Now 175 visitors
Today:595 Yesterday:1116
Total: 26991 184S 43P 11R
2025-10-11, Week 41
TACT Journal Page
Call for Paper
Author Homepage
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220096 Question.1
Questioner: yiran2020@moegi.waseda.jp    2022-02-14 ¿ÀÈÄ 2:47:44
IEEE/ICACT20220096 Answer.1
Answer by Auhor xiaxuewena@gmail.com   2022-02-14 ¿ÀÈÄ 2:47:44
It is a great honor to read your paper. For a UAV cluster, because of the limited computing power of UAV itself, will the entire cluster be vulnerable to attacks, and will there be great hidden dangers in terms of security? I hope to hear your opinion. Thank you for your question. In some application scenarios, there may be a situation where the whole cluster is under attack, and when the UAVs in the cluster have problems for some reason, a cluster maintenance policy can be set up to maintain the cluster structure and thus continue the mission. UAV clusters may face information security issues when performing missions, which can be solved by considering UAV communication security technology.

Select Voice