Related references
Note: Only part of the references are listed.
Article
Computer Science, Information Systems
Jongseok Ryu et al.
Summary: This paper proposes a secure ECC-based three-factor mutual authentication protocol for TMIS that guarantees patient privacy. The protocol is proven to be secure through various security analyses and outperforms existing protocols in terms of communication costs and security features.
Article
Computer Science, Information Systems
Muhammad Tanveer et al.
Summary: The revolutionary advancement in hardware tools, software packages, and communication techniques has led to the rise of Internet of Things-supported drone networks (IoD). However, new security threats arise as the infrastructure of IoD becomes more sophisticated. In this paper, we propose a novel user authentication mechanism called RUAM-IoD, which utilizes elliptic curve cryptography, symmetric encryption, and hash function. We validate the security of RUAM-IoD through formal and informal analysis, and compare it with other state-of-the-art authentication schemes.
Article
Computer Science, Information Systems
Durbadal Chattaraj et al.
Summary: This article proposes a new private blockchain-enabled fine-grained access control mechanism for the SDN environment, incorporating attribute-based encryption and certificate-based access control protocol. The proposed solution can resist several well-known security threats and alleviate system-level inconveniences.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Muhammad Tanveer et al.
Summary: This article proposes a robust authenticated key management (AKM) protocol for Internet of Drones (IoD) environment, called RAMP-IoD. RAMP-IoD utilizes lightweight cryptography-based authenticated encryption, elliptic-curve cryptography, and hash function to ensure reliable and secure communication. It verifies user authenticity and establishes an indecipherable session key (SK) for communication. Security analysis shows that RAMP-IoD is protected against replay and man-in-the-middle attacks, and is secure against various covert security attacks. Comparative study demonstrates that RAMP-IoD provides enhanced security with low storage, communication, and computational overheads compared to related AKM protocols.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Multidisciplinary
Seunghwan Son et al.
Summary: Connected vehicle refers to providing various services through vehicles connected to the network. Vehicular ad-hoc networks (VANETs) can support vehicle-to-vehicle and vehicle-to-infrastructure communications to realize connected vehicles. Secure communication is crucial in VANETs to prevent accidents and injuries. Recent studies have focused on V2I authentication to ensure the security of V2I communications. However, existing protocols do not consider the handover situation, leading to unnecessary computations and resource overload. A blockchain-based VANET protocol is proposed to address these issues and improve efficiency. The protocol only requires lightweight computations during handover situations, and formal analysis and simulations demonstrate its practicality. Comparisons with existing protocols show that the proposed protocol is more secure and efficient.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2022)
Article
Engineering, Civil
Muhammad Wahid Akram et al.
Summary: The advancement of ICT and the Internet has facilitated the use of Unmanned Aerial Vehicles (UAVs) in assisting Vehicular Ad-hoc Networks (VANETs), providing real-time data access and monitoring capabilities in smart cities. However, security, privacy, and routing concerns remain significant challenges for UAV-assisted VANETs, where Deep Learning Algorithms (DLAs) can play a vital role.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Deokkyu Kwon et al.
Summary: This paper presents a secure and efficient handover authentication scheme for UAM environments, using elliptic curve cryptography and multiple security verification methods. The research results indicate that the proposed scheme is both secure and efficient in UAM environments.
Article
Remote Sensing
Tsuyang Wu et al.
Summary: The emergence of the Internet of Drones (IoD) as an extension of the Internet of Things (IoT) has allowed for faster and more secure data transmission through the use of 5G technology. However, existing authentication protocols have security vulnerabilities. Through the design of an improved protocol and thorough analysis and verification, the security of the protocol is found to be satisfactory.
Review
Engineering, Electrical & Electronic
Laith Abualigah et al.
Summary: The Internet of Drones (IoD) has gained significant attention in recent years for its wide potential applications. This paper provides a comprehensive survey of IoD and its applications, deployments, and integration, focusing on smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms. Discussions highlight hot research topics and problems to guide future research in this area.
IEEE SENSORS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Muhammad Umar et al.
Summary: The article introduces a lightweight privacy-preserving authentication protocol for VANETs, which is compared to existing protocols, lighter, safer, and more practical, making it more reliable and convenient for secure data transmission in VANETs.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Engineering, Electrical & Electronic
Palak Bagga et al.
Summary: Internet of Vehicles (IoV) is a distributed network consisting of connected vehicles and Vehicular Ad Hoc Networks (VANETs) with real-time communication, anonymity, security features. In an Intelligent Transportation System, a new authentication and key agreement protocol is proposed, which has been shown to be secure against various attacks through security analysis and verification, offering lower communication and computational overheads, better security and functionality attributes than other competing schemes.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Chemistry, Analytical
Deok Kyu Kwon et al.
Summary: The importance of secure authentication in WSN was discussed, with the introduction of Moghadam et al.'s protocol and its identified vulnerabilities, and the proposal of WSN-SLAP as an alternative solution to address these issues.
Article
Computer Science, Information Systems
Naijian Zhang et al.
Summary: The Internet of Drones (IoD) has gained popularity in various fields due to the mobility, flexibility, and autonomy of drones, but faces new security challenges and privacy issues. An efficient three-factor AKA protocol based on FourQ and BPV pre-calculation is proposed in this study to authenticate remote users and establish session keys for IoD. Real-world experiments demonstrate that the improved FourQ curve primitive is significantly faster than conventional elliptic curve primitives, providing stronger security and higher efficiency compared to existing protocols.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Myeonghyun Kim et al.
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Computer Science, Information Systems
R. Shashidhara et al.
Summary: A secure authentication protocol is crucial for securing communications over wireless and mobile networks due to their susceptibility to various attacks. By analyzing the vulnerabilities in existing authentication systems, a more efficient and robust authentication system for roaming in mobility networks is proposed to address these security flaws.
Article
Computer Science, Information Systems
Yoney Kirsal Ever
COMPUTER COMMUNICATIONS
(2020)
Article
Computer Science, Information Systems
Tejasvi Alladi et al.
COMPUTER COMMUNICATIONS
(2020)
Article
Computer Science, Information Systems
B. D. Deebak et al.
COMPUTER COMMUNICATIONS
(2020)
Article
Computer Science, Information Systems
Zeeshan Ali et al.
Article
Computer Science, Information Systems
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL
(2019)
Article
Engineering, Electrical & Electronic
Jangirala Srinivas et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2019)
Article
Computer Science, Information Systems
Mohammad Wazid et al.
IEEE INTERNET OF THINGS JOURNAL
(2019)
Article
Engineering, Electrical & Electronic
Chao Lin et al.
IEEE COMMUNICATIONS MAGAZINE
(2018)
Article
Computer Science, Theory & Methods
Ding Wang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2017)
Article
Computer Science, Information Systems
Mirmojtaba Gharibi et al.
Article
Engineering, Electrical & Electronic
Charles Herder et al.
PROCEEDINGS OF THE IEEE
(2014)