
Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy concerns for unmanned aerial vehicles/drones are progressively increasing. With limited standardization and regulation of unmanned aerial vehicles/drones, security and privacy concerns are growing. This paper presents a brief analysis of unmanned aerial vehicle's/drones security and privacy-related concerns. The paper also presents countermeasures and recommendations to address such concerns. While laying out a brief survey of unmanned aerial vehicles/drones, the paper also provides readers with up-to-date information on existing regulations, classification, architecture, and communication methods. It also discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. In the end, the paper concludes with a discussion on open research areas and recommendations on how the security and privacy of unmanned aerial vehicles can be improved.
Citation: Murtaza Ahmed Siddiqi, Celestine Iwendi, Kniezova Jaroslava, Noble Anumbe. Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations[J]. Mathematical Biosciences and Engineering, 2022, 19(3): 2641-2670. doi: 10.3934/mbe.2022121
[1] | Ahmed Alamer, Hassan Zafar, Muhammad Javaid . Study of modified prism networks via fractional metric dimension. AIMS Mathematics, 2023, 8(5): 10864-10886. doi: 10.3934/math.2023551 |
[2] | Muhammad Ahmad, Muhammad Faheem, Sanaa A. Bajri, Zohaib Zahid, Muhammad Javaid, Hamiden Abd El-Wahed Khalifa . Optimizing SNARK networks via double metric dimension. AIMS Mathematics, 2024, 9(8): 22091-22111. doi: 10.3934/math.20241074 |
[3] | Chenggang Huo, Humera Bashir, Zohaib Zahid, Yu Ming Chu . On the 2-metric resolvability of graphs. AIMS Mathematics, 2020, 5(6): 6609-6619. doi: 10.3934/math.2020425 |
[4] | Ali N. A. Koam . Metric based resolvability of cycle related graphs. AIMS Mathematics, 2024, 9(4): 9911-9925. doi: 10.3934/math.2024485 |
[5] | Maryam Salem Alatawi, Ali Ahmad, Ali N. A. Koam, Sadia Husain, Muhammad Azeem . Computing vertex resolvability of benzenoid tripod structure. AIMS Mathematics, 2022, 7(4): 6971-6983. doi: 10.3934/math.2022387 |
[6] | Ali N. A. Koam, Sikander Ali, Ali Ahmad, Muhammad Azeem, Muhammad Kamran Jamil . Resolving set and exchange property in nanotube. AIMS Mathematics, 2023, 8(9): 20305-20323. doi: 10.3934/math.20231035 |
[7] | Mohamed Basher . On the reflexive edge strength of the circulant graphs. AIMS Mathematics, 2021, 6(9): 9342-9365. doi: 10.3934/math.2021543 |
[8] | Mohra Zayed, Ali Ahmad, Muhammad Faisal Nadeem, Muhammad Azeem . The comparative study of resolving parameters for a family of ladder networks. AIMS Mathematics, 2022, 7(9): 16569-16589. doi: 10.3934/math.2022908 |
[9] | Syed Ahtsham Ul Haq Bokhary, Zill-e-Shams, Abdul Ghaffar, Kottakkaran Sooppy Nisar . On the metric basis in wheels with consecutive missing spokes. AIMS Mathematics, 2020, 5(6): 6221-6232. doi: 10.3934/math.2020400 |
[10] | Ali N. A. Koam, Adnan Khalil, Ali Ahmad, Muhammad Azeem . Cardinality bounds on subsets in the partition resolving set for complex convex polytope-like graph. AIMS Mathematics, 2024, 9(4): 10078-10094. doi: 10.3934/math.2024493 |
Over time, the use of UAVs (unmanned aerial vehicles)/drones has increased across several civil and military application domains. Such domains include real-time monitoring, remote sensing, wireless coverage in disaster areas, search and rescue, product delivery, surveillance, security, agriculture, civil infrastructure inspection, and the like. This rapid growth is opening doors to numerous opportunities and conveniences in everyday life. On the other hand, security and privacy concerns for unmanned aerial vehicles/drones are progressively increasing. With limited standardization and regulation of unmanned aerial vehicles/drones, security and privacy concerns are growing. This paper presents a brief analysis of unmanned aerial vehicle's/drones security and privacy-related concerns. The paper also presents countermeasures and recommendations to address such concerns. While laying out a brief survey of unmanned aerial vehicles/drones, the paper also provides readers with up-to-date information on existing regulations, classification, architecture, and communication methods. It also discusses application areas, vulnerabilities, existing countermeasures against different attacks, and related limitations. In the end, the paper concludes with a discussion on open research areas and recommendations on how the security and privacy of unmanned aerial vehicles can be improved.
The notion of resolving sets (RSs) in networks has been the subject of a great deal of research over the last few years, mostly because of its practical applications in a variety of domains, including pattern recognition, coding theory, error correction, network design, and distance labelling systems. The RSs are basically subsets of nodes in a network with the capacity to differentiate between each node according to their distances from each other. RSs are often referred to as locating sets and metric bases.
In [1], Slater presents the idea of locating sets, or RSs, first, and he also created the phrase location number to indicate the size of the smallest RS. By following the Slater's work, Melter and Harary expanded on the idea of locating sets and introduced the term metric dimension (MD). They further investigated the MD of trees [2], providing a comprehensive understanding of this idea. The application of the MD problem has gained significant attention in addressing various real-world issues in recent times. Its utilization spans several domains: establishing reliable sensor networks [3], authenticating network intrusions by leveraging the network's metric base, tackling coin weighing challenges [4], and connected joins in networks [5]. Moreover, MD is applied in different branches of navigation [6], and chemistry [7].
Murtaza et al. [8] estimated the constant MD of cycle-related networks. It was also discovered that finding the MD of a connected network is an NP-hard task [9]. Chartrand et al. calculated the MD of both unicyclic and path networks [7]. Furthermore, they provided a characterization of all connected networks of order p that possess MD 1, p−1, and p−2. For calculating the MD of networks, Murdiansyah and Adiwijaya [10] presented the particle swarm optimization technique. Fernau et al. [11] introduced an algorithm with linear-time complexity to calculate the MD of chain networks. These networks are bipartite and have vertices that can be arranged based on neighborhood inclusion. In [12], Mulyono et al. focused on establishing the MD for three types of networks: the friendship network Fn, the Petersen network P(n,m), and the lollipop network L(m,n). Moreover, the MD is thought to be paramount for studying many other structures, such as the RS of silicate stars [13], the exact values of MD and domination-related parameters of complete multipartite networks [14], and the sharp bounds on the MD of honeycomb networks studied in [15].
Determining the fault-tolerant MD of a network poses a complex combinatorial challenge, offering potential implications for sensor networks. In their exploration of the MD and fault-tolerant MD within various interconnection networks [16], Hayat et al. discovered that silicate, Benes, and butterfly networks have infinite fault-tolerant resolvability. Saha et al., in their research outlined in [17], delved into the k-MD of the circulant networks for a range of possible values of n and k, representing the required fault-tolerant MD. Investigations conducted by authors in [18,19] focused on the fault-tolerant MD within recognized families of convex polytope structures. Additionally, Saha et al. tackled the 2-MD problem regarding circulant networks specifically, contributing to the field of network resilience, as discussed in [20]. Raza et al. [21] demonstrate specific lower and upper limits regarding the FTMD for infinite of regular graphs. For more details, see [22].
Caceres et al. [23] have pioneered the exploration of doubly resolving sets (DRSs) within graph theory, showcasing the strong correlation between the MD of the Cartesian products and these minimal DRSs in network G. DRSs are essential in source localization because they help reduce ambiguity, improve accuracy, enhance robustness, and enable efficient algorithms for determining the locations of multiple sources [24,25]. DRSs are a valuable tool in various applications, including radar, sonar, wireless communication, and more, where source localization is a critical task.
In [26], Kratica et al. demonstrated that the minimal DRS problem is NP-hard and proposed the utilization of a genetic algorithm to address large-scale instances of the problem. The problem of determining the MDRSs has been investigated for various network families. Notably, prior research has delved into the investigation of minimal DRSs within prisms [27], convex polytopes [28], and Hamming networks [29]. In the work by Chen et al. [30], they established the upper and lower bounds for the DRS problem. Additionally, in the study by Ahmad et al. [31], it was noted that circulant networks in the same family exhibit identical MD and DRS properties.
Lately, Ahmad et al. have made significant strides in addressing the DRS problem within various network families, as evidenced in their work [32,33]. Jannesari [34] provided a characterization for networks G with a double metric dimension (DMD) of 2, utilizing 2-connected subnetworks within network G. In another recent research endeavor, Ahmad et al. [35] delved into the study of minimal DRSs specifically in the context of chordal ring networks.
There are many different kinds of network metric generators in use right now, and each kind is the subject of theoretical and practical research based on how useful and well-linked it is (for details see: [36]). However, while defining networks utilizing these metric generators, there are other viewpoints that have not yet been fully considered. Assume a network where vertices are accurately monitored and uniquely identified by a metric generator. However, if an intruder enters the network through its edges rather than its vertices, it is impossible to pinpoint their location, which makes surveillance impossible.
