Towards secure wireless mesh networks for UAV swarm connectivity: Current threats, research, and opportunities

MA Lopez, M Baddeley, WT Lunardi… - … Computing in Sensor …, 2021 - ieeexplore.ieee.org
UAVs are increasingly appearing in swarms or formations to leverage cooperative behavior,
forming flying ad hoc networks. These UAV-enabled networks can meet several complex …

LEAP+ Efficient security mechanisms for large-scale distributed sensor networks

S Zhu, S Setia, S Jajodia - ACM Transactions on Sensor Networks …, 2006 - dl.acm.org
We describe LEAP+ (Localized Encryption and Authentication Protocol), a key management
protocol for sensor networks that is designed to support in-network processing, while at the …

Detecting and localizing wireless spoofing attacks

Y Chen, W Trappe, RP Martin - … on sensor, mesh and ad hoc …, 2007 - ieeexplore.ieee.org
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of
attacks on the networks. Although the identity of a node can be verified through …

Detecting and localizing identity-based attacks in wireless and sensor networks

Y Chen, J Yang, W Trappe… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Wireless networks are vulnerable to identity-based attacks, including spoofing and Sybil
attacks, which allows for many other forms of attacks on the networks. Although the identity …

FDAC: Toward fine-grained distributed data access control in wireless sensor networks

S Yu, K Ren, W Lou - IEEE transactions on parallel and …, 2010 - ieeexplore.ieee.org
Distributed sensor data storage and retrieval have gained increasing popularity in recent
years for supporting various applications. While distributed architecture enjoys a more …

TSVC: Timed efficient and secure vehicular communications with privacy preserving

X Lin, X Sun, X Wang, C Zhang… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we propose a Timed Efficient and Secure Vehicular Communication (TSVC)
scheme with privacy preservation, which aims at minimizing the packet overhead in terms of …

Novel and Secure Protocol for Trusted Wireless Ad-hoc Network Creation

KB Sk, SS Vellela, K Yakubreddy… - Khader Basha Sk …, 2023 - papers.ssrn.com
In order to share the initial data and the secret keys that will be used to encrypt the data, a
secure protocol is presented in this research for spontaneous wireless ad hoc networks that …

Authentication protocols for ad hoc networks: taxonomy and research issues

N Aboudagga, MT Refaei, M Eltoweissy… - Proceedings of the 1st …, 2005 - dl.acm.org
Ad hoc networks, such as sensor and mobile ad hoc networks, must overcome a myriad of
security challenges to realize their potential in both civil and military applications. Typically …

Mitigating DoS attacks against signature-based authentication in VANETs

L He, WT Zhu - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are supposed to improve traffic safety and drivers'
experiences. In a typical VANET, a vehicle broadcasts safety messages to its neighbors …

Stability Verification of Self‐Organized Wireless Networks with Block Encryption

VY Sokolov, P Skladannyi… - Cybersecurity Providing in …, 2022 - elibrary.kubg.edu.ua
Sensor networks allow the transmission of data for medical and research purposes. They
are essential for building IoT wireless networks. The widespread use of such networks …