Now 738 visitors
Today:459 Yesterday:362
Total: 3313 413S 88P 97R
2026-04-13, Week 16
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220096 Question.1
Questioner: yiran2020@moegi.waseda.jp    2022-02-14 ¿ÀÈÄ 2:47:44
IEEE/ICACT20220096 Answer.1
Answer by Auhor xiaxuewena@gmail.com   2022-02-14 ¿ÀÈÄ 2:47:44
It is a great honor to read your paper. For a UAV cluster, because of the limited computing power of UAV itself, will the entire cluster be vulnerable to attacks, and will there be great hidden dangers in terms of security? I hope to hear your opinion. Thank you for your question. In some application scenarios, there may be a situation where the whole cluster is under attack, and when the UAVs in the cluster have problems for some reason, a cluster maintenance policy can be set up to maintain the cluster structure and thus continue the mission. UAV clusters may face information security issues when performing missions, which can be solved by considering UAV communication security technology.

Select Voice