To address these kinds of issues, Ahmad et al. introduced a novel metric generator called EVDRSs in [37]. For the edge form of DRSs, only a few network families have been studied in the literature. The EVDRSs for the sunlet networks and prisms were found in [37]. The concept of the minimal EVDRSs has also been examined in [38] concerning the family of layer-sun networks. Moreover, the investigation of minimum-ordered EVDRSs in chorded cycles was carried out in [39], where the authors established that the least size of the EVDRSs for the chorded cycles is precisely one more than its edge version of MD. Additionally, the EVDRS problem for cocktail networks, jellyfish networks, and necklace networks has been examined in previous works, such as [40], and [41], respectively. In another study [42], Ahmad et al. tackled the problem of identifying the minimum EVDRSs for kayak paddle networks.
In this research article, we focus on EVDRSs in circulant networks Cn(1,2). A set is considered an EVDRS in a network if it has the ability to uniquely distinguish between any two edges of the network using any pair of edges from a subset of that network. The study of EVDRSs is relatively new and has gained attention as it provides additional information about the structure of a network. The main objective of this research is to investigate the existence, size, and structure of EVDRSs in circulant networks Cn(1,2). By providing insights into the EVDRSs of circulant networks Cn(1,2), we contribute to the broader understanding of this intriguing class of networks and expand the knowledge base of RSs. The research findings in this study hold implications for real-life situations in various domains; a few of them are as follows:
Communication Networks: The EVDRSs can help improve error detection and correction mechanisms in communication networks, which will increase the dependability of data transfer.
Distributed Sensor Networks: The design and optimization of distributed sensor networks, where effective data collection and processing are essential, may find applications from the insights gained from this study.
Furthermore, these findings may have an impact on the development of network navigation and localization algorithms. The characterization of EVDRSs in circulant networks Cn(1,2) provides the groundwork for the development of location-aware systems that are more reliable and accurate, influencing domains like tracking, surveillance, and autonomous navigation. To summarize, the study of EVDRSs in circulant networks Cn(1,2) has both theoretical and practical implications for enhancing the performance, efficiency, and reliability of different kinds of communication and sensing systems in real-world applications. The key contribution of the article is explained below:
● The Section 2 introduces the notation and preliminary definitions required for our study.
● Section 3 presents our main results on the existence and structure of EVDRSs in Cn(1,2).
● We discuss the implications and applications of these results in Section 4.
● Finally, we conclude the article in Section 5 by summarizing our findings, highlighting their significance and limitations, and suggesting directions for future research.
We take an undirected, connected, and simple network G consisting of the set of vertices V(G) and E(G), which is the set of edges. Let v1,v2 ∈ V(G), then the distance d(v1,v2) is the smallest path between v1 and v2. Let an ordered subset R={ri,1≤i≤l}⊆V(G), and for any v ∈ V(G), the representation of v with respect to R is the l-tuple (d(v,r1),d(v,r2),…,d(v,rl)) and written as r(v,R). The set R is said to be a RS, when different vertices of G have different representations with respect to R. The minimum number of vertices in subset R is called a basis for G, and the cardinality or size of the basis is known as the MD of G, represented by dim(G). For R⊂V(G), r(x,R) = 0, whenever x=ri, the ith component of R. Therefore, to prove that R is resolvable, we have to demonstrate that r(x,R)≠r(y,R), whenever x≠y ∈ V(G) ∖ R. Let w and x be any two vertices of G, where |V(G)|≥2. If for the vertices u,v∈G, d(u,w)−d(u,x)≠d(v,w)−d(v,x), i.e., the difference between their distances to w and x is not equal, then we say that u and v are doubly resolved by w and x. A subset D is said to be DRS, if some of its vertices doubly resolve every pair of the vertices in G. A DRS with the smallest possible size is said to be a minimal DRS, and its size is called as the double metric dimension (DMD), denoted by the ψ(G).
If e1 and e2 are edges of the network G, with the condition that |E(G)|≥2 and dE(f1,e1)−dE(f1,e2)≠dE(f2,e1)−dE(f2,e2), then f1 and f2 are said to be doubly resolved by e1 and e2. If an ordered subset DG={et,1≤t≤k} of edges in G doubly resolves any pair of edges f1 and f2 in E(G), then such a subset DG is called an EVDRS of G. The minimum size of an EVDRS of G is denoted as ψE(G). For more research on these basic concepts, see [37].
The family of circulant network, denoted by Cn(1,2) is the family of networks obtained by constructing a cycle of length n and connecting each vertex vλ with vλ+2 modulo n with a vertex set VCn(1,2)={v1,v2,…,vn} and edge set ECn(1,2)=H∪L, as shown in Figure 1, where H={h1,h2,…,hn} and L={l1,l2,…,ln}.
The edge version of MD for Cn(1,2) was studied in [43], and the result is given below:
Theorem 3.1. [43] Let Cn(1,2) be the circulant networks, then dimE(Cn(1,2))=4, ∀ n≥6.
The following proposition will be helpful in calculating the EVDRSs:
Proposition 3.1. [26] A subset DCn(1,2)={y1,y2,…yk}⊆E(Cn(1,2)) is an EVDRS of Cn(1,2) if, and only if, for every v,y∈E(Cn(1,2)), there exists λ∈{2,3,…,k} such that dE(v,yλ)−dE(v,y1) is not equal to dE(y,yλ)−dE(y,y1).
For every edge e∈E(Cn(1,2)), we define r′E(e,DCn(1,2))=(dE(e,y2)−dE(e,y1),…,dE(e,yk)−dE(e,y1)). The above proposition states that DCn(1,2) is a minimal EVDRS if and only if these distance vectors r′E(e,DCn(1,2)) are all distinct for every edge e∈E(Cn(1,2)).
The statement of the theorem for EVDRSs in circulant networks is as follows:
Theorem 3.2. Let Cn(1,2) be the circulant networks, then ψE(Cn(1,2))=4, for n≥6.
Proof. To compute EVDRSs for circulant networks, we will address the following four scenarios:
Case 1. When n ≡ 0(mod 4) or n=4k, where k≥2.
Consider the set of edges RCn(1,2)={h1,h2,hn2−1,hn2}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 1 and 2 as follows:
rE(h2λ−1,RCn(1,2)) | λ |
(0,1,n4,n4) | if λ=1; |
(λ,λ−1,n4−λ+1,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4−1,0,1) | if λ=n4; |
(λ,n4,2,1) | if λ=n4+1; |
(n2−λ+2,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2. |
r′E(h2λ−1,RCn(1,2)) | λ |
(1,n4,n4) | if λ=1; |
(−1,n4−2λ+1,n4−2λ+1) | if 2≤λ≤n4−1; |
(−1,−n4,1−n4) | if λ=n4; |
(n4−λ,2−λ,1−λ) | if λ=n4+1; |
(0,2λ−3n4−1,2λ−3n4−2) | if n4+2≤λ≤n2. |
rE(h2λ,RCn(1,2)) | λ |
(1,0,n4−1,n4) | if λ=1; |
(λ,λ,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4,1,0) | if λ=n4; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4+1) | if n4+1≤λ≤n2. |
r′E(h2λ,RCn(1,2)) | λ |
(−1,n4−2,n4−1) | if λ=1; |
(0,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(0,1−n4,−n4) | if λ=n4; |
(1,2λ−3n4,2λ−3n4) | if n4+1≤λ≤n2. |
rE(l2λ−1,RCn(1,2)) | λ |
(1,1,n4−1,n4) | if λ=1; |
(λ,λ−1,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,λ−n4+4,λ−n4+1,1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2−1; |
(1,2,n4,n4) | if λ=n2. |
r′E(l2λ−1,RCn(1,2)) | λ |
(0,n4−2,n4−1) | if λ=1; |
(−1,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(λ−n2+4,λ−n2+1,1−n4) | if n4≤λ≤n4+1; |
(1,2λ−3n4,2λ−3n4−1) | if n4+2≤λ≤n2−1; |
(1,n4−1,n4−1) | if λ=n2. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ,n4−λ,n4−λ) | if 1≤λ≤n4−1; |
(n4,n4,λ−n4+1,λ−n4+1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+1,λ−n4+1,λ−n4+1) | if n4+2≤λ≤n2−1; |
(1,1,n4,n4) | if λ=n2. |
r′E(l2λ,RCn(1,2)) | λ |
(0,n4−2λ,n4−2λ) | if 1≤λ≤n4−1; |
(0,λ−n2+1,λ−n2+1) | if n4≤λ≤n4+1; |
(0,2λ−3n4,2λ−3n4) | if n4+2≤λ≤n2−1; |
(0,n4−1,n4−1) | if λ=n2. |
Case 2. When n ≡ 1(mod 4) or n=4k+1, where k≥2.
