2021
DOI: 10.1109/access.2021.3060420
|View full text |Cite
|
Sign up to set email alerts
|

An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(24 citation statements)
references
References 32 publications
0
24
0
Order By: Relevance
“…The certificateless-based and ECC-based SLPAKA (Secure Lightweight Proven Authenticated Key Agreement) authentication method, which can cope with the widely used Canetti-Krawczyk (CK) adversary model [48], was presented in [49]. In this model, a probabilistic polynomial adversary was considered that could totally affect the communication channel.…”
Section: Ecc-based Authenticationmentioning
confidence: 99%
“…The certificateless-based and ECC-based SLPAKA (Secure Lightweight Proven Authenticated Key Agreement) authentication method, which can cope with the widely used Canetti-Krawczyk (CK) adversary model [48], was presented in [49]. In this model, a probabilistic polynomial adversary was considered that could totally affect the communication channel.…”
Section: Ecc-based Authenticationmentioning
confidence: 99%
“…Although they have lightweight features, the authentication protocol is vulnerable to session-specific temporary information attacks. Yahuza et al [ 24 ] and Zhang et al [ 25 ] proposed a secure and lightweight authentication key agreement technology for FANET deployment, and evaluated the security of the technology from theoretical methods and formal methods.…”
Section: Related Workmentioning
confidence: 99%
“…This model comprises three main entities: A trusted authority centre (TAC), flying drones, and a ground control station (GCS) [42,77,78]. The TAC is fully trusted by all the internet of drones (IoD) network's entities.…”
Section: ) Authenticated Key Agreement Iod Security and Privacy Modelmentioning
confidence: 99%
“…On the one hand, the primary purpose of attacks on the internet of drones (IoD) network just like other typical attacks is to gain access and alter the attacked messages for fulfilling the needs of the attacker [77,[81][82][83]. On the other hand, attacks on the drone compared to the typical cyber-attacks usually occur due to the severe design loopholes and lack of wireless security protection mechanisms.…”
Section: Attacks On the Internet Of Drones Networkmentioning
confidence: 99%