4.6 Article

A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Psched: A Priority-Based Service Scheduling Scheme for the Internet of Drones

Cong Pu et al.

Summary: The article introduces a priority-based service scheduling scheme for providing data upload/download services in IoD. The scheme calculates priorities objectively and equitably, considers bandwidth competition, and can improve service ratio and latency.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Information Systems

A lightweight authentication and key agreement scheme for Internet of Drones

Yunru Zhang et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Securing Smart City Surveillance: A Lightweight Authentication Mechanism for Unmanned Vehicles

Zeeshan Ali et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment

Jangirala Srinivas et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

A double PUF-based RFID identity authentication protocol in service-centric internet of things environments

Wei Liang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

A Secure Authentication Protocol for Multi-Sever-Based E-Healthcare Using a Fuzzy Commitment Scheme

Subhas Barman et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Multidisciplinary

Analysis of the current situation and development trend of the international cargo UAVs market

I. Kovalev et al.

INTERNATIONAL SCIENTIFIC CONFERENCE ON APPLIED PHYSICS, INFORMATION TECHNOLOGIES AND ENGINEERING (APITECH-2019) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Lightweight Secure Communication Mechanism towards UAV Networks

Teng Li et al.

2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) (2019)

Proceedings Paper Geosciences, Multidisciplinary

Rice Lodging Area Extraction Based on YCbCr Spatial and Texture Features

Yang Ding et al.

2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Token-Based Lightweight Authentication to Secure IoT Networks

Maissa Dammak et al.

2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC) (2019)

Article Engineering, Electrical & Electronic

Security and Privacy for the Internet of Drones: Challenges and Solutions

Chao Lin et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Automation & Control Systems

Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps

Dariush Abbasinezhad-Mood et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

GyrosFinger: Fingerprinting Drones for Location Tracking Based on the Outputs of MEMS Gyroscopes

Yunmok Son et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Article Computer Science, Information Systems

Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles

Young-Min Kwon et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

Sravani Challa et al.

IEEE ACCESS (2017)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Information Systems

A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks

Ashok Kumar Das

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Proceedings Paper Computer Science, Information Systems

A Formal Foundation for the Security Features of Physical Functions

Frederik Armknecht et al.

2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) (2011)