A lightweight authentication protocol for UAVs based on ECC scheme

S Zhang, Y Liu, Z Han, Z Yang - Drones, 2023 - mdpi.com
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones,
their security issues are attracting more and more attention. Due to open-access …

Trust based Flying ad-hoc Network: A Survey

J Kundu, S Alam, JC Das, A Dey, D De - IEEE Access, 2024 - ieeexplore.ieee.org
An efficient data transmission can be established by flying ad hoc networks (FANETs) that
emphasized the cooperation and coordination among various unmanned aerial vehicles …

BCDAIoD: An efficient blockchain-based cross-domain authentication scheme for internet of drones

G Qiao, Y Zhuang, T Ye, Y Qiao - Drones, 2023 - mdpi.com
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain
authentication to prove their identity and receive information from the ground control station …

DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets

S Aqeel, SU Khan, AS Khan, M Alharbi, S Shah… - Scientific Reports, 2024 - nature.com
With the urge to secure and protect digital assets, there is a need to emphasize the
immediacy of taking measures to ensure robust security due to the enhancement of cyber …

TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network

N Nisa, AS Khan, Z Ahmad… - International Journal of …, 2024 - Wiley Online Library
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …

PSLAPS-IoD: A Provable Secure and Lightweight Authentication Protocol for Securing Internet-of-Drones (IoD) Environment

F Algarni, SU Jan - IEEE Access, 2024 - ieeexplore.ieee.org
The infrastructureless architecture for Internet-of-Drones (IoD) environment regulates drones
in airspace for performing tactical tasks. Synergy is crucial for IoD participants; otherwise …

[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective

N Purohit, S Joshi, M Pande… - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …

A secure cross-domain authentication scheme based on threshold signature for MEC

L Chen, C Guo, B Gong, M Waqas, L Deng… - Journal of Cloud …, 2024 - Springer
The widespread adoption of fifth-generation mobile networks has spurred the rapid
advancement of mobile edge computing (MEC). By decentralizing computing and storage …

Corrections to “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET”

SU Jan, IA Abbasi, F Algarni, AS Khan - IEEE Access, 2022 - ieeexplore.ieee.org
In the above article, the following corrections are necessary: Section II, preliminaries,
subsection E Adversary Model–This model is based on, suppose the proposed protocol is …

ECC based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework

H Choe, D Kang - IEEE Access, 2025 - ieeexplore.ieee.org
In modern military operations, network systems capable of maintaining real-time
communication and high security while operating in resource-constrained environments are …