4.8 Article

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

Dipanwita Sadhukhan et al.

Summary: The development of IoT technology has made IoT services more reliable. In order to ensure secure data transmission between remote users and IoT networks, this research proposes a secure authentication scheme and verifies its reliability through multiple cryptographic attacks.

JOURNAL OF SUPERCOMPUTING (2021)

Article Computer Science, Hardware & Architecture

GCACS-IoD: A certificate based generic access control scheme for Internet of drones

Shehzad Ashraf Chaudhry et al.

Summary: The Internet of Drones (IoD) is increasingly important in various fields, but security and privacy issues are crucial. Research has shown vulnerabilities in current access control schemes, leading to the proposal of a new, more secure solution.

COMPUTER NETWORKS (2021)

Article Computer Science, Information Systems

Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System

Jangirala Srinivas et al.

Summary: The UAP-BCIoT is a new three-factor user authentication scheme based on elliptic-curve cryptography, which facilitates mutual authentication between users and IoT devices through a semi-trusted cloud-gateway node. The scheme supports various functionality features required for IoT-based intelligent transportation systems.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Theory & Methods

Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems

Sravani Challa et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Telecommunications

A Multi-factor User Authentication and Key Agreement Protocol Based on Bilinear Pairing for the Internet of Things

Mohammad Nikravan et al.

WIRELESS PERSONAL COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A lightweight authentication and key agreement scheme for Internet of Drones

Yunru Zhang et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

Basudeb Bera et al.

COMPUTER COMMUNICATIONS (2020)

Article Chemistry, Analytical

S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme

Muhammad Tanveer et al.

SENSORS (2020)

Article Computer Science, Information Systems

A smart lightweight privacy preservation scheme for IoT-based UAV communication systems

B. D. Deebak et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication

Tejasvi Alladi et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

Muhammad Tanveer et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network

Mostafa Farhadi Moghadam et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Anonymous three-factor authenticated key agreement for wireless sensor networks

Yanrong Lu et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Information Systems

The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved

Wei Zhou et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Theory & Methods

Lightweight IoT-based authentication scheme in cloud computing circumstance

Lu Zhou et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

UAV Communications for 5G and Beyond: Recent Advances and Future Trends

Bin Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

Anonymous authentication scheme for smart home environment with provable security

Mengxia Shuai et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

A Novel Authenticated Key Agreement Protocol With Dynamic Credential for WSNs

Zheng Yang et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2019)

Article Computer Science, Information Systems

Survey on UAV Cellular Communications: Practical Aspects, Standardization Advancements, Regulation, and Security Challenges

Azade Fotouhi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Automation & Control Systems

A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things

Xiong Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure

Khalid Mahmood et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

Xiong Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

Security and Privacy for the Internet of Drones: Challenges and Solutions

Chao Lin et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Signature-based three-factor authenticated key exchange for internet of things applications

Xiaoying Jia et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security

Fan Wu et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Flying IoT: Toward Low-Power Vision in the Sky

Hasan Genc et al.

IEEE MICRO (2017)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks

Qi Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Information Systems

Internet of Drones

Mirmojtaba Gharibi et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction

Younsung Choi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Review Computer Science, Information Systems

General classification of the authenticated encryption schemes for the CAESAR competition

Farzaneh Abed et al.

COMPUTER SCIENCE REVIEW (2016)