Consider the set of edges RCn(1,2)={h1,h⌊n2⌋,h⌊n2⌋+1,hn}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 3 and 4 as follows:
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−14,n−14+1,1) | if λ=1; |
(λ,n−14−λ+1,n−14−λ+2,λ) | if 2≤λ≤n−14; |
(n−14+1,1,0,n−14+1) | if λ=n−14+1; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+2) | if n−14+2≤λ≤n−12; |
(1,n−14+1,n−14+1,0) | if λ=n−12+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−14,n−14+1,1) | if λ=1; |
(n−14−2λ+1,n−14−2λ+2,0) | if 2≤λ≤n−14; |
(−n−14,−n−14−1,0) | if λ=n−14+1; |
(2λ−3n−34−2,2λ−3n−34−2,0) | if n−14+2≤λ≤n−12; |
(n−14,n−14,−1) | if λ=n−12+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,0,1,n−14+1) | if λ=n−14; |
(n−12−λ+2,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(h2λ,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34−1,2λ−3n−34−2,−1) | if n−14+1≤λ≤n−12. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ) | if 1≤λ≤n−14; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12; |
(1,n−14,n−14+1,1) | if λ=n−12+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,0) | if 1≤λ≤n−14; |
(2λ−3k−2,2λ−3k−2,−1) | if k+1≤λ≤2k; |
(n−14−1,n−14,0) | if λ=n−12+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−14−λ,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,1,1,n−14+1) | if λ=n−14; |
(n−12−λ+1,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(l2λ,RCn(1,2)) | λ |
(n−14−2λ,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(1−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34,2λ−3n−34−1,0) | if n−14+1≤λ≤n−12. |
Case 3. When n ≡ 2(mod 4) or n=4k+2, where k≥1.
Consider the set of edges RCn(1,2)={h1,hn2−1,hn2,hn}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 5 and 6 as follows:
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−24,n−24+1,1) | if λ=1; |
(λ,n−24−λ+1,n−24−λ+2,λ) | if 2≤λ≤n−24; |
(n−24+1,1,0,n−24+1) | if λ=n−24+1; |
(n−22−λ+3,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+2≤λ≤n−22+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−24,n−24+1,1) | if λ=1; |
(n−24−2i+1,n−24−2λ+2,0) | if 2≤λ≤n−24; |
(−n−24,−n−24−1,0) | if λ=n−24+1; |
(2λ−3n−64−3,2λ−3n−64−3,−1) | if n−24+2≤λ≤n−22+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,0,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22; |
(1,n−24+1,n−24+1,0) | if λ=n−22+1. |
r′E(h2λ,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22; |
(n−24,n−24,−1) | if λ=n−22+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ) | if 1≤λ≤n−24; |
(n−22−λ+2,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,0) | if 1≤λ≤n−24; |
(2λ−3n−64−2,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−24−λ,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,1,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,−n−24,n−22−λ+1) | if n−24+1≤λ≤n−22; |
(1,n−24,n−24+1,1) | if λ=n−22+1. |
r′E(l2λ,RCn(1,2)) | λ |
(n−24−2λ,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(1−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,−1) | if n−24+1≤λ≤n−22; |
(n−24−1,n−24,0) | if λ=n−22+1. |
Case 4. When n ≡ 3(mod 4) or n=4k+3, where k≥1.
Consider the set of edges RCn(1,2)={h1,hn−2,l⌊n2⌋−1,l⌊n2⌋}, then the distance vectors of the edges in relation to RCn(1,2) are shown in Tables 7 and 8 as follows:
rE(h2λ−1,RCn(1,2)) | λ |
(0,2,n−34,n−34+1) | if λ=1; |
(λ,λ+1,n−34−λ+1,n−34−λ+2) | if 2≤λ≤n−34; |
(n−34+1,n−34+1,1,1) | if λ=n−34+1; |
(n−32−λ+3,n−32−λ+2,λ−n−34,n−34−λ−1) | if n−34+2≤λ≤n−32; |
(2,0,n−34+1,n−34) | if λ=n−32+1; |
(1,2,n−34+1,n−34+1) | if λ=⌊n−32+2⌋. |
r′E(h2λ−1,RCn(1,2)) | λ |
(2,n−34,n−34+1) | if λ=1; |
(1,n−34−2λ+1,n−34−2λ+2) | if 2≤λ≤n−34; |
(0,−n−34,−n−34) | if λ=n−34+1; |
(−1,2λ−3n−94−3,−n−34−4) | if n−34+2≤λ≤n−32; |
(−2,n−34−1,n−34−2) | if λ=n−32+1; |
(1,n−34,n−34) | if λ=⌊n−32+2⌋. |
rE(h2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,1,1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(2,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(h2λ,RCn(1,2)) | λ |
(2,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,1−λ,1−λ) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−3) | if n−34+2≤λ≤n−32; |
(−1,n−34+1,n−34+1) | if λ=n−32+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,λ+1,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,2,n−34−λ+1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−+1,λ−n−34,λ−n−34−1) | if n−34+2≤λ≤n−32; |
(−n−32+1,λ−n−32,3n−94−λ+2,−n−34−1) | if n−32+1≤λ≤⌊n−34+2⌋. |
r′E(l2λ−1,RCn(1,2)) | λ |
(1,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,2−λ,n−34−2λ+1) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−4) | if n−34+2≤λ≤n−32; |
(−1,5n−154−2λ−1,n−34−2) | if n−32+1≤λ≤⌊n+12⌋. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,λ−n−34,2) | if n−34≤λ≤n−34+1; |
(n−32−λ+2,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(1,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(l2λ,RCn(1,2)) | λ |
(2,n−34−2λ,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,−n−34,2−λ) | if n−34≤λ≤n−34+1; |
(−1,2λ−3n−94−2,2λ−3n−94−2) | if n−34+2≤λ≤n−32; |
(0,n−34,n−34) | if λ=n−32+1. |
The distance vectors in the above four cases show that each distance vector r′E is unique, resulting in ψE(Cn(1,2)) = 4.
EVDRSs is a mathematical tool within the field of graph theory. They serve as a tool for locating particular edges inside a graph (network) by recognizing a collection of edges that are capable of precisely locating a different edge or set of related edges. In practical scenarios, this variant of graph theory finds numerous applications, including fault detection in various network types such as computer networks and network security systems, as well as tracing the origins of epidemics within social networks and contagious diseases, among other uses (for further information, see [44]).
An EVDRS essentially represents a set of measurements or tests that can be helpful in source localization to detect the origin of a viral disease outbreak or a virus source in complex networks. The term "doubly resolving" is used because it possesses the capability to not only identify the existence of contamination but also differentiate between various source categories. Let us explore the following example to better understand how an EVDRS might be used to identify the origins of epidemics during contagious disease outbreaks.
In a viral disease outbreak scenario, where the city is represented as a circulant network C8(1,2) with edges {h1,h2,h3,h4,h5,h6,h7,h8,l1,l2,l3,l4,l5,l6,l7,l8} as shown in Figure 2, we can employ the minimal EVDRSs to effectively track and control the spread of the virus.
Let us consider the following situation:
● The edges h1,h2,h3,h4,h5, and h6 represent residential areas.
● The edges l1,l2,l3,l4,l5, and l6 represent commercial areas.
● The edges h7,h8,l7, and l8 represent medical facilities.
A quick solution can be achieved by carefully placing observers across the city and ensuring exact and well-documented distances between these edges. However, executing this comprehensive procedure would incur substantial expenses and consume a significant amount of time. As a result, the question arises: how many observers must be deployed to trace the origin of infection when the initial time of commencement is unknown and transmission delays across edges vary? This demands a system in which each edge is distinguished by its minimal distance from strategically placed observers.
For this purpose, we need to identify a minimal set of edges (observers) that, when infection spreads, would uniquely determine the source of the infection and help in containing the spread. In the case where a city is represented by the circulant network C8(1,2), we can choose the following minimal EVDRS: RC8(1,2)={h1,h2h3,h4}.
Let us examine how this works:
Residential Areas: If anyone from the residential areas gets infected, then the source of infection would be uniquely identified from these residential areas using the information collected by the placed observers. This information can help in implementing targeted measures like quarantine, testing, and contact tracing within the residential areas.
Commercial Areas: If an infection spreads in any one of these commercial areas, similarly, by employing the collected data by the placed observer, the source of the infection would point to one of these commercial areas. This knowledge can be used to implement measures like temporary closure, sanitation, and testing within commercial areas.
Medical Facilities: If the infection has reached one of the medical facilities, then by finding the unknown starting time and edge-to-edge transmission delays using EVDRSs, the source of infection would be uniquely identified. This information is crucial for implementing measures to protect healthcare workers and patients and prevent further transmission within medical facilities.
By means of the careful monitoring and tracking of infection via these basic EVDRSs, health authorities and decision-makers can efficiently allocate resources, identify interventions, and make informed decisions to control the viral disease outbreak in the city.
There are numerous practical uses for circulant networks, particularly in distributed computing and computer networks. Particularly, circulant networks can be used for task assignments, load balancing, and data spreading in distributed computing systems. Circulant networks are beneficial for efficient routing and resource allocation due to their regular nature. Also, circulant networks offer an effective way to organize the communication architecture in sensor networks, where multiple sensors send data to a central node (or edge) or among one another.
