Authentication for drone delivery through a novel way of using face biometrics
Abstract
References
Index Terms
- Authentication for drone delivery through a novel way of using face biometrics
Recommendations
G2Auth: secure mutual authentication for drone delivery without special user-side hardware
MobiSys '22: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and ServicesBecause of its cost effectiveness and timeliness, package delivery using unmanned aerial vehicles (UAVs), called drone delivery, is drawing growing attention. Authentication is critical for ensuring that a package is not picked up by an attacker's drone ...
Same-Day Delivery with Drone Resupply
Unmanned aerial vehicles, commonly referred to as drones, have recently seen an increased level of interest as their potential use in same-day home delivery has been promoted and advocated by large retailers and courier delivery companies. We introduce a ...
Autonomous Delivery of Multiple Packages Using Single Drone in Urban Airspace
UbiComp/ISWC '22 Adjunct: Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable ComputersCurrent drone delivery solutions mainly focus on single package delivery using one drone. However, the recent developments in drone technology enable a drone to deliver multiple packages in a single trip. We use the nearest destination first strategy ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 1,216Total Downloads
- Downloads (Last 12 months)616
- Downloads (Last 6 weeks)43
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in

