2020
DOI: 10.1016/j.comcom.2020.03.009
|View full text |Cite
|
Sign up to set email alerts
|

A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
47
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 105 publications
(47 citation statements)
references
References 29 publications
0
47
0
Order By: Relevance
“…In Table 5, we present the existing formal models for different UAV authentication schemes, the considered features, and their proven security properties. According to the reported results, we remark that few works did not consider the formal security analysis of their authentication schemes 14,19,20,22 . Moreover, we found that the most frequently used models are the ROM and the Dolev‐Yao models.…”
Section: Security Analysismentioning
confidence: 98%
See 2 more Smart Citations
“…In Table 5, we present the existing formal models for different UAV authentication schemes, the considered features, and their proven security properties. According to the reported results, we remark that few works did not consider the formal security analysis of their authentication schemes 14,19,20,22 . Moreover, we found that the most frequently used models are the ROM and the Dolev‐Yao models.…”
Section: Security Analysismentioning
confidence: 98%
“…In such scenarios, the adoption of UAV authentication mechanisms prevents malicious adversaries from compromising the flight mission. Accordingly, several studies on UAV authentication protocols have been proposed in the literature 7‐26 . Effective authentication schemes for UAVs rely on cryptographic primitives to guarantee confidentiality, integrity, and availability.…”
Section: Uav Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Kirsal Ever 44 considered an integrated wireless sensor network and UAV environment in which UAVs can operate as mobile sinks. Sine using wireless channels may lead to high vulnerability and there is energy resource constraint in this environment and traditional public‐key encryption techniques, such as RSA, are not unsuitable, a safe authentication framework was proposed in this article.…”
Section: Review Of the Studied Articlesmentioning
confidence: 99%
“…The general weakness of the security protection capability of the massive terminals. Power grid terminals generally have the characteristics of low power consumption and low cost [2]. Besides, their computing and storage resources are limited, so they cannot employ complex security mechanisms, security protection protocols or security encryption algorithms, resulting in the general weak security defense capability of terminals.…”
Section: Introductionmentioning
confidence: 99%