Moreover, these networks can be utilized in wireless mesh networks, which expand network coverage by using wireless communication among nodes, or edges. Because of their regular structure, circulant networks are suitable for distributing computational workloads among multiple nodes (or edges) in an efficient manner. Moreover, they can be applied in social areas, in which coordination and a communication mechanism between distant units are needed. For instance, a social network or Internet of Things system.
The present paper has tackled the notion of EVDRSs in circulant networks Cn(1,2), EVDRSs being a set of edges in a network that ascertains that each edge has a unique representation in relation to the elements of an EVDRS. The main goals were to characterize the minimal size of EVDRS for circulant networks Cn(1,2) as well as to understand their structural properties. To sum up, the present study has focused on EVDRSs in circulant networks Cn(1,2) and has made significant advances in comprehending their structural features, determining their minimal size, and highlighting their independence from the parity of n. The results of the above investigations extend the understanding of graph theory and have practical implications in several fields, such as telecommunications and distributed computing, which rely on well-built and efficient networks. Our research findings are important for helping to create more robust and efficient networks, as well as for developing the theory of graph-based communication systems.
Because the obtained results are specific to circulant networks Cn(1,2), they may not hold true for other network topologies. It could be difficult to convert theoretical results into practical implementations, especially in complex and dynamic networks. Collaborating with specialists in related fields such as network engineering, epidemiology, and computer science may be necessary for fully comprehending the potential impact of the research in several domains. In fact, bridging the gap between theoretical research and practical applications can be greatly aided by disciplinary collaboration. Interdisciplinary collaboration can solve the shortcomings of specific disciplines by combining ideas and techniques from other domains, producing more trustworthy and useful research results. This could then lead to a greater impact from these discoveries in a variety of domains, eventually resulting in useful answers and breakthroughs in various disciplines of research.
Open Problem 5.1. Investigate the EVDRSs for the Chordal Ring network CRn(1,3,5), ∀ even integers n≥6.
Ruby Nasir and Muhammad Ahmad conducted the final review and made sure the results were validated at the problem discussion. Zohaib Zahid was helpful in initiating the problem, obtaining necessary information, and offering continuous supervision. Initiating the study's drafting process and contributing significantly to its analysis and computation was Sanaa A. Bajri. In addition to contributing to the methodology, Hamiden Abd El-Wahed Khalifa actively discussed the issue and carefully proofread the final draft.
The authors declare they have not used artificial intelligence (AI) tools in the creation of this article.
The Research is funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2024R527), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
[1] | M. K. Bombe, Unmanned Aerial Vehicle (UAV) Market Worth $21.8 billion by 2027- Pre and Post COVID-19 Market Analysis Report by Meticulous Research, 11 June 2020. Available from: https://www.meticulousresearch.com/download-sample-report/cp_id=5086. |
[2] |
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, T. R. Gadekallu, G. Srivastava, SP2F: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles, Comput. Netw., 14 (2021), 107819. https://doi.org/10.1016/j.comnet.2021.107819 doi: 10.1016/j.comnet.2021.107819
![]() |
[3] |
S. Hayat, E. Yanmaz, R. Muzaffar, Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications View point, IEEE Commun. Surv. Tut., 18 (2016), 2624–2661. https://doi.org/10.1109/COMST.2016.2560343 doi: 10.1109/COMST.2016.2560343
![]() |
[4] |
K. Chan, U. Nirmal, W. Cheaw, Progress on drone technology and their applications: a comprehensive review, AIP Conf. Proc. 2030, 020308 (2018). https://doi.org/10.1063/1.5066949 doi: 10.1063/1.5066949
![]() |
[5] | S. C. Hartmann K, The vulnerability of UAVs to cyber, in Cyber Conflict (CyCon) 2013 5th International Conference, Tallinn, Estonia, 2013. |
[6] | S. O'Donnell, Consortiq. Available from: https://consortiq.com/short-history-unmanned-aerial-vehicles-uavs/. |
[7] | D. Ekramul, First successful Air-raid in history, 22 August 2019. Available from: https://www.daily-bangladesh.com/english/First-successful-Air-raid-in-history/27424. |
[8] | T. R. Berg, Air Space Mag, 10 January 2020. Available from: https://www.airspacemag.com/daily-planet/first-map-compiled-aerial-photographs-180973929/. |
[9] | Q. A. Abdullah, Introduction to the Unmanned Aircraft Systems, Available from: https://www.e-education.psu.edu/geog892/node/643. |
[10] | M. Bowden, How the Predator Drone Changed the Character of War, Smithsonian Magazine, November 2013. Available from: https://www.smithsonianmag.com/history/how-the-predator-drone-changed-the-character-of-war-3794671/. |
[11] | A. Miah, Drones: The Brilliant, the Bad and the Beautiful (Societynow), London: Emerald Publishing Limited, 2020. https://doi.org/10.1108/9781838679859 |
[12] | S. Wright, Ethical and safety implications of the growing use of civilian drone, UK Parliament Website (Science and Technology Committee), 2019. |
[13] | C. Lowbridge, Are drones dangerous or harmless fun?, BBC News, 5 October 2015. Available from: https://www.bbc.com/news/uk-england-34269585. |
[14] | Federal Aviation Authorities, Recreational Flyers & Modeler Community-Based Organizations, 18 February 2020. Available from: https://www.faa.gov/uas/recreational_fliers/. |
[15] | U. Coach, Master List of Drone Laws (Organized by State & Country), Available from: https://uavcoach.com/drone-laws/. |
[16] |
M. Aljehani, M. Inoue, A. Watanbe, T. Yokemura, F. Ogyu, H. Iida, UAV communication system integrated into network traversal with mobility, SN Appl. Sci., 2 (2020), 1057. https://doi.org/10.1007/s42452-020-2749-5 doi: 10.1007/s42452-020-2749-5
![]() |
[17] | A. Professionals, Drones and remotely piloted aircraft (UAS/RPAS) - frequencies and radio licenses, Traficom, 17 July 2021. Available from: https://www.traficom.fi/en/transport/aviation/drones-and-remotely-piloted-aircraft-uasrpas-frequencies-and-radio-licences. |
[18] | C. Carnahan, ISO/TC 20/SC 16 Unmanned aircraft systems, 2014. Available from: https://www.iso.org/committee/5336224.html. |
[19] | Pilot, What's the Difference Between Drones, UAV, and UAS? Definitions and Terms, Pilot Institute, 22 March 2020. Available from: https://pilotinstitute.com/drones-vs-uav-vs-uas/. |
[20] |
A. Fotouhi, H. Qiang, M. Ding, M. Hassan, L. G. Giordano, A. Garcia-Rodriguez, et al., Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges, IEEE Commun. Surv. Tut., 21 (2019), 3417–3442. https://doi.org/10.1109/COMST.2019.2906228 doi: 10.1109/COMST.2019.2906228
![]() |
