Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services
暂无分享,去创建一个
Ashok Kumar Das | Rashid Ali | Mohammad Wazid | Basudeb Bera | Ankush Mitra | M. Wazid | A. Das | Ankush Mitra | Basudeb Bera | Rashid Ali
[1] Mohsen Guizani,et al. A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain, and 5G in Managing its Impact , 2020, IEEE Access.
[2] Vikas Hassija,et al. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory , 2020, Comput. Commun..
[3] Pascal Lorenz,et al. Blockchain-Envisioned Secure Data Delivery and Collection Scheme for 5G-Based IoT-Enabled Internet of Drones Environment , 2020, IEEE Transactions on Vehicular Technology.
[4] Shalini Batra,et al. MVO-Based 2-D Path Planning Scheme for Providing Quality of Service in UAV Environment , 2018, IEEE Internet of Things Journal.
[5] Hanif Ullah,et al. 5G Communication: An Overview of Vehicle-to-Everything, Drones, and Healthcare Use-Cases , 2019, IEEE Access.
[6] Sherali Zeadally,et al. Analysis of Security Protocols for Mobile Healthcare , 2016, Journal of Medical Systems.
[7] Shalini Batra,et al. Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks , 2019, IEEE Consumer Electronics Magazine.
[8] Mohsen Guizani,et al. Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..
[9] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[10] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[11] Ashok Kumar Das,et al. Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment , 2020, Comput. Commun..
[12] Kim-Kwang Raymond Choo,et al. Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.
[13] Joel J. P. C. Rodrigues,et al. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.
[14] Luis Javier García Villalba,et al. Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo , 2019, IEEE Access.
[15] Athanasios V. Vasilakos,et al. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.
[16] Athanasios V. Vasilakos,et al. A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment , 2018, IEEE Journal of Biomedical and Health Informatics.
[17] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[18] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[19] Xiong Li,et al. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS , 2016, Secur. Commun. Networks.
[20] Jaeyoung Cho,et al. Drone-Aided Healthcare Services for Patients with Chronic Diseases in Rural Areas , 2017, J. Intell. Robotic Syst..
[21] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[22] Sachin Shetty,et al. A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things , 2020, IEEE Access.
[23] Ilsun You,et al. Behavior and Vulnerability Assessment of Drones-Enabled Industrial Internet of Things (IIoT) , 2018, IEEE Access.
[24] Laurence T. Yang,et al. UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles , 2018, IEEE Network.
[25] Mohsen Guizani,et al. A Distributed Framework for Energy Trading Between UAVs and Charging Stations for Critical Applications , 2020, IEEE Transactions on Vehicular Technology.
[26] Hugo Krawczyk,et al. Universally Composable Notions of Key Exchange and Secure Channels , 2002, EUROCRYPT.
[27] Robert J. Hall,et al. An Internet of Drones , 2016, IEEE Internet Computing.