Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security 2015
DOI: 10.1145/2714576.2714616
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Communication Protocol for Drones and Smart Objects

Abstract: In many envisioned drone-based applications, drones will communicate with many different smart objects, such as sensors and embedded devices. Securing such communications requires an effective and efficient encryption key establishment protocol. However, the design of such a protocol must take into account constrained resources of smart objects and the mobility of drones. In this paper, a secure communication protocol between drones and smart objects is presented. To support the required security functions, su… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 66 publications
(25 citation statements)
references
References 26 publications
0
24
0
Order By: Relevance
“…UAVs can play an essential role in providing a mobile wireless sensor network [54,57,62], network relay connectivity and situational awareness [63]. They are expected to communicate with many different smart objects, such as sensors and embedded devices [64]. Their mobility [61], the ability to provide real-time data [65] and the potential to carry hardware for on-board decision making [66] make UAVs the ideal candidate.…”
Section: Smart City Sensingmentioning
confidence: 99%
“…UAVs can play an essential role in providing a mobile wireless sensor network [54,57,62], network relay connectivity and situational awareness [63]. They are expected to communicate with many different smart objects, such as sensors and embedded devices [64]. Their mobility [61], the ability to provide real-time data [65] and the potential to carry hardware for on-board decision making [66] make UAVs the ideal candidate.…”
Section: Smart City Sensingmentioning
confidence: 99%
“…Based on the schemes of References [20,[22][23][24], we present a novel certificateless hybrid signcryption scheme, which is a certificateless public key cryptography [1].…”
Section: A Novel Certificateless Hybrid Signcryptionmentioning
confidence: 99%
“…In [35], the authors proposed a secure communication protocol between drones and smart objects based on efficient Certificateless Signcryption Tag Key Encapsulation Mechanism using ECC, which addresses issue of drone capture.…”
Section: Individual Dronesmentioning
confidence: 99%