2022
DOI: 10.3390/drones6020041
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones

Abstract: During the last few years, a wide variety of Internet of Drones (IoD) applications have emerged with numerous heterogeneous aerial and ground network elements interconnected and equipped with advanced sensors, computation resources, and communication units. The evolution of IoD networks presupposes the mitigation of several security and privacy threats. Thus, robust authentication protocols should be implemented in order to attain secure operation within the IoD. However, owing to the inherent features of the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 80 publications
0
11
0
Order By: Relevance
“…Various security solutions for SDN-enabled UAV networks were presented in [43]. In [18], up-to-date research studies on authentication mechanisms for UAV-based networks were presented. To this end, the adoption of conventional technologies and methods, such as the widely used hash functions, Public Key Infrastructure (PKI), and Elliptic-Curve Cryptography (ECC), was discussed along with emerging technologies, including MEC, ML, and Blockchain.…”
Section: Secure Uav-aided Networkmentioning
confidence: 99%
See 4 more Smart Citations
“…Various security solutions for SDN-enabled UAV networks were presented in [43]. In [18], up-to-date research studies on authentication mechanisms for UAV-based networks were presented. To this end, the adoption of conventional technologies and methods, such as the widely used hash functions, Public Key Infrastructure (PKI), and Elliptic-Curve Cryptography (ECC), was discussed along with emerging technologies, including MEC, ML, and Blockchain.…”
Section: Secure Uav-aided Networkmentioning
confidence: 99%
“…Additionally, a review of effective hardware-based solutions for the identification and authentication of network nodes was provided and the use of Trusted Platform Modules (TPMs), Hardware Security Modules (HSMs), and Physically Unclonable Functions (PUFs) as effective security solutions was indicated. Nevertheless, the role of authentication was only studied in [18], whereas the use of MEC was not considered in [27] and [21], [22], [34]- [43].…”
Section: Secure Uav-aided Networkmentioning
confidence: 99%
See 3 more Smart Citations