2022
DOI: 10.1109/jiot.2021.3113321
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(52 citation statements)
references
References 24 publications
0
48
0
Order By: Relevance
“…A potential security breach in the RAN-exposed NFs is a serious security rise, as it can escalate rather quickly. Authentication among the networked drone BSs is even more challenging to implement in a reliable manner [31]. More specifically, the following 5G components and network functions are exposed to the UE:…”
Section: Security and Qosmentioning
confidence: 99%
“…A potential security breach in the RAN-exposed NFs is a serious security rise, as it can escalate rather quickly. Authentication among the networked drone BSs is even more challenging to implement in a reliable manner [31]. More specifically, the following 5G components and network functions are exposed to the UE:…”
Section: Security and Qosmentioning
confidence: 99%
“…The key factor behind the usage of concurrent multipath is to utilize the multipath effectively in order to be away from path failure and packet loss in the most possible way [ 26 ]. The purpose of this CMT is that in the lost packets, irregular pathways can be established as quickly as possible, and it resends the lost packets speedily to keep them away from all paths from deteriorating, merely for the abnormity of a single pathway, which confines the process of the entire connection [ 27 ]. The CMT technology combines many pathways together again to leverage the network bandwidth connections for communication.…”
Section: Analysis On the Concurrent Multipath Wireless System In Floo...mentioning
confidence: 99%
“…This remote patient control would allow them the ability to resume their regular operations rather than remaining at home or in a hospital [ 13 15 ]. IoT-based sensor networks are not without difficulties, and higher throughput, minimal latency, longer network life, and lower energy usage for improved performance are typical challenges [ 12 , 14 , 16 18 ]. Sensor nodes are mostly fitted with minimal battery supply due to size limitations and portability problems.…”
Section: Introductionmentioning
confidence: 99%