A lightweight authentication protocol for UAVs based on ECC scheme
S Zhang, Y Liu, Z Han, Z Yang - Drones, 2023 - mdpi.com
With the rapid development of unmanned aerial vehicles (UAVs), often referred to as drones,
their security issues are attracting more and more attention. Due to open-access …
their security issues are attracting more and more attention. Due to open-access …
Trust based Flying ad-hoc Network: A Survey
An efficient data transmission can be established by flying ad hoc networks (FANETs) that
emphasized the cooperation and coordination among various unmanned aerial vehicles …
emphasized the cooperation and coordination among various unmanned aerial vehicles …
BCDAIoD: An efficient blockchain-based cross-domain authentication scheme for internet of drones
G Qiao, Y Zhuang, T Ye, Y Qiao - Drones, 2023 - mdpi.com
During long-distance flight, unmanned aerial vehicles (UAVs) need to perform cross-domain
authentication to prove their identity and receive information from the ground control station …
authentication to prove their identity and receive information from the ground control station …
DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets
With the urge to secure and protect digital assets, there is a need to emphasize the
immediacy of taking measures to ensure robust security due to the enhancement of cyber …
immediacy of taking measures to ensure robust security due to the enhancement of cyber …
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Software‐defined networking (SDN) has received considerable attention and adoption
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …
owing to its inherent advantages, such as enhanced scalability, increased adaptability, and …
PSLAPS-IoD: A Provable Secure and Lightweight Authentication Protocol for Securing Internet-of-Drones (IoD) Environment
The infrastructureless architecture for Internet-of-Drones (IoD) environment regulates drones
in airspace for performing tactical tasks. Synergy is crucial for IoD participants; otherwise …
in airspace for performing tactical tasks. Synergy is crucial for IoD participants; otherwise …
[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …
Cryptography (ECC) models focusing on performance parameters such as Security …
A secure cross-domain authentication scheme based on threshold signature for MEC
L Chen, C Guo, B Gong, M Waqas, L Deng… - Journal of Cloud …, 2024 - Springer
The widespread adoption of fifth-generation mobile networks has spurred the rapid
advancement of mobile edge computing (MEC). By decentralizing computing and storage …
advancement of mobile edge computing (MEC). By decentralizing computing and storage …
Corrections to “A Verifiably Secure ECC Based Authentication Scheme for Securing IoD Using FANET”
In the above article, the following corrections are necessary: Section II, preliminaries,
subsection E Adversary Model–This model is based on, suppose the proposed protocol is …
subsection E Adversary Model–This model is based on, suppose the proposed protocol is …
ECC based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
H Choe, D Kang - IEEE Access, 2025 - ieeexplore.ieee.org
In modern military operations, network systems capable of maintaining real-time
communication and high security while operating in resource-constrained environments are …
communication and high security while operating in resource-constrained environments are …