2020
DOI: 10.3390/electronics9010062
|View full text |Cite
|
Sign up to set email alerts
|

A Traceable and Privacy-Preserving Authentication for UAV Communication Control System

Abstract: In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 59 publications
(55 citation statements)
references
References 25 publications
0
47
0
Order By: Relevance
“…This model comprises three main entities: A trusted authority centre (TAC), flying drones, and a ground control station (GCS) [42,77,78]. The TAC is fully trusted by all the internet of drones (IoD) network's entities.…”
Section: ) Authenticated Key Agreement Iod Security and Privacy Modelmentioning
confidence: 99%
“…This model comprises three main entities: A trusted authority centre (TAC), flying drones, and a ground control station (GCS) [42,77,78]. The TAC is fully trusted by all the internet of drones (IoD) network's entities.…”
Section: ) Authenticated Key Agreement Iod Security and Privacy Modelmentioning
confidence: 99%
“…The former strategy prevents data leakage, whereas the latter applies a two-factor strategy including device identity and secret key to provide to serve remote-server authentication. As a consequence, several dynamic-identity based authentication mechanisms have been presented for the preclusion of client anonymity [56]. These schemes frequently change client identities using the login and authentication phase to prevent data disclosure and stolen-verifier.…”
Section: Related Workmentioning
confidence: 99%
“…Chen et al [31] proposed an ECC-based security framework for small UAVs to work collaboratively because FANET in IoD lacks fixed topology, challenging to make it secure. Their framework consists of manufacturers (UAVs), a trusted authority centre (TAC), a player (mobile device), and a ground-control station (GSC).…”
Section: Related Workmentioning
confidence: 99%