2022
DOI: 10.3390/drones6010014
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous Mutual and Batch Authentication with Location Privacy of UAV in FANET

Abstract: As there has been an advancement in avionic systems in recent years, the enactment of unmanned aerial vehicles (UAV) has upgraded. As compared to a single UAV system, multiple UAV systems can perform operations more inexpensively and efficiently. As a result, new technologies between user/control station and UAVs have been developed. FANET (Flying Ad-Hoc Network) is a subset of the MANET (Mobile Ad-Hoc Network) that includes UAVs. UAVs, simply called drones, are used for collecting sensitive data in real time.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 39 publications
0
9
0
Order By: Relevance
“…The principal idea for obtaining these values is to compute the local cost magnitude function and global cost magnitude function [Equation ( 6) and ( 7 . Similarly, autonomous control function of cooperative UAV community is defined in equation (9). Crucially, the proposed RHCRB handling trusted UAV activities in the network through secure control functions.…”
Section: Let Assume 'mentioning
confidence: 99%
See 1 more Smart Citation
“…The principal idea for obtaining these values is to compute the local cost magnitude function and global cost magnitude function [Equation ( 6) and ( 7 . Similarly, autonomous control function of cooperative UAV community is defined in equation (9). Crucially, the proposed RHCRB handling trusted UAV activities in the network through secure control functions.…”
Section: Let Assume 'mentioning
confidence: 99%
“…Due to these problems, the entire UAV coordination system's stability and secrecy rapidly fail. Against these vulnerable states, Rajasekaran et al [9] propose secure location privacy principles for developing advanced avionics systems. The security principles invented in this work have formed mutual batch authentication functions, integrity checking functions, offline node registration jobs, and location privacy functions.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, the arrangement makes it challenging for drones to send emergency alerts to the GCS. Rajasekaran et al 48 proposed a public‐private key based drone to user mutual authentication and a group authentication scheme with location privacy. However, in this design, location of the drone is not validated and the secret keys are stored on drones, making them vulnerable to attackers in the event of a hijacking.…”
Section: Related Workmentioning
confidence: 99%
“…The present literature focuses solely on primary concerns and provides an overview of IoD without a detailed protocol framework. [7][8][9][10][11] In IoD communications, mutual authentication, and privacy are two main security challenges. The adversaries mainly target drones, which are used in sensitive applications to capture confidential information, the identity of the drone, and its flying pattern.…”
Section: Introductionmentioning
confidence: 99%