2020
DOI: 10.1109/tvt.2020.3033060
|View full text |Cite
|
Sign up to set email alerts
|

SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
81
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 202 publications
(81 citation statements)
references
References 40 publications
0
81
0
Order By: Relevance
“…The communication of the Covidrones with the central medical facility should be secure. Specifically, this communication must satisfy the following features: mutual authentication, data integrity, confidentiality, and identity privacy [15]. Additionally, since the Covidrone would operate mainly in remote areas, there is a risk of being captured physically or taken control of by people/groups with malicious intent.…”
Section: To Design and Implement Drone Path Planning And Operational Management While Considering Parameters Like Strategic Location Planmentioning
confidence: 99%
“…The communication of the Covidrones with the central medical facility should be secure. Specifically, this communication must satisfy the following features: mutual authentication, data integrity, confidentiality, and identity privacy [15]. Additionally, since the Covidrone would operate mainly in remote areas, there is a risk of being captured physically or taken control of by people/groups with malicious intent.…”
Section: To Design and Implement Drone Path Planning And Operational Management While Considering Parameters Like Strategic Location Planmentioning
confidence: 99%
“…In this subsection, we will discuss the normalized coverage with respect to different IoD sizes in both sparse and dense scenarios. The IoD size (different sets of UAVs in IoD) implemented are (2,4,6,8,10,12,14,16,18, and 20 UAVs) with transmission power of 50mW. The simulation result is illustrated in Fig.…”
Section: B Impact Of Iod Size On Vanet Connectivity and Rssimentioning
confidence: 99%
“…Due to their unique features such as agility, mobility, and flexibility, UAVs offer high freedom of movement that allows UAVs to navigate remote and rough areas that humans can not access. The Internet of Drones (IoD) term is an integration of drones into a network of IoT [10] and defined as a layered network control architecture designed mainly to coordinate UAVs' access to control airspace and provide navigation services between locations known as nodes [11]. In these applications, IoD can support an efficient mean not only to enhance traffic policy in the ground and enforce traffic rule, but also to provide efficient information dissemination to the ground users.…”
Section: Introductionmentioning
confidence: 99%
“…As UAVs become more connected they naturally inherit from the security privacy and data protection challenges in IoT. Over the recent years, these challenges have been continuously addressed in scientific literature [96]- [100]. The authors in [96] present a summary of some of the main UAV privacy and security threats, illustrated in Figure 6.…”
Section: Security Data Protection and Privacy Challengesmentioning
confidence: 99%
“…According to [127], one of the first proposals for a UTM construct -"Internet of Drones" [128] -emphasised the importance of such interdisciplinary approaches by combining best practices in air traffic control networks, cellular networks as well as the internet to devising one of the first UTM constructs in scientific literature. Since then we have witnessed a clear interest in such holistic research as seen in [5], [102], [127], [129]- [136] on UTM systems, in addition to domain-specific research on airspace design in [101], [111], [113]- [120], collision avoidance and risk mitigation in [103]- [106], [137]- [146] and communication and cybersecurity in [96]- [100], [147]- [159] as summarised below in Table 2.…”
Section: Uav Traffic Managementmentioning
confidence: 99%