Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

An example adhoc UAV network facing adversarial actors attempting to launch a man-in-the-middle attack.

More »

Fig 1 Expand

Fig 2.

Security level encryption.

More »

Fig 2 Expand

Fig 3.

Blockchain-based private device data.

More »

Fig 3 Expand

Fig 4.

The transaction generation time of BCSF comparison to other techniques with varying number of devices.

More »

Fig 4 Expand

Fig 5.

The data secrecy rate of BCSF compared to other techniques with varying number of devices.

More »

Fig 5 Expand

Fig 6.

The data recovery rate of BCSF compared to other techniques with varying number of devices.

More »

Fig 6 Expand

Table 1.

Comparison of effective energy efficiency (%) for data transmission.

More »

Table 1 Expand