UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks

Z Guo, J Cao, X Wang, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In the pursuit of autonomous driving and intelligent traffic management, the core goal of 5G
Vehicle-to-Everything (V2X) communication is to enhance the safety and efficiency of …

Design of secure and lightweight authentication scheme for UAV-enabled intelligent transportation systems using blockchain and PUF

S Son, D Kwon, S Lee, Y Jeon, AK Das, Y Park - IEEE Access, 2023 - ieeexplore.ieee.org
Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an
advanced technology that can provide various services including autonomous driving, real …

BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks

M Xie, Z Chang, O Alfarraj, K Yu, T Chen… - arXiv preprint arXiv …, 2024 - arxiv.org
Unmanned aerial vehicles (UAVs) are vulnerable to interception and attacks when operated
remotely without a unified and efficient identity authentication. Meanwhile, the openness of …

[PDF][PDF] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing.

M Alhassan, AR Khan - Computers, Materials & Continua, 2023 - cdn.techscience.cn
Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile
edge computing (MEC) architecture to ensure that sensitive information is protected and …

A UAV-assisted authentication protocol for internet of vehicles

J Miao, Z Wang, X Ning, A Shankar… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
As a component of the Intelligent Transportation System (ITS), Internet of Vehicles (IoV) is
becoming increasingly important in the management and construction of urban …

: A Lightweight, Trustworthy Authentication Scheme for UAV-Assisted IoT Applications

M Adil, H Abulkasim, A Farouk… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The technology of Unmanned Aerial Vehicles (UAVs) has sparked a revolution in numerous
Internet of Things (IoT) applications, such as flood monitoring, wildfire monitoring, coastal …

Privacy-Aware and Hardware Acceleration-Based Authentication Scheme for Internet of Drones

TE Henson, A Dawoud, A Sherif - 2021 3rd IEEE Middle East …, 2021 - ieeexplore.ieee.org
Drones are becoming more influential and inter-connected in today's world. Internet of
drones (IoD) is an architecture created over an area in which drones can be controlled and …

Enabling technologies for running iot applications on the cloud

DMF Mattos, DSV de Medeiros, D Mosse - Annals of Telecommunications, 2022 - Springer
The Internet of Things generates myriad new applications supported by vehicles connected
to roadside units, home appliances connected to the cloud, and many resource-constrained …

Lightweight security authentication mechanism towards UAV networks

L Teng, M Jianfeng, F Pengbin, M Yue… - … on Networking and …, 2019 - ieeexplore.ieee.org
The drones in the UAV networks can communicate with each other through wireless link.
Due to the limited computing resources and complicated external environment of drones …

Secure UAV-aided mobile edge computing for IoT: A review

ET Michailidis, K Maliatsos, DN Skoutas… - IEEE …, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) ecosystem evolves, innovative applications with stringent
demands with respect to latency will emerge. To handle computation-intensive tasks in a …