[21] | J. Irizarry, M. Gheisari, B. Walker, Usability Assessment of Drone Technology as Safety Inspection Tools, Electron. J. Inf. Technol. Constr., 17 (2012), 194–212. |
[22] |
M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, M. Debbah, A Tutorial on UAVs for Wireless Networks: Applications, Challenges, and Open Problems, IEEE Commun. Surv. Tut., 21 (2019), 2334–2360. https://doi.org/10.1109/COMST.2019.2902862 doi: 10.1109/COMST.2019.2902862
![]() |
[23] | K. Nagpal, Unmanned Aerial Vehicles (UAV) Market, Q Tech Synergy, 24 December 2016. Available from: https://defproac.com/?p=2041. |
[24] | E. Pastor, J. Lopez, P. Royo, A Hardware/Software Architecture for UAV Payload and Mission Control, 2006 IEEE/AIAA 25TH Digital Avionics Systems Conference, Portland, 2006, 1–8. https://doi.org/10.1109/DASC.2006.313738 |
[25] | J. VanZwol, Design Essentials: For UAVs and Drones, Batteries are Included, Machine Design, 4 April 2017. Available from: https://www.machinedesign.com/mechanical-motion-systems/article/21835356/design-essentials-for-uavs-and-drones-batteries-are-included. |
[26] |
A. Sharma, P. Vanjani, N. Paliwal, C. M. Basnayaka, D. N. K. Jayakody, H.C. Wang, et al., Communication and networking technologies for UAVs: A survey, J. Netw. Comput. Appl., 168 (2020), 102739. https://doi.org/10.1016/j.jnca.2020.102739 doi: 10.1016/j.jnca.2020.102739
![]() |
[27] |
H. Ullah, N. G. Nair, A. Moore, C. Nugent, P. Muschamp, M. Cuevas, 5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases, IEEE Access, 7 (2019), 37251–37268. https://doi.org/10.1109/ACCESS.2019.2905347 doi: 10.1109/ACCESS.2019.2905347
![]() |
[28] | C. Luo, W. Miao, H. Ullah, S. McClean, G. Parr, G. Min, Unmanned aerial vehicles for disaster management, Geological Disaster Monitoring Based on Sensor Networks, Singapore, Springer, 2018, 93-107. https://doi.org/10.1007/978-981-13-0992-2_7 |
[29] | N. Hosseini, H. Jamal, D. W. Matolak, J. Haque, T. Magesacher, UAV Command and Control, Navigation and Surveillance: A Review of Potential 5G and Satellite, IEEE Aerospace Conference March 2019, MT, USA, 2019. https://doi.org/10.1109/AERO.2019.8741719 |
[30] | IvyPanda, Unmanned Aerial Vehicles Essay, 13 January 2020. Available from: https://ivypanda.com/essays/unmanned-aerial-vehicles-essay/. (Accessed 20 December 2020). |
[31] | K. P. Valavanis, G. J. Vachtsevanos, UAV Applications: Introduction, in Handbook of Unmanned Aerial Vehicles, Dordrecht, Springer, 2015, pp. 2639–2641. https://doi.org/10.1007/978-90-481-9707-1_151 |
[32] |
H. Shakhatreh, A. H. Sawalmeh, A. Al-Fuqaha, Z. Dou, E. Almaita, I. Khalil, et al., Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges, IEEE Access, 7 (2019), 48572–48634. https://doi.org/10.1109/ACCESS.2019.2909530 doi: 10.1109/ACCESS.2019.2909530
![]() |
[33] | K. L. B. Cook, The Silent Force Multiplier: The History and Role of UAVs in Warfare, in 2007 IEEE Aerospace Conference, MT, USA, 2007. |
[34] | M. A. Siddiqi, M. Khoso, A. Aziz, Analysis on Security Methods of Wireless Sensor Network (WSN), in SJCMS 2018, Sukkur, Pakistan, 2018. |
[35] | A. Cavoukian, Privacy and Drones: Unmanned Aerial Vehicle, Ontario: Information and Privacy Commissioner, Ontario, Canada, 2012. |
[36] |
M. A. Kafia, Y. Challal, D. Djenouri, M. Doudou, A. Bouabdallah, N. Badache, A Study of Wireless Sensor Networks for Urban Traffic Monitoring: Applications and Architectures, Procedia Comput. Sci., 19 (2013), 617–626. https://doi.org/10.1016/j.procs.2013.06.082 doi: 10.1016/j.procs.2013.06.082
![]() |
[37] | K. Mansfield, T. Eveleigh, T. H. Holzer, S. Sarkani, Unmanned aerial vehicle smart device ground control station cyber security threat model, 2013 IEEE Int. Conf. Technol. Homel. Secur. (HST), Walthan, USA, 2013. https://doi.org/10.1109/THS.2013.6699093 |
[38] | K. W. Smith, Drone Technology: Benefits, Risks, and Legal Considerations, Seattle J. Environ. Law (SJEL), 5 (2015), 291–302. |
[39] | J. Eyerman, K. Hinkle, C. Letterman, D. Schanzer, W. Pitts, K. Ladd, et al., Unmanned Aircraft and the Human Element: Public Perceptions and First Responder Concerns, Institute of Homeland security and solutions, 2013. |
[40] | N. Syed, M. Berry, Journo-drones: a Flight over the Legal Landscape, American Bar Association, Chicago, Illinois, United States, 2014. |
[41] | M. F. B. A. Rahman, Smart CCTVS for Secure Cities: Potentials and Challenges, S. Rajaratnam School of International Studies (RSIS), Singapore, 2017. |
[42] |
A. Kim, B. Wampler, J. Goppert, I. Hwang, H. Aldridge, Cyber Attack Vulnerabilities Analysis for Unmanned Aerial Vehicles, Aerospace Research Central, (2012), 2438. https://doi.org/10.2514/6.2012-2438 doi: 10.2514/6.2012-2438
![]() |
[43] |
Y. Zeng, R. Zhang, T. J. Lim, Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges, IEEE Commun. Mag., 54 (2016), 36–42. https://doi.org/10.1109/MCOM.2016.7470933 doi: 10.1109/MCOM.2016.7470933
![]() |
[44] |
P. R. Soria, R. Bevec, B. C. Arrue, A. Ude, A. Ollero, Extracting Objects for Aerial Manipulation on UAVs Using Low Cost Stereo Sensors, Sensors, 16 (2016), 700. https://doi.org/10.3390/s16050700 doi: 10.3390/s16050700
![]() |
[45] | M. Erdelj, E. Natalizio, Drones, Smartphones and Sensors to Face Natural Disasters, 4th ACM Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, France, 2018, 75–86. https://doi.org/10.1145/3213526.3213541 |
[46] | Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, et al., Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors, in 24th USENIX Security Symposium, Washington, D.C, 2015. |
[47] |
Y. Zhi, Z. Fu, X. Sun, J. Yu, Security and Privacy Issues of UAV: A Survey, Mobile Netw. Appl., 25 (2019), 95–101. https://doi.org/10.1007/s11036-018-1193-x doi: 10.1007/s11036-018-1193-x
![]() |
[48] |
M. Strohmeier, M. Schäfer, V. Lenders, I. Martinovic, Realities and challenges of nextgen air traffic management: the case of ADS-B, IEEE Commun. Mag., 52 (2014), 111–118. https://doi.org/10.1109/MCOM.2014.6815901 doi: 10.1109/MCOM.2014.6815901
![]() |
[49] |
M. Hooper, Y. Tian, R. Zhou, B. Cao, A. P. Lauf, L. Watkins, et al., Securing commercial wifi-based UAVs from common security attacks, MILCOM 2016-2016 IEEE Military Communications Conference, 2016, 1213–1218. https://doi.org/10.1109/MILCOM.2016.7795496 doi: 10.1109/MILCOM.2016.7795496
![]() |
[50] | E. Rivera, R. Baykov, G. Gu, A Study On Unmanned Vehicles and Cyber Security, in Rivera 2014 ASO, Texas, USA, 2014. |
[51] |
I. N. Junejo, H. Foroosh, GPS coordinates estimation and camera calibration from solar shadows, Comput. Vis. Image Underst., 114 (2010), 991–1003. https://doi.org/10.1016/j.cviu.2010.05.003 doi: 10.1016/j.cviu.2010.05.003
![]() |
[52] | K. Hartmann, K. Giles, UAV Exploitation: A New Domain for Cyber Power, 2016 8th Int. Conf. Cyber Conflict, Tallinn, Estonia, 2016,205–221. https://doi.org/10.1109/CYCON.2016.7529436 |
[53] | C. Currier, H. Moltke, Spies in the sky, The Intercept, New York, USA, 2016. |
[54] |
E. Yadereli, C. Gemci, A. Z. Akta, A study on cyber-security of autonomous and unmanned vehicles, J. Def. Model. Simul., 12 (2015), 369–381. https://doi.org/10.1177/1548512915575803 doi: 10.1177/1548512915575803
![]() |
