Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.1109/access.2022.3168843
|View full text |Cite
|
Sign up to set email alerts
|

Design of Secure Handover Authentication Scheme for Urban Air Mobility Environments

Abstract: Urban air mobility (UAM) is a future air transportation system to solve the air pollution and movement efficiency problems of the traditional mobility system. In UAM environments, unmanned aerial vehicles (UAV) are used to transport passengers and goods providing various convenient services such as package delivery, air bus, and air taxi. However, UAVs communicate with ground infrastructures through open channels that can be exposed to various security attacks. Therefore, a secure mutual authentication scheme … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 28 publications
(23 citation statements)
references
References 37 publications
0
11
0
Order By: Relevance
“…AVISPA [ 7 , 8 ] is a simulation tool that proves the security robustness of the proposed scheme against replay and MITM attacks. Therefore, various security protocols [ 23 , 34 , 35 ] are proved by using AVISPA. In this section, we explain the main data flow of AVISPA and show the simulation result.…”
Section: Security Analysismentioning
confidence: 99%
“…AVISPA [ 7 , 8 ] is a simulation tool that proves the security robustness of the proposed scheme against replay and MITM attacks. Therefore, various security protocols [ 23 , 34 , 35 ] are proved by using AVISPA. In this section, we explain the main data flow of AVISPA and show the simulation result.…”
Section: Security Analysismentioning
confidence: 99%
“…We analyze the mutual authentication of the proposed protocol using BAN logic [ 40 ]. Following [ 41 , 42 , 43 ], we define basic notations and descriptions of BAN logic in Table 2 .…”
Section: Security Analysismentioning
confidence: 99%
“… Computation costs comparison on user side devices [ 7 , 11 , 17 , 21 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 ]. …”
Section: Figurementioning
confidence: 99%
“…With the aim of secure mutual authentication in the Urban Air Mobility (UAM) environment, a handover authentication scheme is proposed for ensuring secure, seamless communication (Kwon et al 2022 ). Several security vulnerabilities are considered, and ECC (elliptic curve cryptography) is used for the proposed scheme.…”
Section: Related Workmentioning
confidence: 99%