no code implementations • 2 Dec 2022 • Muhammad Asif Khan, Hamid Menouar, Osama Muhammad Khalid, Adnan Abu-Dayya
Owing to the limitations of these schemes, we present a novel encryption-based drone detection scheme that uses a two-stage verification of the drone's received signal strength indicator (RSSI) and the encryption key generated from the drone's position coordinates to reliably detect an unauthorized drone in the presence of authorized drones.