[55] | Y. S. Lee, Y. J. Kang, S. G. Lee, H. Lee, Y. Ryu, An overview of unmanned aerial vehicle: Cyber security perspective, in IT Convergence Technology 2016, Korea, 2016. |
[56] | L. Wu and X. Cao, Geo-location estimation from two shadow trajectories, in Computer Vision and Pattern Recognition (CVPR), San Francisco. USA, 2010. |
[57] | C. G. Leela Krishna, R. R. Murphy, A Review on Cybersecurity Vulnerabilities for Unmanned Aerial Vehicles, 2017 IEEE Int. Symposium on Safety, Security and Rescue Robotics (SSRR), Shanghai, China, 2017,194–199. https://doi.org/10.1109/SSRR.2017.8088163 |
[58] |
M. A. Siddiqi, W. Pak, Optimizing Filter-Based Feature Selection Method Flow for Intrusion Detection System, Electronics, 9 (2020), 2114. https://doi.org/10.3390/electronics9122114 doi: 10.3390/electronics9122114
![]() |
[59] | M. Strohmeier, V. Lenders, I. Martinovic, Intrusion Detection for Airborne Communication Using PHY-Layer Information, Int. Conf. Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, Cham, 2015, 67–77. https://doi.org/10.1007/978-3-319-20550-2_4 |
[60] | S. G. Casals, P. Owezarski, G. Descargues, Generic And Autonomous System For Airborne Networks Cyber-Threat Detection, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), IEEE, 2013. https://doi.org/10.1109/DASC.2013.6712578 |
[61] |
C. Rani, H. Modares, R. Sriram, D. Mikulski, F. L. Lewis, Security of unmanned aerial vehicle systems against cyber-physical attacks, J. Def. Model. Simul., 13 (2016), 331–342. https://doi.org/10.1177/1548512915617252 doi: 10.1177/1548512915617252
![]() |
[62] |
G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV Communications via Joint Trajectory and Power Control, IEEE Trans. Wireless Commun., 18 (2019), 1376–1389, . https://doi.org/10.1109/TWC.2019.2892461 doi: 10.1109/TWC.2019.2892461
![]() |
[63] | Y. S. Lee, E. Kim, Y. S. Kim, D. C. Seol, Effective Message Authentication Method for Performing a Swarm Flight of Drones, Emergency, 3 (2015), 95–97. |
[64] |
E. S. Pilli, R. Joshi, R. Niyogi, A Generic Framework for Network Forensics, International J. Comput. Appl., 1 (2010), 1–6. https://doi.org/10.5120/251-408 doi: 10.5120/251-408
![]() |
[65] |
N. L. Beebe, J. G. Clark, A hierarchical, objectives-based framework for the digital investigations process, Digit. Investig., 2 (2005), 147–167. https://doi.org/10.1016/j.diin.2005.04.002 doi: 10.1016/j.diin.2005.04.002
![]() |
[66] |
U. Jain, M. Rogers, E. T. Matson, Drone forensic framework: Sensor and data identification and verification, 2017 IEEE Sensors Appl. Symp. (SAS), 2017, 1–6. https://doi.org/10.1109/SAS.2017.7894059 doi: 10.1109/SAS.2017.7894059
![]() |
[67] | A. Roder, K. K. R. Choo, N. A. Le-Khac, Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, arXiv preprint arXiv: 1804.08649, 2018. |
[68] |
M. A. Siddiqi, N. Ghani, Critical Analysis on Advanced Persistent Threats, Int. J. Comput. Appl., 141 (2016), 46–50. https://doi.org/10.5120/ijca2016909784 doi: 10.5120/ijca2016909784
![]() |
[69] |
G. Wild, J. Murray, G. Baxter, Exploring Civil Drone Accidents and Incidents to Help Prevent Potential Air Disasters, Aerospace, 3 (2016), 22. https://doi.org/10.3390/aerospace3030022 doi: 10.3390/aerospace3030022
![]() |
[70] | M. Goodrich, Drone Catcher: "Robotic Falcon" can Capture, Retrieve Renegade Drones, Michigan Tech, 7 January 2016. Available from: https://www.mtu.edu/news/stories/2016/january/drone-catcher-robotic-falcon-can-capture-retrieve-renegade-drones.html. |
[71] | M. McNabb, Dedrone Acquires the Anti Drone Shoulder Rifle, Batelle's Drone Defender, Drone life, 9 October 2019. Available from: https://dronelife.com/2019/10/09/dedrone-acquires-the-anti-drone-shoulder-rifle-batelles-drone-defender/. |
[72] | E. Capello, M. Dentis, L. N. Mascarello, S. Primatesta, Regulation Analysis and New Concept for a Cloud-based UAV Supervision System in Urban Environment, 2017 Workshop on Research, Education and Development of Unmanned Aerial Systems (RED-UAS), IEEE, (2017), 90–95. https://doi.org/10.1109/RED-UAS.2017.8101649 |
[73] | R. Joglekar, 4 strategies for stopping 'rogue' drones from flying in illegal airspace, ABC news, 23 December 2018. Available from: https://abcnews.go.com/Technology/strategies-stopping-rogue-drones-flying-illegal-airspace/story?id=59973853. |
[74] | S. Friedberg, A Primer on Jamming, Spoofing, and Electronic Interruption of a Drone, Dedrone, 19 April 2018. Available from: https://blog.dedrone.com/en/primer-jamming-spoofing-and-electronic-interruption-of-a-drone. |
[75] | T. E. O. Cyber, How To Crack WPA/WPA2 Wi-Fi Passwords Using Aircrack-ng, Medium, 5 November 2019. Available from: https://medium.com/@TheEyeOfCyberBuckeyeSecurity/how-to-crack-wpa-wpa2-wi-fi-passwords-using-aircrack-ng-8cb7161abcf9. |
[76] |
J. P. Yaacoub, H. Noura, O. Salman, A. Chehab, Security analysis of drones systems: Attacks, limitations, and recommendations, Internet Things, 11 (2020), 100218. https://doi.org/10.1016/j.iot.2020.100218 doi: 10.1016/j.iot.2020.100218
![]() |
[77] | C. A. T. Bonilla, O. J. S. Parra, J. H. D. Forero, Common Security Attacks on Drones, Int. J. Appl. Eng. Res., 13 (2018), 4982–4988. |
[78] |
J. Gaspar, R. Ferreira, P. Sebastião, N. Souto, Capture of UAVs Through GPS Spoofing Using Low-Cost SDR Platforms, Wireless Pers. Commun., 115 (2020), 2729–2754. https://doi.org/10.1007/s11277-020-07211-7 doi: 10.1007/s11277-020-07211-7
![]() |
[79] | M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, I. Guvenc, Micro-UAV Detection and Classification from RF Fingerprints Using Machine Learning Techniques, 2019 IEEE Aerospace Conf., IEEE, (2019), 1–13. https://doi.org/10.1109/AERO.2019.8741970 |
[80] |
A. Digulescu, C. Despina-Stoian, D. Stanescu, F. Popescu, F. Enache, C. Ioana, et al., New Approach of UAV Movement Detection and Characterization Using Advanced Signal Processing Methods Based on UWB Sensing, Sensors, 20 (2020), 5904. https://doi.org/10.3390/s20205904 doi: 10.3390/s20205904
![]() |
[81] |
I. Bisio, C. Garibotto, F. Lavagetto, A. Sciarrone, S. Zappatore, Unauthorized Amateur UAV Detection Based on WiFi Statistical Fingerprint Analysis, IEEE Commun. Mag., 56 (2018), 106–111. https://doi.org/10.1109/MCOM.2018.1700340 doi: 10.1109/MCOM.2018.1700340
![]() |
[82] | G. Choudhary, V. Sharma, T. Gupta, J. Kim, I. You, Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives, in MobiSec 2018: The 3rd International Symposium on Mobile Internet Security, Cebu, Philippines, 2018 |
[83] |
H. N.Noura, O. Salman, A. Chehab and R. Couturier, DistLog: A distributed logging scheme for IoT forensics, Ad Hoc Netw., 98 (2020), 102061. https://doi.org/10.1016/j.adhoc.2019.102061 doi: 10.1016/j.adhoc.2019.102061
![]() |
[84] | R. S. Cohen, The Drone Zappers, Air Force Magazine, 22 March 2019. Available: https://www.airforcemag.com/article/the-drone-zappers/. |
[85] |
M. A. Siddiqi, H. Yu, J. Joung, 5G Ultra-Reliable Low-Latency Communication Implementation Challenges and Operational Issues with IoT Devices, Electronics, 8 (2019), 981. https://doi.org/10.3390/electronics8090981 doi: 10.3390/electronics8090981
![]() |
[86] |
G. Zhang, Q. Wu, M. Cui, R. Zhang, Securing UAV communications via joint trajectory and power control, IEEE Trans. Wireless Commun., 18 (2019), 1376–1389. https://doi.org/10.1109/TWC.2019.2892461 doi: 10.1109/TWC.2019.2892461
