges and open issues","volume":"6","author":"Sarigiannidis","year":"2017","journal-title":"IET Netw."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Klepac, L., and Rozehnal, D. (June, January 31). Scavenging simulation of small two-stroke engine with low-pressure fuel injection for usage in unmanned aerial vehicle (UAV). Proceedings of the 2017 International Conference on Military Technologies (ICMT), Brno, Czech Republic.","DOI":"10.1109\/MILTECHS.2017.7988803"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5440","DOI":"10.1109\/TGRS.2016.2565471","article-title":"Remote sensing of 3-D geometry and surface moisture of a peat production area using hyperspectral frame cameras in visible to short-wave infrared spectral ranges onboard a small unmanned airborne vehicle (UAV)","volume":"54","author":"Honkavaara","year":"2016","journal-title":"IEEE Trans. Geosci. Remote Sens."},{"key":"ref_33","first-page":"136","article-title":"Spectrum sharing for drone networks","volume":"35","author":"Zhang","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Triantafyllou, A., Sarigiannidis, P., and Lagkas, T.D. (2018). Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends. Wirel. Commun. Mobile Comput., 2018.","DOI":"10.1155\/2018\/5349894"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"21324","DOI":"10.1109\/ACCESS.2018.2822401","article-title":"Quality Management of Surveillance Multimedia Streams Via Federated SDN Controllers in Fiwi-Iot Integrated Deployment Environments","volume":"6","author":"Bellavista","year":"2018","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/3001836","article-title":"Security, privacy, and safety aspects of civilian drones: A survey","volume":"1","author":"Altawy","year":"2017","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","article-title":"Security for the internet of things: a survey of existing protocols and open research issues","volume":"17","author":"Granjal","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"794326","DOI":"10.1155\/2013\/794326","article-title":"Routing Attacks and Countermeasures in the RPL-based Internet of Things","volume":"9","author":"Wallgren","year":"2013","journal-title":"Int. J. Distr. Sens. Netw."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Bloom, V., Makris, D., and Argyriou, V. (2014, January 24\u201328). Clustered spatio-temporal manifolds for online action recognition. Proceedings of the 2014 22nd International Conference on Pattern Recognition (ICPR), Stockholm, Sweden.","DOI":"10.1109\/ICPR.2014.679"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.cviu.2015.12.001","article-title":"Hierarchical transfer learning for online recognition of compound actions","volume":"144","author":"Bloom","year":"2016","journal-title":"Comput. Vis. Image Underst."},{"key":"ref_41","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., and Alexander, R. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, Internet Engineering Task Force (IETF). Technical report."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., and Economides, A.A. (2016, January 11\u201313). EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. Proceedings of the 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, France.","DOI":"10.1109\/WMNC.2016.7543976"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/2656877.2656887","article-title":"Named data networking","volume":"44","author":"Zhang","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"121","DOI":"10.4236\/jcc.2017.51010","article-title":"A review of security concerns in Internet of Things","volume":"5","author":"Leloglu","year":"2016","journal-title":"J. Comput. Commun."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Shepherd, C., Akram, R.N., and Markantonakis, K. (2017). Towards Trusted Execution of Multi-modal Continuous Authentication Schemes. Proceedings of the Symposium on Applied Computing, ACM.","DOI":"10.1145\/3019612.3019652"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Markantonakis, K., Mayes, K., Bonnefoi, P.F., Sauveron, D., and Chaumette, S. (2016, January 25\u201330). An efficient, secure and trusted channel protocol for avionics wireless networks. Proceedings of the 2016 IEEE\/AIAA 35th Digital Avionics Systems Conference (DASC), Sacramento, CA, USA.","DOI":"10.1109\/DASC.2016.7777967"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Markantonakis, K., Akram, R.N., and Holloway, R. (2016, January 19\u201321). A secure and trusted boot process for avionics wireless networks. Proceedings of the Integrated Communications Navigation and Surveillance (ICNS), Herndon, VA, USA.","DOI":"10.1109\/ICNSURV.2016.7486322"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Gurulian, I., Akram, R.N., Markantonakis, K., and Mayes, K. (2017, January 3\u20137). Preventing relay attacks in mobile transactions using infrared light. Proceedings of the Symposium on Applied Computing, Marrakech, Morocco.","DOI":"10.1145\/3019612.3019794"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Akram, R.N., Bonnefoi, P.F., Chaumette, S., Markantonakis, K., and Sauveron, D. (2016, January 23\u201326). Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. Proceedings of the Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0116"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"3693","DOI":"10.1109\/JSEN.2013.2266116","article-title":"A lightweight multicast authentication mechanism for small scale IoT applications","volume":"13","author":"Yao","year":"2013","journal-title":"IEEE Sens. J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MC.2013.74","article-title":"Cyber-entity security in the Internet of things","volume":"46","author":"Ning","year":"2013","journal-title":"Computer"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.11118\/actaun201664051785","article-title":"System for Anonymous Data Collection Based on Group Signature Scheme","volume":"64","author":"Trojak","year":"2016","journal-title":"Acta Univ. Agric. Silvicult. Mendel. Brun."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"De Cristofaro, E., and Soriente, C. (2011, January 14\u201317). Short paper: PEPSI-privacy-enhanced participatory sensing infrastructure. Proceedings of the Fourth ACM Conference on Wireless Network Security, Hamburg, Germany.","DOI":"10.1145\/1998412.1998418"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2005.65","article-title":"Enabling video privacy through computer vision","volume":"3","author":"Senior","year":"2005","journal-title":"IEEE Secur. Privacy"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Korshunov, P., and Ebrahimi, T. (2013, January 27\u201330). Using face morphing to protect privacy. Proceedings of the 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), Krakow, Poland.","DOI":"10.1109\/AVSS.2013.6636641"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Korshunov, P., and Ebrahimi, T. (2013, January 1\u20133). Using warping for privacy protection in video surveillance. Proceedings of the 2013 18th International Conference on Digital Signal Processing (DSP), Fira, Greece.","DOI":"10.1109\/ICDSP.2013.6622791"},{"key":"ref_57","first-page":"457","article-title":"Observations from above: unmanned aircraft systems and privacy","volume":"36","author":"Villasenor","year":"2013","journal-title":"Harv. J. Law Public Policy"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.clsr.2012.01.005","article-title":"Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications","volume":"28","author":"Finn","year":"2012","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.clsr.2014.03.005","article-title":"The regulation of civilian drones\u2019 impacts on behavioural privacy","volume":"30","author":"Clarke","year":"2014","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Wilson, R.L. (2014, January 23\u201324). Ethical issues with use of drone aircraft. Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology, Chicago, IL, USA.","DOI":"10.1109\/ETHICS.2014.6893424"},{"key":"ref_61","unstructured":"Boult, T.E. (2005, January 17\u201318). PICO: Privacy through invertible cryptographic obscuration. Proceedings of the Computer Vision for Interactive and Intelligent Environment, Lexington, KY, USA."},{"key":"ref_62","first-page":"5","article-title":"Compression independent reversible encryption for privacy in video surveillance","volume":"2009","author":"Carrillo","year":"2009","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s00530-011-0246-9","article-title":"Chaos-cryptography based privacy preservation technique for video surveillance","volume":"18","author":"Rahman","year":"2012","journal-title":"Multimed. Syst."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1117\/12.564828","article-title":"Video surveillance using JPEG 2000","volume":"Volume 5558","author":"Dufaux","year":"2004","journal-title":"Applications of Digital Image Processing XXVII"},{"key":"ref_65","unstructured":"Martinez-Ponte, I., Desurmont, X., Meessen, J., and Delaigle, J.F. (2005, January 13\u201315). Robust human face hiding ensuring privacy. Proceedings of the International Workshop on Image Analysis for Multimedia Interactive Services, Montreux, Switzerland."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1168","DOI":"10.1109\/TCSVT.2008.928225","article-title":"Scrambling for privacy protection in video surveillance systems","volume":"18","author":"Dufaux","year":"2008","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.cose.2013.05.007","article-title":"Anonymous authentication for privacy- preserving IoT target-driven applications","volume":"37","author":"Alcaide","year":"2013","journal-title":"Comput. Secur."