Drone Authentication Using ID-Based Signcryption in LoRaWAN Network
暂无分享,去创建一个
[1] Tarik Taleb,et al. Low-Altitude Unmanned Aerial Vehicles-Based Internet of Things Services: Comprehensive Survey and Future Perspectives , 2016, IEEE Internet of Things Journal.
[2] W. Gregory Voss. Privacy law implications of the use of drones for security and justice purposes , 2013 .
[3] Ilsun You,et al. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System , 2018, Sensors.
[4] Vitor Guizilini,et al. The Impact of DoS Attacks on the AR.Drone 2.0 , 2016, 2016 XIII Latin American Robotics Symposium and IV Brazilian Robotics Symposium (LARS/SBR).
[5] Stefano Secci,et al. A tutorial on blockchain and applications to secure network control-planes , 2016, 2016 3rd Smart Cloud Networks & Systems (SCNS).
[6] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[7] Daejun Park,et al. Security Authentication System Using Encrypted Channel on UAV Network , 2017, 2017 First IEEE International Conference on Robotic Computing (IRC).
[8] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[9] Vinod Kumar Chaubey,et al. GPS signal jamming and anti-jamming strategy — A theoretical analysis , 2016 .
[10] Elisa Bertino,et al. MAVR: Code Reuse Stealthy Attacks and Mitigation on Unmanned Aerial Vehicles , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[11] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[12] Aiko Pras,et al. Exploring security vulnerabilities of unmanned aerial vehicles , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
[13] Kwangjo Kim,et al. Wireless Authentication Protocol Preserving User Anonymity , 2001 .
[14] Emiliano Sisinni,et al. Evaluation of the IoT LoRaWAN Solution for Distributed Measurement Applications , 2017, IEEE Transactions on Instrumentation and Measurement.
[15] Bin Cao,et al. Securing commercial WiFi-based UAVs from common security attacks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[16] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..