2022
DOI: 10.1109/jrfid.2022.3158392
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Handover Challenges and Methods for Drone Swarms

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Regarding connectivity, a UAV must communicate its position anytime so that its route can be monitored by the ground, and possibly modified by providing new tasks while receiving real-time updates from the UAV [8]. Connectivity is indeed the way to extend the drone operation with the same level of dependability guaranteed by the VLoS operations.…”
Section: Introductionmentioning
confidence: 99%
“…Regarding connectivity, a UAV must communicate its position anytime so that its route can be monitored by the ground, and possibly modified by providing new tasks while receiving real-time updates from the UAV [8]. Connectivity is indeed the way to extend the drone operation with the same level of dependability guaranteed by the VLoS operations.…”
Section: Introductionmentioning
confidence: 99%
“…The experimental results show that the federated learning based method can effectively solve the communication and routing problems of unmanned aerial vehicles in heterogeneous networks. Yucel Aydin [5], [6] proposed a group based identity authentication method based on the uncertainty of drone movement, frequent ground to air communication, identity authentication between drone clusters, and communication overhead. This method solves the problem of high identity authentication delay caused by communication delay in ground base stations, and the inability of single drone shared identity authentication to expand in drone clusters.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, federated learning methods can effectively solve the security issues of private data. [5], [6] Considered privacy issues between drones, but did not fundamentally address data security issues.…”
Section: Introductionmentioning
confidence: 99%
“…Several authentication mechanisms have been proposed in the literature to improve drone security. In [8], a low-latency solution for drone swarms in fifth-generation (5G) networks is proposed, operating with shared keys among the drones; a group authentication technique has been proposed in [9]; the work in [10] proposes a distributed delegation-based authentication mechanism to reduce the traffic overhead toward the 5G core network; a solution leveraging blockchain technology has been proposed in [11]. All these approaches are based on cryptography.…”
Section: Introductionmentioning
confidence: 99%