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Akram, R.N., and Ko, R.K. (2014, January 24\u201326). Unified model for data security-A position paper. Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China.","DOI":"10.1109\/TrustCom.2014.110"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Suen, C.H., Ko, R.K., Tan, Y.S., Jagadpramana, P., and Lee, B.S. (2013, January 16\u201318). S2logger: End-to-end data tracking mechanism for cloud data provenance. Proceedings of the 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia.","DOI":"10.1109\/TrustCom.2013.73"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","article-title":"Survey of important issues in UAV communication networks","volume":"18","author":"Gupta","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"1254","DOI":"10.1016\/j.adhoc.2012.12.004","article-title":"Flying ad-hoc networks (FANETs): A survey","volume":"11","author":"Bekmezci","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Cheng, B.N., and Moore, S. (November, January 29). A comparison of MANET routing protocols on airborne tactical networks. Proceedings of the MILCOM 2012\u20142012 IEEE Military Communications Conference, Orlando, FL, USA.","DOI":"10.1109\/MILCOM.2012.6415798"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Shirani, R., St-Hilaire, M., Kunz, T., Zhou, Y., Li, J., and Lamont, L. (2012, January 27\u201331). Combined reactive-geographic routing for unmanned aeronautical ad-hoc networks. Proceedings of the 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), Limassol, Cyprus.","DOI":"10.1109\/IWCMC.2012.6314310"},{"key":"ref_74","unstructured":"Yu, Q., Zhang, B., Liu, C., and Mouftah, H.T. (April, January 31). Energy-Efficient Geographical Forwarding Algorithm for Wireless Ad Hoc and Sensor Networks. Proceedings of the Wireless Communications and Networking Conference, Las Vegas, NV, USA."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/LWC.2017.2779507","article-title":"New RSSI-Based Tracking for Following Mobile Targets Using the Law of Cosines","volume":"7","author":"Lagias","year":"2018","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.comnet.2014.03.027","article-title":"Energy efficiency in wireless sensor networks: A top-down survey","volume":"67","author":"Rault","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Maza, I., and Ollero, A. (2007). Multiple UAV cooperative searching operation using polygon area decomposition and efficient coverage algorithms. Distributed Autonomous Robotic Systems 6, Springer.","DOI":"10.1007\/978-4-431-35873-2_22"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"479","DOI":"10.1518\/001872005774860005","article-title":"Mission control of multiple unmanned aerial vehicles: A workload analysis","volume":"47","author":"Dixon","year":"2005","journal-title":"Hum. Fact."},{"key":"ref_79","unstructured":"Ruff, H.A., Calhoun, G.L., Draper, M.H., Fontejon, J.V., and Guilfoos, B.J. (2004). Exploring Automation Issues in Supervisory Control of Multiple UAVs, Sytronics Inc.. Technical Report."},{"key":"ref_80","unstructured":"Cummings, M.L., Bruni, S., Mercier, S., and Mitchell, P.J. (2007). Automation Architecture for Single Operator, Multiple UAV Command and Control, Massachusetts Institute of Technology. Technical Report."},{"key":"ref_81","unstructured":"Arslan, O., and Inalhan, G. (2009, January 15\u201317). Design of a decision support architecture for human operators in UAV fleet C2 applications. Proceedings of the 14th International Command and Control Research and Technology Symposium (ICCRTS), Washington, DC, USA."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Lee, J., Kim, K., Yoo, S., Chung, A.Y., Lee, J.Y., Park, S.J., and Kim, H. (2016, January 22\u201327). Constructing a reliable and fast recoverable network for drones. Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7511317"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/37.887447","article-title":"Autonomous formation flight","volume":"20","author":"Giulietti","year":"2000","journal-title":"IEEE Control Syst."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/4015\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:30:25Z","timestamp":1760196625000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/11\/4015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,17]]},"references-count":83,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2018,11]]}},"alternative-id":["s18114015"],"URL":"https:\/\/doi.org\/10.3390\/s18114015","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,17]]}}}