![]() |
[87] | K. Mizokami, Air Force Downs Several Drones With New ATHENA Laser Weapon System, Popular Mechanics, 8 November 2019. Available from: https://www.popularmechanics.com/military/research/a29727696/athena-laser-weapon/. |
[88] | Federal Aviation Administration, Become a Drone Pilot, Become a pilot, May 19, 2021. Available from: https://www.faa.gov/uas/commercial_operators/become_a_drone_pilot/. |
[89] | Transport Canada, Where to fly your drone, Drone safety, February 19, 2021. Available from: https://tc.canada.ca/en/aviation/drone-safety/where-fly-your-drone. |
[90] |
R. Ch, G. Srivastava, T. R. Gadekallu, P. K. Maddikunta, S. Bhattacharya, Security and privacy of UAV data using blockchain technology, J. Inf. Secur. Appl., 55 (2020), 102670. https://doi.org/10.1016/j.jisa.2020.102670 doi: 10.1016/j.jisa.2020.102670
![]() |
[91] | Sinha Satyajit, Securing IoT with Blockchain, Counterpoint, 11 May 2018. Available from: https://www.counterpointresearch.com/securing-iot-blockchain/. |
[92] |
W. Wang, H. Xu, M. Alazab, T. R. Gadekallu, Z. Han, C. Su, Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices, IEEE Trans. Ind. Inform., 2021. https://doi.org/10.1109/TII.2021.3084753 doi: 10.1109/TII.2021.3084753
![]() |
[93] |
W. Wang, H. Huang, L. Zhang, and C. Su, Secure and efficient mutual authentication protocol for smart grid under blockchain, Peer-to-Peer Netw. Appl., 14 (2020), 2681–2693. https://doi.org/10.1007/s12083-020-01020-2 doi: 10.1007/s12083-020-01020-2
![]() |
[94] |
L. Zhang, Z. Zhang, W. Wang, Z. Jin, Y. Su, H. Chen, Research on a Covert Communication Model Realized by Using Smart Contracts in Blockchain Environment, IEEE Syst. J., 2021. https://doi.org/10.1109/JSYST.2021.3057333 doi: 10.1109/JSYST.2021.3057333
![]() |
[95] |
L. Zhang, Y. Zou, W. Wang, Z. Jin, Y. Su, H. Chen, Resource allocation and trust computing for blockchain-enabled edge computing system, Comput. Secur., 105 (2021), 102249. https://doi.org/10.1016/j.cose.2021.102249 doi: 10.1016/j.cose.2021.102249
![]() |
[96] |
L. Zhang, M. Peng, W. Wang, Z. Jin, Y. Su, H. Chen, Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing, Trans. Emerging Telecommun. Technol., (2021), e4315. https://doi.org/10.1002/ett.4315 doi: 10.1002/ett.4315
![]() |
rE(h2λ−1,RCn(1,2)) | λ |
(0,1,n4,n4) | if λ=1; |
(λ,λ−1,n4−λ+1,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4−1,0,1) | if λ=n4; |
(λ,n4,2,1) | if λ=n4+1; |
(n2−λ+2,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2. |
r′E(h2λ−1,RCn(1,2)) | λ |
(1,n4,n4) | if λ=1; |
(−1,n4−2λ+1,n4−2λ+1) | if 2≤λ≤n4−1; |
(−1,−n4,1−n4) | if λ=n4; |
(n4−λ,2−λ,1−λ) | if λ=n4+1; |
(0,2λ−3n4−1,2λ−3n4−2) | if n4+2≤λ≤n2. |
rE(h2λ,RCn(1,2)) | λ |
(1,0,n4−1,n4) | if λ=1; |
(λ,λ,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4,1,0) | if λ=n4; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4+1) | if n4+1≤λ≤n2. |
r′E(h2λ,RCn(1,2)) | λ |
(−1,n4−2,n4−1) | if λ=1; |
(0,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(0,1−n4,−n4) | if λ=n4; |
(1,2λ−3n4,2λ−3n4) | if n4+1≤λ≤n2. |
rE(l2λ−1,RCn(1,2)) | λ |
(1,1,n4−1,n4) | if λ=1; |
(λ,λ−1,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,λ−n4+4,λ−n4+1,1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2−1; |
(1,2,n4,n4) | if λ=n2. |
r′E(l2λ−1,RCn(1,2)) | λ |
(0,n4−2,n4−1) | if λ=1; |
(−1,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(λ−n2+4,λ−n2+1,1−n4) | if n4≤λ≤n4+1; |
(1,2λ−3n4,2λ−3n4−1) | if n4+2≤λ≤n2−1; |
(1,n4−1,n4−1) | if λ=n2. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ,n4−λ,n4−λ) | if 1≤λ≤n4−1; |
(n4,n4,λ−n4+1,λ−n4+1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+1,λ−n4+1,λ−n4+1) | if n4+2≤λ≤n2−1; |
(1,1,n4,n4) | if λ=n2. |
r′E(l2λ,RCn(1,2)) | λ |
(0,n4−2λ,n4−2λ) | if 1≤λ≤n4−1; |
(0,λ−n2+1,λ−n2+1) | if n4≤λ≤n4+1; |
(0,2λ−3n4,2λ−3n4) | if n4+2≤λ≤n2−1; |
(0,n4−1,n4−1) | if λ=n2. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−14,n−14+1,1) | if λ=1; |
(λ,n−14−λ+1,n−14−λ+2,λ) | if 2≤λ≤n−14; |
(n−14+1,1,0,n−14+1) | if λ=n−14+1; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+2) | if n−14+2≤λ≤n−12; |
(1,n−14+1,n−14+1,0) | if λ=n−12+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−14,n−14+1,1) | if λ=1; |
(n−14−2λ+1,n−14−2λ+2,0) | if 2≤λ≤n−14; |
(−n−14,−n−14−1,0) | if λ=n−14+1; |
(2λ−3n−34−2,2λ−3n−34−2,0) | if n−14+2≤λ≤n−12; |
(n−14,n−14,−1) | if λ=n−12+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,0,1,n−14+1) | if λ=n−14; |
(n−12−λ+2,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(h2λ,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34−1,2λ−3n−34−2,−1) | if n−14+1≤λ≤n−12. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ) | if 1≤λ≤n−14; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12; |
(1,n−14,n−14+1,1) | if λ=n−12+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,0) | if 1≤λ≤n−14; |
(2λ−3k−2,2λ−3k−2,−1) | if k+1≤λ≤2k; |
(n−14−1,n−14,0) | if λ=n−12+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−14−λ,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,1,1,n−14+1) | if λ=n−14; |
(n−12−λ+1,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(l2λ,RCn(1,2)) | λ |
(n−14−2λ,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(1−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34,2λ−3n−34−1,0) | if n−14+1≤λ≤n−12. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−24,n−24+1,1) | if λ=1; |
(λ,n−24−λ+1,n−24−λ+2,λ) | if 2≤λ≤n−24; |
(n−24+1,1,0,n−24+1) | if λ=n−24+1; |
(n−22−λ+3,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+2≤λ≤n−22+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−24,n−24+1,1) | if λ=1; |
(n−24−2i+1,n−24−2λ+2,0) | if 2≤λ≤n−24; |
(−n−24,−n−24−1,0) | if λ=n−24+1; |
(2λ−3n−64−3,2λ−3n−64−3,−1) | if n−24+2≤λ≤n−22+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,0,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22; |
(1,n−24+1,n−24+1,0) | if λ=n−22+1. |
r′E(h2λ,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22; |
(n−24,n−24,−1) | if λ=n−22+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ) | if 1≤λ≤n−24; |
(n−22−λ+2,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,0) | if 1≤λ≤n−24; |
(2λ−3n−64−2,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−24−λ,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,1,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,−n−24,n−22−λ+1) | if n−24+1≤λ≤n−22; |
(1,n−24,n−24+1,1) | if λ=n−22+1. |
r′E(l2λ,RCn(1,2)) | λ |
(n−24−2λ,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(1−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,−1) | if n−24+1≤λ≤n−22; |
(n−24−1,n−24,0) | if λ=n−22+1. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,2,n−34,n−34+1) | if λ=1; |
(λ,λ+1,n−34−λ+1,n−34−λ+2) | if 2≤λ≤n−34; |
(n−34+1,n−34+1,1,1) | if λ=n−34+1; |
(n−32−λ+3,n−32−λ+2,λ−n−34,n−34−λ−1) | if n−34+2≤λ≤n−32; |
(2,0,n−34+1,n−34) | if λ=n−32+1; |
(1,2,n−34+1,n−34+1) | if λ=⌊n−32+2⌋. |
r′E(h2λ−1,RCn(1,2)) | λ |
(2,n−34,n−34+1) | if λ=1; |
(1,n−34−2λ+1,n−34−2λ+2) | if 2≤λ≤n−34; |
(0,−n−34,−n−34) | if λ=n−34+1; |
(−1,2λ−3n−94−3,−n−34−4) | if n−34+2≤λ≤n−32; |
(−2,n−34−1,n−34−2) | if λ=n−32+1; |
(1,n−34,n−34) | if λ=⌊n−32+2⌋. |
