2019 International Conference on Networking and Network Applications (NaNA) 2019
DOI: 10.1109/nana.2019.00072
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Security Authentication Mechanism Towards UAV Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(22 citation statements)
references
References 4 publications
0
22
0
Order By: Relevance
“…The author developed a general framework based on network interdiction games in which aircraft used to route the correct optimal path and avoid the danger points, that is, malicious attacks. Teng et al 98 introduced a new innovative identification authentication model based on the Elliptical cryptography curve. The author designed three phases to draw authentication: initialization phase, identification phase, and key verification.…”
Section: Background Studies and Reported Work In The State Of The Artmentioning
confidence: 99%
“…The author developed a general framework based on network interdiction games in which aircraft used to route the correct optimal path and avoid the danger points, that is, malicious attacks. Teng et al 98 introduced a new innovative identification authentication model based on the Elliptical cryptography curve. The author designed three phases to draw authentication: initialization phase, identification phase, and key verification.…”
Section: Background Studies and Reported Work In The State Of The Artmentioning
confidence: 99%
“…In [50], a lightweight recognition authentication mode backed by ECC (Elliptic Curve Cryptography) is suggested that has three steps: i) ECC certification initiation, ii) identity authentication, and iii) key compatibility verification. Teng et al have mentioned that the first two steps are fully compatible with the two-way authentication.…”
Section: ) Lightweight Authentication Protocols For Uavmentioning
confidence: 99%
“…Whereas, the last step verifies the consistency of the verification key. In contrast with the traditional authentication modes in the UAV network, the perspective suggested in [50] is based on short keys and less computing workload. Barka et al suggested a capable lightweight communication plan for the aerial Named Data Networking (NDN) [51].…”
Section: ) Lightweight Authentication Protocols For Uavmentioning
confidence: 99%
“…Their scheme is also feasible for 5G enabled drones. Teng et al [40] demonstrated an identity-based ECC certification method was used to design a three-factor authentication scheme for working in Unmanned Aerial Vehicular Networks (UAVNs) enabled vehicles (drones). They said that RSA couldn't be feasible for such a resourceless environment, as it provides a log certification facility.…”
Section: Related Workmentioning
confidence: 99%