2022
DOI: 10.1109/access.2022.3178121
|View full text |Cite
|
Sign up to set email alerts
|

A Proxy Signature-Based Swarm Drone Authentication With Leader Selection in 5G Networks

Abstract: Drones are imperative for the 5G architecture as a mobile source to expand network coverage and support seamless services, particularly through enabling device-to-device (D2D) communication. Such deployment of drones in D2D settings raises various security threats in drone communication. While the existing D2D communication security standard within the 4G cellular architecture may address some of these issues, the standard includes heavy traffic toward the network core servers. If this security standard is to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 42 publications
0
7
0
Order By: Relevance
“…Ref. [10] proposed a distributed-based authentication mechanism for drones in a swarm compatible with 5G D2D ProSe standard [11] mechanisms. It relies on a delegation-based proxy signature authentication scheme, reducing drones' communication overhead to the core network.…”
Section: Related Workmentioning
confidence: 99%
“…Ref. [10] proposed a distributed-based authentication mechanism for drones in a swarm compatible with 5G D2D ProSe standard [11] mechanisms. It relies on a delegation-based proxy signature authentication scheme, reducing drones' communication overhead to the core network.…”
Section: Related Workmentioning
confidence: 99%
“…Abdel-Malek et al [28] proposed a distributed delegation-based authentication mechanism for overcoming drone resource limitations and scalability. The proposed method can reduce traffic overhead from the 5G core network.…”
Section: Drone Swarm Authentication Protocolmentioning
confidence: 99%
“…These reasons make it necessary to develop a remote identification system for drones, including drone swarms. There have been numerous works on drone identification and authentication methods [18][19][20][21][22][23][24][25], but only a few on authentication methods for drone swarms [26][27][28][29][30]. Also, there is still no effective method of identification for drone swarms.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, traditional authentication technology is not suitable for the IoD environment. At present, there are also some studies using public key infrastructure (PKI), trusted third party (TTP), or blockchain technology to verify the identity of the drone and the authenticity of the task [18,19]. The existing methods are shown in Figure 1a.…”
Section: Introductionmentioning
confidence: 99%