2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969732
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Methods for UAV Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(30 citation statements)
references
References 18 publications
0
29
0
1
Order By: Relevance
“…The player device needs prior flight approval to control the drones and they have addressed mutual authentication between the various entities, integrity, availability, and privacy issues. Rodrigues et al 29 proposed another hash and ECC‐based authentication protocol for drone communications for mutual authentication between the UAV and GCS and between the UAVs. Tian et al 30 has presented an authentication framework for IoD with the help of mobile edge computing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The player device needs prior flight approval to control the drones and they have addressed mutual authentication between the various entities, integrity, availability, and privacy issues. Rodrigues et al 29 proposed another hash and ECC‐based authentication protocol for drone communications for mutual authentication between the UAV and GCS and between the UAVs. Tian et al 30 has presented an authentication framework for IoD with the help of mobile edge computing.…”
Section: Related Workmentioning
confidence: 99%
“…Rodrigues et al 29 proposed another hash and ECC-based authentication protocol for drone communications for mutual authentication between the UAV and GCS and between the UAVs. Tian et al 30 has presented an authentication framework for IoD with the help of mobile edge computing.…”
Section: Related Workmentioning
confidence: 99%
“…In [10], the authors proposed a lightweight key-based mutual authentication between anonymous UAVs through the shared ground station. The authors in [11] presented an adaptation of 2 authentication strategies for wireless sensor networks (WSN), one is a key agreement authentication, and the second is an ECC-based privacy-aware two-factor authentication protocol. Those aforementioned approaches can add undesir-able traffic toward the 5G core network traffic.…”
Section: Drones Authentication a Device Authenticationmentioning
confidence: 99%
“…However, the protocol was pointed out by Lei et al [ 27 ] as not being provided to perfect forward secrecy. Meanwhile, Rodrigues et al [ 28 ] designed two methods for the drone communication environment. The first one is modified based on the AKA scheme of Farash et al [ 25 ], allowing for a direct connection between a drone and another one; the second one is modified based on the AKA scheme of Jiang et al [ 18 ], which allows a drone to communicate with another one through a ground control station.…”
Section: Introductionmentioning
confidence: 99%