2020
DOI: 10.3390/app10093149
|View full text |Cite
|
Sign up to set email alerts
|

SENTINEL: A Secure and Efficient Authentication Framework for Unmanned Aerial Vehicles

Abstract: Extensive use of unmanned aerial vehicles (commonly referred to as a “drone”) has posed security and safety challenges. To mitigate security threats caused by flights of unauthorized drones, we present a framework called SENTINEL (Secure and Efficient autheNTIcation for uNmanned aErial vehicLes) under the Internet of Drones (IoD) infrastructure. SENTINEL is specifically designed to minimize the computational and traffic overheads caused by certificate exchanges and asymmetric cryptography computations that are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 63 publications
(64 citation statements)
references
References 24 publications
0
64
0
Order By: Relevance
“…Cho et al [46] proposed a protocol for small UAVs based on a hash-based message authentication code Secure Hash algorithmic (HMASHA1) function. The alternate of HMACSHA1 was Message Queuing Telemetry Transport (MQTT), intending to create a bandwidth-efficient, lightweight, and low-power consumption protocol.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
See 4 more Smart Citations
“…Cho et al [46] proposed a protocol for small UAVs based on a hash-based message authentication code Secure Hash algorithmic (HMASHA1) function. The alternate of HMACSHA1 was Message Queuing Telemetry Transport (MQTT), intending to create a bandwidth-efficient, lightweight, and low-power consumption protocol.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
“…The hash function can work efficiently when applied to the body of a message and simultaneously verify both the data integrity and the authenticity of a message. Cho et al [46] claimed that their protocol is fast and secure for small UAVs. However, the cryptanalysis result shows that Cho et al [46] protocol suffers from a privileged insider, stolen verifier, and outdated data transmission flaw.…”
Section: Motivation and Contributionsmentioning
confidence: 99%
See 3 more Smart Citations