Comprehensive review of UAV detection, security, and communication advancements to prevent threats

GEM Abro, SABM Zulkifli, RJ Masood, VS Asirvadam… - Drones, 2022 - mdpi.com
It has been observed that unmanned aerial vehicles (UAVs), also known as drones, have
been used in a very different way over time. The advancements in key UAV areas include …

PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs

X Liu, Y Wang, Y Li, H Cao - Computer Networks, 2023 - Elsevier
In vehicular ad-hoc networks (VANETs), road traffic efficiency and road safety can be
improved through message interaction and sharing between vehicle users, which inevitably …

MWCRSF: Mobility-based weighted cluster routing scheme for FANETs

AM Khedr, A Salim, PR PV, W Osamy - Vehicular Communications, 2023 - Elsevier
Abstract Flying Ad-Hoc Network (FANET) formed by a swarm of Unmanned Aerial Vehicles
(UAVs) is currently a trending research topic because of its capability in performing complex …

Quantum-safe secure and authorized communication protocol for internet of drones

D Mishra, M Singh, P Rewal… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Remotely-Controlled Aerial Vehicles (RCAV), popularly known as drones, have gained wide
popularity in several applications from military to civilian due to the usage of sensors …

Puf-based robust and anonymous authentication and key establishment scheme for v2g networks

S Yu, K Park - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
V2G improves flexibility, reliability, and efficiency and ensures effective charging services by
enabling two-way communication along with two-way electricity transmission between the …

Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV security

N Kumar, A Chaudhary - Computer Networks, 2024 - Elsevier
Drones and other forms of Unmanned Aerial Vehicles (UAVs) usages are increasing with
time from military operations like surveillance, reconnaissance to commercial operations …

PRLAP-IoD: A PUF-based robust and lightweight authentication protocol for Internet of Drones

Z Zhang, C Hsu, MH Au, L Harn, J Cui, Z ** idea that
seeks to revolutionize how people and things move inside and outside cities. Internet of …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks

JY Lee, J Oh, Y Park - Electronics, 2023 - mdpi.com
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have
enabled medical professionals to identify patients' health information in real time to identify …