UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks
Z Guo, J Cao, X Wang, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G
Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of …
Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of …
Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF
S Son, D Kwon, S Lee, Y Jeon, AK Das, Y Park - IEEE Access, 2023 - ieeexplore.ieee.org
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an
advanced technology that can provide various services including autonomous driving, real …
advanced technology that can provide various services including autonomous driving, real …
BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks
M Xie, Z Chang, O Alfarraj, K Yu, T Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated
remotely without a unified and efficient identity authentication. Meanwhile, the openness of …
remotely without a unified and efficient identity authentication. Meanwhile, the openness of …
[PDF][PDF] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing.
M Alhassan, AR Khan - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile
edge computing (MEC) architecture to ensure that sensitive information is protected and …
edge computing (MEC) architecture to ensure that sensitive information is protected and …
A UAV-assisted authentication protocol for internet of vehicles
As a component of the Intelligent Transportation System (ITS), Internet of Vehicles (IoV) is
becoming increasingly important in the management and construction of urban …
becoming increasingly important in the management and construction of urban …
: A Lightweight, Trustworthy Authentication Scheme for UAV-Assisted IoT Applications
The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous
Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal …
Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal …
Privacy-Aware and Hardware Acceleration-Based Authentication Scheme for Internet of Drones
Drones are becoming more influential and inter-connected in today's world. Internet of
drones (IoD) is an architecture created over an area in which drones can be controlled and …
drones (IoD) is an architecture created over an area in which drones can be controlled and …
Enabling technologies for running iot applications on the cloud
The Internet of Things generates myriad new applications supported by vehicles connected
to roadside units, home appliances connected to the cloud, and many resource-constrained …
to roadside units, home appliances connected to the cloud, and many resource-constrained …
Lightweight security authentication mechanism towards UAV networks
L Teng, M Jianfeng, F Pengbin, M Yue… - … on Networking and …, 2019 - ieeexplore.ieee.org
The drones in the UAV networks can communicate with each other through wireless link.
Due to the limited computing resources and complicated external environment of drones …
Due to the limited computing resources and complicated external environment of drones …
Secure UAV-aided mobile edge computing for IoT: A review
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …
demands with respect to latency will emerge. To handle computation-intensive tasks in a …