rE(h2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,1,1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(2,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(h2λ,RCn(1,2)) | λ |
(2,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,1−λ,1−λ) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−3) | if n−34+2≤λ≤n−32; |
(−1,n−34+1,n−34+1) | if λ=n−32+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,λ+1,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,2,n−34−λ+1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−+1,λ−n−34,λ−n−34−1) | if n−34+2≤λ≤n−32; |
(−n−32+1,λ−n−32,3n−94−λ+2,−n−34−1) | if n−32+1≤λ≤⌊n−34+2⌋. |
r′E(l2λ−1,RCn(1,2)) | λ |
(1,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,2−λ,n−34−2λ+1) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−4) | if n−34+2≤λ≤n−32; |
(−1,5n−154−2λ−1,n−34−2) | if n−32+1≤λ≤⌊n+12⌋. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,λ−n−34,2) | if n−34≤λ≤n−34+1; |
(n−32−λ+2,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(1,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(l2λ,RCn(1,2)) | λ |
(2,n−34−2λ,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,−n−34,2−λ) | if n−34≤λ≤n−34+1; |
(−1,2λ−3n−94−2,2λ−3n−94−2) | if n−34+2≤λ≤n−32; |
(0,n−34,n−34) | if λ=n−32+1. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,1,n4,n4) | if λ=1; |
(λ,λ−1,n4−λ+1,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4−1,0,1) | if λ=n4; |
(λ,n4,2,1) | if λ=n4+1; |
(n2−λ+2,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2. |
r′E(h2λ−1,RCn(1,2)) | λ |
(1,n4,n4) | if λ=1; |
(−1,n4−2λ+1,n4−2λ+1) | if 2≤λ≤n4−1; |
(−1,−n4,1−n4) | if λ=n4; |
(n4−λ,2−λ,1−λ) | if λ=n4+1; |
(0,2λ−3n4−1,2λ−3n4−2) | if n4+2≤λ≤n2. |
rE(h2λ,RCn(1,2)) | λ |
(1,0,n4−1,n4) | if λ=1; |
(λ,λ,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,n4,1,0) | if λ=n4; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4+1) | if n4+1≤λ≤n2. |
r′E(h2λ,RCn(1,2)) | λ |
(−1,n4−2,n4−1) | if λ=1; |
(0,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(0,1−n4,−n4) | if λ=n4; |
(1,2λ−3n4,2λ−3n4) | if n4+1≤λ≤n2. |
rE(l2λ−1,RCn(1,2)) | λ |
(1,1,n4−1,n4) | if λ=1; |
(λ,λ−1,n4−λ,n4−λ+1) | if 2≤λ≤n4−1; |
(n4,λ−n4+4,λ−n4+1,1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+2,λ−n4+1,λ−n4) | if n4+2≤λ≤n2−1; |
(1,2,n4,n4) | if λ=n2. |
r′E(l2λ−1,RCn(1,2)) | λ |
(0,n4−2,n4−1) | if λ=1; |
(−1,n4−2λ,n4−2λ+1) | if 2≤λ≤n4−1; |
(λ−n2+4,λ−n2+1,1−n4) | if n4≤λ≤n4+1; |
(1,2λ−3n4,2λ−3n4−1) | if n4+2≤λ≤n2−1; |
(1,n4−1,n4−1) | if λ=n2. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ,n4−λ,n4−λ) | if 1≤λ≤n4−1; |
(n4,n4,λ−n4+1,λ−n4+1) | if n4≤λ≤n4+1; |
(n2−λ+1,n2−λ+1,λ−n4+1,λ−n4+1) | if n4+2≤λ≤n2−1; |
(1,1,n4,n4) | if λ=n2. |
r′E(l2λ,RCn(1,2)) | λ |
(0,n4−2λ,n4−2λ) | if 1≤λ≤n4−1; |
(0,λ−n2+1,λ−n2+1) | if n4≤λ≤n4+1; |
(0,2λ−3n4,2λ−3n4) | if n4+2≤λ≤n2−1; |
(0,n4−1,n4−1) | if λ=n2. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−14,n−14+1,1) | if λ=1; |
(λ,n−14−λ+1,n−14−λ+2,λ) | if 2≤λ≤n−14; |
(n−14+1,1,0,n−14+1) | if λ=n−14+1; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+2) | if n−14+2≤λ≤n−12; |
(1,n−14+1,n−14+1,0) | if λ=n−12+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−14,n−14+1,1) | if λ=1; |
(n−14−2λ+1,n−14−2λ+2,0) | if 2≤λ≤n−14; |
(−n−14,−n−14−1,0) | if λ=n−14+1; |
(2λ−3n−34−2,2λ−3n−34−2,0) | if n−14+2≤λ≤n−12; |
(n−14,n−14,−1) | if λ=n−12+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,0,1,n−14+1) | if λ=n−14; |
(n−12−λ+2,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(h2λ,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34−1,2λ−3n−34−2,−1) | if n−14+1≤λ≤n−12. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−14−λ+1,n−14−λ+1,λ) | if 1≤λ≤n−14; |
(n−12−λ+2,λ−n−14,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12; |
(1,n−14,n−14+1,1) | if λ=n−12+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−14−2λ+1,n−14−2λ+1,0) | if 1≤λ≤n−14; |
(2λ−3k−2,2λ−3k−2,−1) | if k+1≤λ≤2k; |
(n−14−1,n−14,0) | if λ=n−12+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−14−λ,n−14−λ+1,λ+1) | if 1≤λ≤n−14−1; |
(n−14,1,1,n−14+1) | if λ=n−14; |
(n−12−λ+1,λ−n−14+1,λ−n−14,n−12−λ+1) | if n−14+1≤λ≤n−12. |
r′E(l2λ,RCn(1,2)) | λ |
(n−14−2λ,n−14−2λ+1,1) | if 1≤λ≤n−14−1; |
(1−n−14,1−n−14,1) | if λ=n−14; |
(2λ−3n−34,2λ−3n−34−1,0) | if n−14+1≤λ≤n−12. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,n−24,n−24+1,1) | if λ=1; |
(λ,n−24−λ+1,n−24−λ+2,λ) | if 2≤λ≤n−24; |
(n−24+1,1,0,n−24+1) | if λ=n−24+1; |
(n−22−λ+3,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+2≤λ≤n−22+1. |
r′E(h2λ−1,RCn(1,2)) | λ |
(n−24,n−24+1,1) | if λ=1; |
(n−24−2i+1,n−24−2λ+2,0) | if 2≤λ≤n−24; |
(−n−24,−n−24−1,0) | if λ=n−24+1; |
(2λ−3n−64−3,2λ−3n−64−3,−1) | if n−24+2≤λ≤n−22+1. |
rE(h2λ,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,0,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22; |
(1,n−24+1,n−24+1,0) | if λ=n−22+1. |
r′E(h2λ,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22; |
(n−24,n−24,−1) | if λ=n−22+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,n−24−λ+1,n−24−λ+1,λ) | if 1≤λ≤n−24; |
(n−22−λ+2,λ−n−24,λ−n−24,n−22−λ+2) | if n−24+1≤λ≤n−22+1. |
r′E(l2λ−1,RCn(1,2)) | λ |
(n−24−2λ+1,n−24−2λ+1,0) | if 1≤λ≤n−24; |
(2λ−3n−64−2,2λ−3n−64−2,0) | if n−24+1≤λ≤n−22+1. |
rE(l2λ,RCn(1,2)) | λ |
(λ,n−24−λ,n−24−λ+1,λ+1) | if 1≤λ≤n−24−1; |
(n−24,1,1,n−24+1) | if λ=n−24; |
(n−22−λ+2,λ−n−24+1,−n−24,n−22−λ+1) | if n−24+1≤λ≤n−22; |
(1,n−24,n−24+1,1) | if λ=n−22+1. |
r′E(l2λ,RCn(1,2)) | λ |
(n−24−2λ,n−24−2λ+1,1) | if 1≤λ≤n−24−1; |
(1−n−24,1−n−24,1) | if λ=n−24; |
(2λ−3n−64−1,2λ−3n−64−2,−1) | if n−24+1≤λ≤n−22; |
(n−24−1,n−24,0) | if λ=n−22+1. |
rE(h2λ−1,RCn(1,2)) | λ |
(0,2,n−34,n−34+1) | if λ=1; |
(λ,λ+1,n−34−λ+1,n−34−λ+2) | if 2≤λ≤n−34; |
(n−34+1,n−34+1,1,1) | if λ=n−34+1; |
(n−32−λ+3,n−32−λ+2,λ−n−34,n−34−λ−1) | if n−34+2≤λ≤n−32; |
(2,0,n−34+1,n−34) | if λ=n−32+1; |
(1,2,n−34+1,n−34+1) | if λ=⌊n−32+2⌋. |
r′E(h2λ−1,RCn(1,2)) | λ |
(2,n−34,n−34+1) | if λ=1; |
(1,n−34−2λ+1,n−34−2λ+2) | if 2≤λ≤n−34; |
(0,−n−34,−n−34) | if λ=n−34+1; |
(−1,2λ−3n−94−3,−n−34−4) | if n−34+2≤λ≤n−32; |
(−2,n−34−1,n−34−2) | if λ=n−32+1; |
(1,n−34,n−34) | if λ=⌊n−32+2⌋. |
rE(h2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,1,1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(2,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(h2λ,RCn(1,2)) | λ |
(2,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,1−λ,1−λ) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−3) | if n−34+2≤λ≤n−32; |
(−1,n−34+1,n−34+1) | if λ=n−32+1. |
rE(l2λ−1,RCn(1,2)) | λ |
(λ,λ+1,n−34−λ+1,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,2,n−34−λ+1) | if n−34≤λ≤n−34+1; |
(n−32−λ+3,n−32−+1,λ−n−34,λ−n−34−1) | if n−34+2≤λ≤n−32; |
(−n−32+1,λ−n−32,3n−94−λ+2,−n−34−1) | if n−32+1≤λ≤⌊n−34+2⌋. |
r′E(l2λ−1,RCn(1,2)) | λ |
(1,n−34−2λ+1,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,2−λ,n−34−2λ+1) | if n−34≤λ≤n−34+1; |
(−2,2λ−3n−94−3,2λ−3n−94−4) | if n−34+2≤λ≤n−32; |
(−1,5n−154−2λ−1,n−34−2) | if n−32+1≤λ≤⌊n+12⌋. |
rE(l2λ,RCn(1,2)) | λ |
(λ,λ+2,n−34−λ,n−34−λ+1) | if 1≤λ≤n−34−1; |
(λ,n−32−λ+1,λ−n−34,2) | if n−34≤λ≤n−34+1; |
(n−32−λ+2,n−32−λ+1,λ−n−34,λ−n−34) | if n−34+2≤λ≤n−32; |
(1,1,n−34+1,n−34+1) | if λ=n−32+1. |
r′E(l2λ,RCn(1,2)) | λ |
(2,n−34−2λ,n−34−2λ+1) | if 1≤λ≤n−34−1; |
(n−32−2λ+1,−n−34,2−λ) | if n−34≤λ≤n−34+1; |
(−1,2λ−3n−94−2,2λ−3n−94−2) | if n−34+2≤λ≤n−32; |
(0,n−34,n−34) | if λ=n−32+1. |