2020 IEEE Globecom Workshops (GC WKSHPS 2020
DOI: 10.1109/gcwkshps50303.2020.9367441
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Second Factor Authentication for Drones in 5G using Network Slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Other proposed solutions address secure handover (e.g., for heterogeneous IoT networks [153]), enabling devices to join domains with trust (e.g., using authentication frameworks [88,154,155] and protocols [156]). Some studies concern the proposal of improved authentication/authorization [157][158][159][160][161], architectures [162][163][164][165][166][167], lightweight security [168][169][170][171][172], security schemes (models or protocols) [58,62,[173][174][175], security platforms (or systems) [176][177][178][179][180], algorithms (or methods) [181][182][183][184][185], SDN/NFV-based core NS [186], anomaly/threat detection [118,[187][188][189][190], controlling NS access/use [191], ensuring NS isolation [192], ensuring intra-slice security…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…Other proposed solutions address secure handover (e.g., for heterogeneous IoT networks [153]), enabling devices to join domains with trust (e.g., using authentication frameworks [88,154,155] and protocols [156]). Some studies concern the proposal of improved authentication/authorization [157][158][159][160][161], architectures [162][163][164][165][166][167], lightweight security [168][169][170][171][172], security schemes (models or protocols) [58,62,[173][174][175], security platforms (or systems) [176][177][178][179][180], algorithms (or methods) [181][182][183][184][185], SDN/NFV-based core NS [186], anomaly/threat detection [118,[187][188][189][190], controlling NS access/use [191], ensuring NS isolation [192], ensuring intra-slice security…”
Section: Discussion and Future Research Directionsmentioning
confidence: 99%
“…Moreover, it does not support anonymity and untraceability 21 . More recently, Abdel et al 10 employed the second factor for designing an authentication protocol for IoD. In 2021, Abdel et al 24 presented another authentication protocol Drone‐MAP that uses physical unclonable function (PUF) and 5G technology for ensuring mutual authenticaticity among the participants.…”
Section: Related Workmentioning
confidence: 99%
“…Mostly, the drones exchange sensitive nature of data, thus these are mostly prone to privacy infringement with compromised confidentiality 7 . In addition, the drones inducted in a particular flying zone are prone to be physically captured by malicious adversaries 8–10 . Consequently, there is dire need to come up with designing robust security protocols for ensuring safe communication in IoT environment.…”
Section: Introductionmentioning
confidence: 99%
“…An example focused on image encryption based on quantum walks for data transfer using IoT and wireless networking [El-Latif et al, 2020]. Many studies also offer solutions to improve authentication/authorization for 5G networks [Ali et al, 2020;Sutrala et al, 2022;Abdel-Malek et al, 2020;Matos et al, 2019;Bordel et al, 2021;Shin and Kwon, 2020;Han et al, 2019;Santos et al, 2018;Shin and Kwon, 2018;Haque et al, 2021;Ozhelvaci and Ma, 2020;Zhao et al, 2021d;Hussain et al, 2019b;Shang et al, 2020;Sun et al, 2022;Nyangaresi, 2021;Yan and Ma, 2021;Dong and Wan, 2021], and B5G [Al Mousa et al, 2020]. In contrast, others present solutions for lightweight security [Schmittner et al, 2017;Meshram et al, 2021;Shi et al, 2020;Abdulqadder et al, 2020;Yao et al, 2020], SDN/NFV-based core NS…”
Section: Solutions and Recommendationsmentioning
confidence: 99%