4.5 Article

Secure Blockchain-Enabled Authentication Key Management Framework with Big Data Analytics for Drones in Networks Beyond 5G Applications

Related references

Note: Only part of the references are listed.
Article Engineering, Civil

Investigating the Prospect of Leveraging Blockchain and Machine Learning to Secure Vehicular Networks: A Survey

Mahdi Dibaei et al.

Summary: This paper discusses the latest communication technologies and applications in vehicular networks, explores the use of machine learning and blockchain in cybersecurity, and provides insights for future research to secure vehicular networks.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

Fortifying Smart Transportation Security Through Public Blockchain

Mohammad Wazid et al.

Summary: Smart vehicles support intelligent transportation system, but face security and privacy issues due to insecure communication. Hence, we propose a secure communication framework based on public blockchain to protect data security and privacy.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones

Chaosheng Feng et al.

Summary: This article proposes a blockchain-based cross-domain authentication scheme for intelligent 5G-enabled Internet of drones. By utilizing multiple signatures and smart contracts to establish an identity federation for collaborative domains, the scheme supports domain joining and exiting, and ensures reliable communication between cross-domain devices.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment

Cong Pu et al.

Summary: With the advancement of drone technology, Internet of Drones (IoD) has gained widespread applications in various fields. However, securing IoD systems can be challenging due to the unique characteristics of drones. In this article, a lightweight and privacy-preserving mutual authentication and key agreement protocol, PMAP, is proposed.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Artificial Intelligence

On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments

Morteza Adeli et al.

Summary: The Internet of Medical Things (IoMT) presents opportunities for healthcare, but also raises concerns about data protection and information security. A proposed lightweight biometric-based authentication scheme claims security against known attacks, but a detailed analysis reveals vulnerabilities. An improved scheme is proposed to address these weaknesses, demonstrating resilience against common attacks with reduced computation time and communication overhead.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

Private blockchain-based access control mechanism for unauthorized UAV detection and mitigation in Internet of Drones environment

Basudeb Bera et al.

Summary: In this paper, a novel access control scheme for unauthorized UAV detection and mitigation, called ACSUD-IoD, is proposed. By incorporating a blockchain-based solution in ACSUD-IoD, the data from drones can be securely stored for detection of unauthorized UAVs, and Big data analytics can be performed on the authenticated transactional data stored in the blockchain to ensure data authenticity and effectiveness. The detailed security analysis and testbed experiments demonstrate the robustness and efficacy of the proposed scheme in an IoD environment compared to existing schemes.

COMPUTER COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

A Comprehensive Overview on 5G-and-Beyond Networks With UAVs: From Communications to Sensing and Intelligence

Qingqing Wu et al.

Summary: This paper provides a comprehensive overview of the latest research efforts on integrating UAVs into cellular networks, with a focus on utilizing advanced techniques to meet the diversified service requirements of next-generation wireless systems. It highlights the challenges and opportunities in providing enhanced communication services for UAVs and ground users in 5G-and-beyond 3D heterogeneous wireless networks. Additionally, the paper underscores the importance of network intelligence and efficient sensing in achieving successful integration.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Review Engineering, Electrical & Electronic

Applications, Deployments, and Integration of Internet of Drones (IoD): A Review

Laith Abualigah et al.

Summary: The Internet of Drones (IoD) has gained significant attention in recent years for its wide potential applications. This paper provides a comprehensive survey of IoD and its applications, deployments, and integration, focusing on smart cities surveillance, cloud and fog frameworks, unmanned aerial vehicles, wireless sensor networks, networks, mobile computing, and business paradigms. Discussions highlight hot research topics and problems to guide future research in this area.

IEEE SENSORS JOURNAL (2021)

Article Computer Science, Information Systems

Enabling Drones in the Internet of Things With Decentralized Blockchain-Based Security

Abbas Yazdinejad et al.

Summary: This article introduces a secure authentication model utilizing blockchain technology to address security and latency issues in drone authentication in smart cities. The proposed architecture aims for positive impacts on the Internet of Drones (IoD) by reducing network latency and enhancing security.

IEEE INTERNET OF THINGS JOURNAL (2021)

Review Chemistry, Analytical

The Internet of Drones: Requirements, Taxonomy, Recent Advances, and Challenges of Research Trends

Abdelzahir Abdelmaboud

Summary: The use of drones in daily life is valuable, and forming the Internet of drones (IoD) is a desirable trend for improving flight safety and quality. However, security, privacy, and communication issues exist with IoD implementation.

SENSORS (2021)

Article Computer Science, Information Systems

An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions

Behrooz Khadem et al.

Summary: Wireless Body Sensor Networks (WBSNs) are a relatively new area of research in healthcare systems, facing challenges in human health, social interactions, coverage radius, energy consumption, and communication reliability. An improved authenticated key agreement (AKA) protocol was proposed in this study, providing anonymity and unlinkability of sensor node sessions. The results showed a significant reduction in energy consumption, communication cost, and computation time compared to similar schemes.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges

Muktar Yahuza et al.

Summary: Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace and provides inter-location navigation services. However, existing research studies have not thoroughly investigated the security and privacy threats associated with various drone categories. Further research is needed to address the security and privacy issues in IoD networks comprehensively.

IEEE ACCESS (2021)

Article Computer Science, Hardware & Architecture

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment

Mohammad Wazid et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

A secure authentication scheme framework for mobile-sinks used in the Internet of Drones applications

Yoney Kirsal Ever

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment

Muhammad Tanveer et al.

IEEE ACCESS (2020)

Article Automation & Control Systems

Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Secure Key Agreement and Key Protection for Mobile Device User Authentication

Libing Wu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

Design of secure key management and user authentication scheme for fog computing services

Mohammad Wazid et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Beyond 5G With UAVs: Foundations of a 3D Wireless Cellular Network

Mohammad Mozaffari et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2019)

Proceedings Paper Computer Science, Information Systems

City Geospatial Dashboard: IoT and Big Data Analytics for Geospatial Solutions Provider in Disaster Management

Ko Ko Lwin et al.

2019 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR DISASTER MANAGEMENT (ICT-DM 2019) (2019)

Article Computer Science, Information Systems

Internet of Drones

Mirmojtaba Gharibi et al.

IEEE ACCESS (2016)

Article Computer Science, Theory & Methods

Practical byzantine fault tolerance and proactive recovery

M Castro et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2002)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)