2022
DOI: 10.1109/jiot.2021.3084946
|View full text |Cite
|
Sign up to set email alerts
|

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 77 publications
(40 citation statements)
references
References 50 publications
0
40
0
Order By: Relevance
“…The UE generates a SUCI by encrypting the SUPI using the ECIES. 14 Like several protocols proposed in recent times, 20,21 in ECIES also the concept of elliptic curve cryptography is used. The steps involved in the process of generating a SUCI from a given SUPI using the ECIES are as follows (Figure 1).…”
Section: The Eciesmentioning
confidence: 99%
“…The UE generates a SUCI by encrypting the SUPI using the ECIES. 14 Like several protocols proposed in recent times, 20,21 in ECIES also the concept of elliptic curve cryptography is used. The steps involved in the process of generating a SUCI from a given SUPI using the ECIES are as follows (Figure 1).…”
Section: The Eciesmentioning
confidence: 99%
“…The scheme presented in [21] lacks the SK verification mechanism and cannot ensure anonymity. The authors in [22] proposed an AEAD, SHA, and ECC-based authentication scheme, which lacks the feature of SK verification mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…If the condition is corroborated, CSP z contemplates the received M SMy as the authentic message. CSP z after corroborating the validity of M SMy , selects T M b , RN b , and computes (22) where Kr, CT 4, SK CSPz , and Auth5 denote secret key for the encrypting RN b , and ID CSPz , ciphertext generated by using AES-CBC-256, secret session key for accomplishing the encrypted communication, and authentication parameter, which will be validated at SM. Finally, CSP z constructs the message M CSPz :{T M b , CT 4, Auth5} and transmits M CSPz to SM y through an open channel.…”
Section: )mentioning
confidence: 99%
“…During mobility, users may utilize different APs to access the 5G network services. To prevent users from being connected to fake APs, proper security measures are needed (Tanveer, Kumar, & Hassan, 2021). According to Benzaid and Taleb (2020), Moreira et al (2018), Nyangaresi et al (2020a) and Sodhro, Pirbhulal, Muzammal, et al (2020), this multi‐tier architecture coupled with ultra‐low latency requirements in 5G present some challenges owing to frequent handovers and authentications among the small cell HetNets.…”
Section: Introductionmentioning
confidence: 99%