PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks
暂无分享,去创建一个
Neeraj Kumar | Vinay Chamola | Tejasvi Alladi | Naren Naren | Neeraj Kumar | V. Chamola | Naren Naren | Tejasvi Alladi
[1] Neeraj Kumar,et al. CB-CAS: Certificate-Based Efficient Signature Scheme With Compact Aggregation for Industrial Internet of Things Environment , 2020, IEEE Internet of Things Journal.
[2] You Ze Cho,et al. Positioning of UAVs for throughput maximization in software-defined disaster area UAV communication networks , 2018, Journal of Communications and Networks.
[3] Awais Ahmad,et al. Hierarchical architecture for 5G based software-defined intelligent transportation system , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[4] Sadia Din,et al. 5G-enabled Hierarchical architecture for software-defined intelligent transportation system , 2019, Comput. Networks.
[5] Athanasios V. Vasilakos,et al. Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment , 2019, IEEE Internet of Things Journal.
[6] Mohsen Guizani,et al. Applications of blockchain in unmanned aerial vehicles: A review , 2020, Veh. Commun..
[7] Biplab Sikdar,et al. Consumer IoT: Security Vulnerability Case Studies and Solutions , 2020, IEEE Consumer Electronics Magazine.
[8] Vikas Hassija,et al. Scheduling drone charging for multi-drone network based on consensus time-stamp and game theory , 2020, Comput. Commun..
[9] Aijing Li,et al. An SDN-MQTT Based Communication System for Battlefield UAV Swarms , 2019, IEEE Communications Magazine.
[10] Aníbal Ollero,et al. Journal of Intelligent & Robotic Systems manuscript No. (will be inserted by the editor) Experimental Results in Multi-UAV Coordination for Disaster Management and Civil Security Applications , 2022 .
[11] Frans M. J. Willems,et al. Secret Key Generation Over Biased Physical Unclonable Functions With Polar Codes , 2019, IEEE Internet of Things Journal.
[12] Konstantinos Markantonakis,et al. A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks , 2018, 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC).
[13] Yousung Kang,et al. Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security , 2019, IEEE Internet of Things Journal.
[14] Kim-Kwang Raymond Choo,et al. Security and Privacy for the Internet of Drones: Challenges and Solutions , 2018, IEEE Communications Magazine.
[15] Biplab Sikdar,et al. A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.
[16] Mohsen Guizani,et al. Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function , 2020, IEEE Transactions on Vehicular Technology.
[17] S. Devadas,et al. Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications , 2008, 2008 IEEE International Conference on RFID.
[18] Agathoniki Trigoni,et al. Supporting Search and Rescue Operations with UAVs , 2010, 2010 International Conference on Emerging Security Technologies.
[19] Gurkan Tuna,et al. Unmanned aerial vehicle-aided communications system for disaster recovery , 2014, J. Netw. Comput. Appl..
[20] Ulrich Rührmair,et al. The Bistable Ring PUF: A new architecture for strong Physical Unclonable Functions , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.
[21] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[22] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[23] Kim-Kwang Raymond Choo,et al. Blockchain Applications for Industry 4.0 and Industrial IoT: A Review , 2019, IEEE Access.
[24] Evsen Yanmaz,et al. Survey on Unmanned Aerial Vehicle Networks for Civil Applications: A Communications Viewpoint , 2016, IEEE Communications Surveys & Tutorials.
[25] Marcello Chiaberge,et al. Multipurpose UAV for search and rescue operations in mountain avalanche events , 2017 .
[26] Joel J. P. C. Rodrigues,et al. TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.
[27] Ilsun You,et al. Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs , 2017, IEEE Network.
[28] Nirwan Ansari,et al. A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[29] Jeremiah Gertler,et al. Homeland Security: Unmanned Aerial Vehicles and Border Surveillance , 2010 .
[30] Bernhard Rinner,et al. Incremental Mosaicking of Images from Autonomous, Small-Scale UAVs , 2010, 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance.
[31] Awais Ahmad,et al. Real-Time Route Planning and Data Dissemination for Urban Scenarios Using the Internet of Things , 2019, IEEE Wireless Communications.
[32] Jorge Guajardo,et al. Brand and IP protection with physical unclonable functions , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[33] Suhas N. Diggavi,et al. Design and Analysis of Stability-Guaranteed PUFs , 2018, IEEE Transactions on Information Forensics and Security.
[34] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[35] R. B. Patel,et al. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks , 2011, J. Netw. Comput. Appl..
[36] Nirwan Ansari,et al. An optimal delay aware task assignment scheme for wireless SDN networked edge cloudlets , 2020, Future Gener. Comput. Syst..
[37] Tarik Taleb,et al. UAV-Based IoT Platform: A Crowd Surveillance Use Case , 2017, IEEE Communications Magazine.
[38] Vinay Chamola,et al. HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks , 2021, IEEE Journal on Selected Areas in Communications.
[39] Kim-Kwang Raymond Choo,et al. Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment , 2018, IEEE Journal of Biomedical and Health Informatics.
[40] Weisi Guo,et al. Relay Deployment in Cellular Networks: Planning and Optimization , 2013, IEEE Journal on Selected Areas in Communications.