About this Research Topic
The purpose of this Research Topic is to provide up-to-date coverage of the most recent research developments in efficient and secure UAV communication methods. The focus will be on exploring and solving the following key research problems:
1) Cybersecurity: how UAV communications are protected against cyber-attacks, where hackers can exploit weaknesses in the UAV's software or communication systems to gain control of the drone. Cybersecurity risks can include data breaches, hijacking, and jamming of communication signals.
2) Physical security: how to secure UAVs against physical security threats, such as theft, sabotage, or destruction. If a drone falls into the wrong hands, it can be used for malicious purposes, such as spying, smuggling, or even attacks.
3) Privacy concerns: how to reduce privacy concerns, especially when the drone is flown over private property or in areas where people have a reasonable expectation of privacy. Unauthorized surveillance or data collection by drones can lead to violations of privacy rights.
4) Resource allocation: how different resources are allocated in wireless communication networks using UAVs as a relay/flying BS.
5) Deployment of UAVS: how to deploy UAVs for providing cellular services in situations where the ground station is malfunctioning or damaged in unforeseen circumstances.
It is anticipated that the findings of this Research Topic will have an impact on both academia and industry, as well as influencing policymakers and service providers in adopting new technologies related to this field.
The key themes in this Research Topic are centered on the most advanced developments in methods which ensure efficient and secure UAV communications in various fields. Topics of interest cover a broad range of areas, and while not limited to the following, they include:
• Vision-based obstacle avoidance and navigation for UAVs
• Edge computing and UAV systems
• Edge-assisted communication for UAV networks
• Edge computing for UAV autonomy
• Counter-drone technologies
• Edge-based machine learning for UAV applications
• UAV jamming and spoofing
• UAV privacy and legal Issues
• Detection and avoidance of obstacles
• Machine learning and artificial intelligence-based autonomous decision-making methods for UAVs
• Edge-based UAV security
• Adaptive control systems for UAVs based on machine learning and artificial intelligence
• Predictive maintenance based on machine learning and artificial intelligence
• Swarm intelligence based on machine learning and artificial intelligence
• Edge-based UAV swarm coordination
• Exploration of new 6G-enabled communication and networking protocols for UAVs
• Resource allocation in UAV-based wireless networks
Keywords: UAVs, Internet of Things, 5G technology, Ground base station, Secure communication, Resource allocation
Important Note: All contributions to this Research Topic must be within the scope of the section and journal to which they are submitted, as defined in their mission statements. Frontiers reserves the right to guide an out-of-scope manuscript to a more suitable section or journal at any stage of peer review.