Swarm of UAVs for network management in 6G: A technical review
Fifth-generation (5G) cellular networks have led to the implementation of beyond 5G (B5G)
networks, which are capable of incorporating autonomous services to swarm of unmanned …
networks, which are capable of incorporating autonomous services to swarm of unmanned …
Multi-access edge computing architecture, data security and privacy: A review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …
provide computation, storage, and networking capabilities at the edge of the network in …
A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems
In this article, unmanned aerial vehicles (UAVs) are expected to play a key role in improving
the safety and reliability of transportation systems, particularly where data traffic is …
the safety and reliability of transportation systems, particularly where data traffic is …
A review on communications perspective of flying ad-hoc networks: key enabling wireless technologies, applications, challenges and open research topics
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military
applications, are presently finding their way in many civilian and commercial applications. If …
applications, are presently finding their way in many civilian and commercial applications. If …
Secure UAV-aided mobile edge computing for IoT: A review
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
An efficient and secure certificate-based access control and key agreement scheme for flying ad-hoc networks
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single
large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the …
large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the …
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
Abstract Recently, the Industrial Internet of Things (IIoT) has become increasingly important
for applications in the industry. IIoT has essentially become a prime security focus for …
for applications in the industry. IIoT has essentially become a prime security focus for …
An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) …
Mobile health (M-Health) system is the remote form of Wireless Body Area Networks
(WBAN), which can be used for collecting patient's health data in real-time with mobile …
(WBAN), which can be used for collecting patient's health data in real-time with mobile …
Security in internet of drones: A comprehensive review
Abstract Unmanned Aerial Vehicles (UAVs), also called drones, are used for various
applications with two basic classifications: civilian and military drones. Civilian drones are …
applications with two basic classifications: civilian and military drones. Civilian drones are …
A provably secure authentication and key exchange protocol in vehicular ad hoc networks
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …
mobile intelligent transportation systems have begun to be widely used. In particular, the …