Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Secure communication in IOT-based UAV networks: A systematic survey
J Sharma, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract IoT (Internet of Things) has revolutionized the world with its applications like home
automation, transportation, agriculture, etc. IoT-based Unmanned Aerial Vehicle (UAV) …
automation, transportation, agriculture, etc. IoT-based Unmanned Aerial Vehicle (UAV) …
Internet of drones security: Taxonomies, open issues, and future directions
Drones have recently become one of the most important technological breakthroughs. They
have opened the horizon for a vast array of applications and paved the way for a diversity of …
have opened the horizon for a vast array of applications and paved the way for a diversity of …
[HTML][HTML] A biometric and physically unclonable function–Based authentication protocol for payload exchanges in internet of drones
Abstract Internet of Drones (IoD) has been deployed in numerous military and civilian
domains to offer services such as target surveillance, traffic monitoring, disaster handling …
domains to offer services such as target surveillance, traffic monitoring, disaster handling …
Raven: Robust anonymous vehicular end-to-end encryption and efficient mutual authentication for post-quantum intelligent transportation systems
Intelligent Transportation Systems (ITS) is one of the challenging research areas revolving
around rapid communication services. Nonetheless, these networks are afflicted by …
around rapid communication services. Nonetheless, these networks are afflicted by …
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
The unmanned aerial vehicles (UAVs) in military and civilian systems access sensitive data
via cellular networks and are ubiquitous. Therefore, the number of handovers may increase …
via cellular networks and are ubiquitous. Therefore, the number of handovers may increase …
[HTML][HTML] A symmetric key and elliptic curve cryptography-based protocol for message encryption in unmanned aerial vehicles
Unmanned aerial vehicles have found applications in fields such as environmental
monitoring and the military. Although the collected data in some of these application …
monitoring and the military. Although the collected data in some of these application …
BETA-UAV: Blockchain-based efficient and trusted authentication for UAV communication
Unmanned aerial vehicles (UAV), an emerging architecture that embodies flying ad-hoc
networks, face critical privacy and security challenges, mainly when engaged in data …
networks, face critical privacy and security challenges, mainly when engaged in data …
Research on identity authentication scheme for uav communication network
T **a, M Wang, J He, S Lin, Y Shi, L Guo - Electronics, 2023 - mdpi.com
Unmanned aerial vehicles (UAV) play a vital role in many fields, such as agricultural
planting, security patrol, emergency rescue, and so on. The development and …
planting, security patrol, emergency rescue, and so on. The development and …