2022
DOI: 10.3390/s22239534
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications

Abstract: In recent years, due to the rapid development of Internet of things (IoTs), various physical things (objects) in IoTs are smart enough to make their own decisions without the involvement of humans. The smart devices embedded in a drone can sense, collect, and transmit real-time data back to the controller from a designated environment via wireless communication technologies. The mobility, flexibility, reliability and energy efficiency of drones makes them more widely used in IoT environments such as commercial… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…The computational cost of the comparative studies 11,[14][15][16][18][19][20][21][22][23]31,32 including proposed scheme is shown in Table 4. According to this table the computational cost of symmetric cryptography-based schemes 11,15,[18][19][20][21]23,31 and proposed scheme is depicted as .285, .628, .562, .577, .556, .532, .40, .41, and .54 ms, respectively. Similarly, the computational latency for asymmetric crypto-primitives based costly solutions [14][15][16]22,32 is computed as 49.91, 62.43, 12.69, 171.567, and .40 ms, respectively.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 4 more Smart Citations
“…The computational cost of the comparative studies 11,[14][15][16][18][19][20][21][22][23]31,32 including proposed scheme is shown in Table 4. According to this table the computational cost of symmetric cryptography-based schemes 11,15,[18][19][20][21]23,31 and proposed scheme is depicted as .285, .628, .562, .577, .556, .532, .40, .41, and .54 ms, respectively. Similarly, the computational latency for asymmetric crypto-primitives based costly solutions [14][15][16]22,32 is computed as 49.91, 62.43, 12.69, 171.567, and .40 ms, respectively.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…According to this table the computational cost of symmetric cryptography-based schemes 11,15,[18][19][20][21]23,31 and proposed scheme is depicted as .285, .628, .562, .577, .556, .532, .40, .41, and .54 ms, respectively. Similarly, the computational latency for asymmetric crypto-primitives based costly solutions [14][15][16]22,32 is computed as 49.91, 62.43, 12.69, 171.567, and .40 ms, respectively. The communication cost for the compared schemes and proposed scheme is also illustrated in Table 4.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 3 more Smart Citations