Comprehensive review of UAV detection, security, and communication advancements to prevent threats
It has been observed that unmanned aerial vehicles (UAVs), also known as drones, have
been used in a very different way over time. The advancements in key UAV areas include …
been used in a very different way over time. The advancements in key UAV areas include …
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs
X Liu, Y Wang, Y Li, H Cao - Computer Networks, 2023 - Elsevier
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be
improved through message interaction and sharing between vehicle users, which inevitably …
improved through message interaction and sharing between vehicle users, which inevitably …
MWCRSF: Mobility-based weighted cluster routing scheme for FANETs
Abstract Flying Ad-Hoc Network (FANET) formed by a swarm of Unmanned Aerial Vehicles
(UAVs) is currently a trending research topic because of its capability in performing complex …
(UAVs) is currently a trending research topic because of its capability in performing complex …
Quantum-safe secure and authorized communication protocol for internet of drones
Remotely-Controlled Aerial Vehicles (RCAV), popularly known as drones, have gained wide
popularity in several applications from military to civilian due to the usage of sensors …
popularity in several applications from military to civilian due to the usage of sensors …
Puf-based robust and anonymous authentication and key establishment scheme for v2g networks
V2G improves flexibility, reliability, and efficiency and ensures effective charging services by
enabling two-way communication along with two-way electricity transmission between the …
enabling two-way communication along with two-way electricity transmission between the …
Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with
time from military operations like surveillance, reconnaissance to commercial operations …
time from military operations like surveillance, reconnaissance to commercial operations …
PRLAP-IoD: A PUF-based robust and lightweight authentication protocol for Internet of Drones
A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks
JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …
enabled medical professionals to identify patients' health information in real time to identify …